Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-53057
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 Version: 066a3b5b2346febf9a655b444567b7138e3bb939 |
||||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-53057", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-11T14:25:23.594430Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-11T14:58:31.650Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Linux", programFiles: [ "net/sched/sch_api.c", ], repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", vendor: "Linux", versions: [ { lessThan: "e7f9a6f97eb067599a74f3bcb6761976b0ed303e", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "ce691c814bc7a3c30c220ffb5b7422715458fd9b", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "05df1b1dff8f197f1c275b57ccb2ca33021df552", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "580b3189c1972aff0f993837567d36392e9d981b", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "597cf9748c3477bf61bc35f0634129f56764ad24", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "9995909615c3431a5304c1210face5f268d24dba", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, { lessThan: "2e95c4384438adeaa772caa560244b1a2efef816", status: "affected", version: "066a3b5b2346febf9a655b444567b7138e3bb939", versionType: "git", }, ], }, { defaultStatus: "affected", product: "Linux", programFiles: [ "net/sched/sch_api.c", ], repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", vendor: "Linux", versions: [ { status: "affected", version: "2.6.25", }, { lessThan: "2.6.25", status: "unaffected", version: "0", versionType: "semver", }, { lessThanOrEqual: "4.19.*", status: "unaffected", version: "4.19.323", versionType: "semver", }, { lessThanOrEqual: "5.4.*", status: "unaffected", version: "5.4.285", versionType: "semver", }, { lessThanOrEqual: "5.10.*", status: "unaffected", version: "5.10.229", versionType: "semver", }, { lessThanOrEqual: "5.15.*", status: "unaffected", version: "5.15.171", versionType: "semver", }, { lessThanOrEqual: "6.1.*", status: "unaffected", version: "6.1.116", versionType: "semver", }, { lessThanOrEqual: "6.6.*", status: "unaffected", version: "6.6.60", versionType: "semver", }, { lessThanOrEqual: "6.11.*", status: "unaffected", version: "6.11.7", versionType: "semver", }, { lessThanOrEqual: "*", status: "unaffected", version: "6.12", versionType: "original_commit_for_fix", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "4.19.323", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "5.4.285", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "5.10.229", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "5.15.171", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "6.1.116", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "6.6.60", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "6.11.7", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", versionEndExcluding: "6.12", versionStartIncluding: "2.6.25", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], descriptions: [ { lang: "en", value: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\n\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\nto be either root or ingress. This assumption is bogus since it's valid\nto create egress qdiscs with major handle ffff:\nBudimir Markovic found that for qdiscs like DRR that maintain an active\nclass list, it will cause a UAF with a dangling class pointer.\n\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\nqdisc since its parent is itself. The proper fix is to stop when parent\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\nhierarchy which does not contain a ffff: major handle call into\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\n\nIn the scenario where major ffff: is an egress qdisc in any of the tree\nlevels, the updates will also propagate to TC_H_ROOT, which then the\niteration must stop.\n\n\n net/sched/sch_api.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)", }, ], providerMetadata: { dateUpdated: "2025-05-04T09:51:52.422Z", orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", shortName: "Linux", }, references: [ { url: "https://git.kernel.org/stable/c/e7f9a6f97eb067599a74f3bcb6761976b0ed303e", }, { url: "https://git.kernel.org/stable/c/dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20", }, { url: "https://git.kernel.org/stable/c/ce691c814bc7a3c30c220ffb5b7422715458fd9b", }, { url: "https://git.kernel.org/stable/c/05df1b1dff8f197f1c275b57ccb2ca33021df552", }, { url: "https://git.kernel.org/stable/c/580b3189c1972aff0f993837567d36392e9d981b", }, { url: "https://git.kernel.org/stable/c/597cf9748c3477bf61bc35f0634129f56764ad24", }, { url: "https://git.kernel.org/stable/c/9995909615c3431a5304c1210face5f268d24dba", }, { url: "https://git.kernel.org/stable/c/2e95c4384438adeaa772caa560244b1a2efef816", }, ], title: "net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT", x_generator: { engine: "bippy-1.2.0", }, }, }, cveMetadata: { assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", assignerShortName: "Linux", cveId: "CVE-2024-53057", datePublished: "2024-11-19T17:19:40.284Z", dateReserved: "2024-11-19T17:17:24.974Z", dateUpdated: "2025-05-04T09:51:52.422Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-53057\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-11-19T18:15:25.700\",\"lastModified\":\"2024-12-11T15:15:17.757\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\\n\\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\\nto be either root or ingress. This assumption is bogus since it's valid\\nto create egress qdiscs with major handle ffff:\\nBudimir Markovic found that for qdiscs like DRR that maintain an active\\nclass list, it will cause a UAF with a dangling class pointer.\\n\\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\\nqdisc since its parent is itself. The proper fix is to stop when parent\\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\\nhierarchy which does not contain a ffff: major handle call into\\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\\n\\nIn the scenario where major ffff: is an egress qdisc in any of the tree\\nlevels, the updates will also propagate to TC_H_ROOT, which then the\\niteration must stop.\\n\\n\\n net/sched/sch_api.c | 2 +-\\n 1 file changed, 1 insertion(+), 1 deletion(-)\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: stop qdisc_tree_reduce_backlog en TC_H_ROOT En qdisc_tree_reduce_backlog, se supone que las Qdisc con el identificador principal ffff: son raíz o de entrada. Esta suposición es falsa ya que es válido crear qdiscs de salida con el identificador principal ffff: Budimir Markovic descubrió que para las qdisc como DRR que mantienen una lista de clases activa, provocará un UAF con un puntero de clase colgante. En 066a3b5b2346, la preocupación era evitar iterar sobre la qdisc de entrada ya que su padre es ella misma. La solución adecuada es detener cuando se alcanza el padre TC_H_ROOT porque la única forma de recuperar la entrada es cuando una jerarquía que no contiene un identificador principal ffff: llama a qdisc_lookup con TC_H_MAJ(TC_H_ROOT). En el escenario donde el ffff principal es una qdisc de salida en cualquiera de los niveles del árbol, las actualizaciones también se propagarán a TC_H_ROOT, donde luego la iteración debe detenerse. net/sched/sch_api.c | 2 +- 1 archivo modificado, 1 inserción(+), 1 eliminación(-)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.25\",\"versionEndExcluding\":\"4.19.323\",\"matchCriteriaId\":\"CC1BB872-C9E6-412A-A696-AAF936DC97C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.285\",\"matchCriteriaId\":\"B5A89369-320F-47FC-8695-56F61F87E4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.229\",\"matchCriteriaId\":\"1A03CABE-9B43-4E7F-951F-10DEEADAA426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.171\",\"matchCriteriaId\":\"2BE18665-48ED-417A-90AA-41F3AC0B4E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.116\",\"matchCriteriaId\":\"43EFDC15-E4D4-4F1E-B70D-62F0854BFDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.60\",\"matchCriteriaId\":\"75088E5E-2400-4D20-915F-7A65C55D9CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.11.7\",\"matchCriteriaId\":\"E96F53A4-5E87-4A70-BD9A-BC327828D57F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F361E1D-580F-4A2D-A509-7615F73167A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"925478D0-3E3D-4E6F-ACD5-09F28D5DF82C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C95E234-D335-4B6C-96BF-E2CEBD8654ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F717D8-3014-4F84-8086-0124B2111379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"24DBE6C7-2AAE-4818-AED2-E131F153D2FA\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/05df1b1dff8f197f1c275b57ccb2ca33021df552\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2e95c4384438adeaa772caa560244b1a2efef816\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/580b3189c1972aff0f993837567d36392e9d981b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/597cf9748c3477bf61bc35f0634129f56764ad24\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9995909615c3431a5304c1210face5f268d24dba\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ce691c814bc7a3c30c220ffb5b7422715458fd9b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e7f9a6f97eb067599a74f3bcb6761976b0ed303e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53057\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-11T14:25:23.594430Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-11T14:25:24.771Z\"}}], \"cna\": {\"title\": \"net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"e7f9a6f97eb067599a74f3bcb6761976b0ed303e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"ce691c814bc7a3c30c220ffb5b7422715458fd9b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"05df1b1dff8f197f1c275b57ccb2ca33021df552\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"580b3189c1972aff0f993837567d36392e9d981b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"597cf9748c3477bf61bc35f0634129f56764ad24\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"9995909615c3431a5304c1210face5f268d24dba\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"066a3b5b2346febf9a655b444567b7138e3bb939\", \"lessThan\": \"2e95c4384438adeaa772caa560244b1a2efef816\", \"versionType\": \"git\"}], \"programFiles\": [\"net/sched/sch_api.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.25\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.25\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.229\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.171\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.116\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.60\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/sched/sch_api.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e7f9a6f97eb067599a74f3bcb6761976b0ed303e\"}, {\"url\": \"https://git.kernel.org/stable/c/dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20\"}, {\"url\": \"https://git.kernel.org/stable/c/ce691c814bc7a3c30c220ffb5b7422715458fd9b\"}, {\"url\": \"https://git.kernel.org/stable/c/05df1b1dff8f197f1c275b57ccb2ca33021df552\"}, {\"url\": \"https://git.kernel.org/stable/c/580b3189c1972aff0f993837567d36392e9d981b\"}, {\"url\": \"https://git.kernel.org/stable/c/597cf9748c3477bf61bc35f0634129f56764ad24\"}, {\"url\": \"https://git.kernel.org/stable/c/9995909615c3431a5304c1210face5f268d24dba\"}, {\"url\": \"https://git.kernel.org/stable/c/2e95c4384438adeaa772caa560244b1a2efef816\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\\n\\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\\nto be either root or ingress. This assumption is bogus since it's valid\\nto create egress qdiscs with major handle ffff:\\nBudimir Markovic found that for qdiscs like DRR that maintain an active\\nclass list, it will cause a UAF with a dangling class pointer.\\n\\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\\nqdisc since its parent is itself. The proper fix is to stop when parent\\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\\nhierarchy which does not contain a ffff: major handle call into\\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\\n\\nIn the scenario where major ffff: is an egress qdisc in any of the tree\\nlevels, the updates will also propagate to TC_H_ROOT, which then the\\niteration must stop.\\n\\n\\n net/sched/sch_api.c | 2 +-\\n 1 file changed, 1 insertion(+), 1 deletion(-)\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.323\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.285\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.229\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.171\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.116\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.60\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11.7\", \"versionStartIncluding\": \"2.6.25\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12\", \"versionStartIncluding\": \"2.6.25\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:51:52.422Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-53057\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:51:52.422Z\", \"dateReserved\": \"2024-11-19T17:17:24.974Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-11-19T17:19:40.284Z\", \"assignerShortName\": \"Linux\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
wid-sec-w-2024-3509
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3509 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3509.json", }, { category: "self", summary: "WID-SEC-2024-3509 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3509", }, { category: "external", summary: "Kernel CVE Announce Mailingliste", url: "https://lore.kernel.org/linux-cve-announce/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53079", url: "https://lore.kernel.org/linux-cve-announce/2024111901-CVE-2024-53079-7501@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53080", url: "https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53080-e1a8@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53081", url: "https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53081-72b5@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53082", url: "https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53082-30c0@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53083", url: "https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53083-6ed0@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53084", url: "https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53084-1021@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53085", url: "https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53085-9cf3@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53086", url: "https://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53086-af24@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53087", url: "https://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53087-6cd3@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53088", url: "https://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53088-795c@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53073", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53073-16f8@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53074", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53074-e49b@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53075", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53075-2e34@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53076", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53076-713e@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53077", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53077-f48f@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53078", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53078-f504@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53060", url: "https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53060-3b94@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53062", url: "https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53062-c9f7@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53063", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53063-1ffa@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53064", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53064-119c@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53065", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53065-3a63@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53066", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53066-abf7@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53067", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53067-0c9e@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53068", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53068-8c2a@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53069", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53069-2786@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-50303", url: "https://lore.kernel.org/linux-cve-announce/2024111922-CVE-2024-50303-2bd7@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-50304", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-50304-da6d@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53042", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53042-f7e1@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53043", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53043-f450@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53044", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53044-e0d1@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53045", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53045-e1dc@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53046", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53046-b36d@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53047", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53047-8214@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53048", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53048-cdd4@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53049", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53049-fa45@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53050", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53050-b59c@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53051", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53051-5184@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53052", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53052-3bd9@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53053", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53053-57bf@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53054", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53054-7da4@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53055", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53055-4a64@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53056", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53056-ae69@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53057", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53057-a3a5@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53058", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53058-7bd0@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53059", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53059-4f81@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53061", url: "https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53061-a7a1@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53070", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53070-6eea@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53071", url: "https://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-53071-ddbc@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53072", url: "https://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-53072-f307@gregkh/", }, { category: "external", summary: "Debian Security Advisory DSA-5818 vom 2024-11-24", url: "https://lists.debian.org/debian-security-announce/2024/msg00233.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/", }, { category: "external", summary: "Ubuntu Security Notice USN-7163-1 vom 2024-12-16", url: "https://ubuntu.com/security/notices/USN-7163-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", url: "https://linux.oracle.com/errata/ELSA-2024-12884.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7169-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7167-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7167-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7170-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7170-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7173-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7173-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", url: "https://linux.oracle.com/errata/ELSA-2024-12887.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-2 vom 2024-12-18", url: "https://ubuntu.com/security/notices/USN-7169-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7179-1 vom 2024-12-20", url: "https://ubuntu.com/security/notices/USN-7179-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7173-2 vom 2024-12-20", url: "https://ubuntu.com/security/notices/USN-7173-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7184-1 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7184-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7186-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7179-2 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7179-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7183-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7167-2 vom 2025-01-07", url: "https://ubuntu.com/security/notices/USN-7167-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-3 vom 2025-01-07", url: "https://ubuntu.com/security/notices/USN-7169-3", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2025:0065 vom 2025-01-08", url: "https://access.redhat.com/errata/RHSA-2025:0065", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2025:0066 vom 2025-01-08", url: "https://access.redhat.com/errata/RHSA-2025:0066", }, { category: "external", summary: "Ubuntu Security Notice USN-7179-3 vom 2025-01-07", url: "https://ubuntu.com/security/notices/USN-7179-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7186-2", }, { category: "external", summary: "Google Cloud Platform Security Bulletin GCP-2025-002 vom 2025-01-09", url: "https://cloud.google.com/support/bulletins#gcp-2025-002", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-4 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7169-4", }, { category: "external", summary: "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7196-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7195-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7185-2 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7185-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-5 vom 2025-01-10", url: "https://ubuntu.com/security/notices/USN-7169-5", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2025:0066 vom 2025-01-11", url: "https://errata.build.resf.org/RLSA-2025:0066", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2025:0065 vom 2025-01-11", url: "https://errata.build.resf.org/RLSA-2025:0065", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2025-0065 vom 2025-01-11", url: "http://linux.oracle.com/errata/ELSA-2025-0065.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", url: "https://linux.oracle.com/errata/ELSA-2025-20018.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", url: "https://ubuntu.com/security/notices/USN-7195-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7173-3 vom 2025-01-15", url: "https://ubuntu.com/security/notices/USN-7173-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:18:47.755+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-3509", initial_release_date: "2024-11-19T23:00:00.000+00:00", revision_history: [ { date: "2024-11-19T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-24T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-12-15T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-12-16T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu und Oracle Linux aufgenommen", }, { date: "2024-12-17T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2024-12-18T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE, Oracle Linux und Ubuntu aufgenommen", }, { date: "2024-12-19T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-12-22T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2025-01-06T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-07T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2025-01-08T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-09T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Ubuntu und Google aufgenommen", }, { date: "2025-01-12T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Ubuntu, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen", }, { date: "2025-01-14T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-15T23:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "16", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Google Container-Optimized OS", product: { name: "Google Container-Optimized OS", product_id: "1607324", product_identification_helper: { cpe: "cpe:/o:google:container-optimized_os:-", }, }, }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel", product: { name: "Open Source Linux Kernel", product_id: "T039341", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "RESF Rocky Linux", product: { name: "RESF Rocky Linux", product_id: "T032255", product_identification_helper: { cpe: "cpe:/o:resf:rocky_linux:-", }, }, }, ], category: "vendor", name: "RESF", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2024-50303", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-50303", }, { cve: "CVE-2024-50304", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-50304", }, { cve: "CVE-2024-53042", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53042", }, { cve: "CVE-2024-53043", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53043", }, { cve: "CVE-2024-53044", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53044", }, { cve: "CVE-2024-53045", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53045", }, { cve: "CVE-2024-53046", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53046", }, { cve: "CVE-2024-53047", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53047", }, { cve: "CVE-2024-53048", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53048", }, { cve: "CVE-2024-53049", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53049", }, { cve: "CVE-2024-53050", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53050", }, { cve: "CVE-2024-53051", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53051", }, { cve: "CVE-2024-53052", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53052", }, { cve: "CVE-2024-53053", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53053", }, { cve: "CVE-2024-53054", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53054", }, { cve: "CVE-2024-53055", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53055", }, { cve: "CVE-2024-53056", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53056", }, { cve: "CVE-2024-53057", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53057", }, { cve: "CVE-2024-53058", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53058", }, { cve: "CVE-2024-53059", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53059", }, { cve: "CVE-2024-53060", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53060", }, { cve: "CVE-2024-53061", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53061", }, { cve: "CVE-2024-53062", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53062", }, { cve: "CVE-2024-53063", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53063", }, { cve: "CVE-2024-53064", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53064", }, { cve: "CVE-2024-53065", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53065", }, { cve: "CVE-2024-53066", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53066", }, { cve: "CVE-2024-53067", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53067", }, { cve: "CVE-2024-53068", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53068", }, { cve: "CVE-2024-53069", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53069", }, { cve: "CVE-2024-53070", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53070", }, { cve: "CVE-2024-53071", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53071", }, { cve: "CVE-2024-53072", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53072", }, { cve: "CVE-2024-53073", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53073", }, { cve: "CVE-2024-53074", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53074", }, { cve: "CVE-2024-53075", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53075", }, { cve: "CVE-2024-53076", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53076", }, { cve: "CVE-2024-53077", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53077", }, { cve: "CVE-2024-53078", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53078", }, { cve: "CVE-2024-53079", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53079", }, { cve: "CVE-2024-53080", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53080", }, { cve: "CVE-2024-53081", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53081", }, { cve: "CVE-2024-53082", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53082", }, { cve: "CVE-2024-53083", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53083", }, { cve: "CVE-2024-53084", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53084", }, { cve: "CVE-2024-53085", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53085", }, { cve: "CVE-2024-53086", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53086", }, { cve: "CVE-2024-53087", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53087", }, { cve: "CVE-2024-53088", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53088", }, ], }
WID-SEC-W-2024-3509
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Der Kernel stellt den Kern des Linux Betriebssystems dar.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3509 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3509.json", }, { category: "self", summary: "WID-SEC-2024-3509 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3509", }, { category: "external", summary: "Kernel CVE Announce Mailingliste", url: "https://lore.kernel.org/linux-cve-announce/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53079", url: "https://lore.kernel.org/linux-cve-announce/2024111901-CVE-2024-53079-7501@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53080", url: "https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53080-e1a8@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53081", url: "https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53081-72b5@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53082", url: "https://lore.kernel.org/linux-cve-announce/2024111904-CVE-2024-53082-30c0@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53083", url: "https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53083-6ed0@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53084", url: "https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53084-1021@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53085", url: "https://lore.kernel.org/linux-cve-announce/2024111905-CVE-2024-53085-9cf3@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53086", url: "https://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53086-af24@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53087", url: "https://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53087-6cd3@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53088", url: "https://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53088-795c@gregkh/#u", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53073", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53073-16f8@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53074", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53074-e49b@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53075", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53075-2e34@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53076", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53076-713e@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53077", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53077-f48f@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53078", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53078-f504@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53060", url: "https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53060-3b94@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53062", url: "https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53062-c9f7@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53063", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53063-1ffa@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53064", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53064-119c@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53065", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53065-3a63@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53066", url: "https://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53066-abf7@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53067", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53067-0c9e@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53068", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53068-8c2a@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53069", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53069-2786@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-50303", url: "https://lore.kernel.org/linux-cve-announce/2024111922-CVE-2024-50303-2bd7@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-50304", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-50304-da6d@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53042", url: "https://lore.kernel.org/linux-cve-announce/2024111924-CVE-2024-53042-f7e1@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53043", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53043-f450@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53044", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53044-e0d1@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53045", url: "https://lore.kernel.org/linux-cve-announce/2024111925-CVE-2024-53045-e1dc@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53046", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53046-b36d@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53047", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53047-8214@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53048", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53048-cdd4@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53049", url: "https://lore.kernel.org/linux-cve-announce/2024111926-CVE-2024-53049-fa45@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53050", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53050-b59c@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53051", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53051-5184@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53052", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53052-3bd9@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53053", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53053-57bf@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53054", url: "https://lore.kernel.org/linux-cve-announce/2024111927-CVE-2024-53054-7da4@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53055", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53055-4a64@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53056", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53056-ae69@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53057", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53057-a3a5@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53058", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53058-7bd0@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53059", url: "https://lore.kernel.org/linux-cve-announce/2024111928-CVE-2024-53059-4f81@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53061", url: "https://lore.kernel.org/linux-cve-announce/2024111931-CVE-2024-53061-a7a1@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53070", url: "https://lore.kernel.org/linux-cve-announce/2024111933-CVE-2024-53070-6eea@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53071", url: "https://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-53071-ddbc@gregkh/", }, { category: "external", summary: "Linux Kernel CVE Announcement CVE-2024-53072", url: "https://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-53072-f307@gregkh/", }, { category: "external", summary: "Debian Security Advisory DSA-5818 vom 2024-11-24", url: "https://lists.debian.org/debian-security-announce/2024/msg00233.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/", }, { category: "external", summary: "Ubuntu Security Notice USN-7163-1 vom 2024-12-16", url: "https://ubuntu.com/security/notices/USN-7163-1", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", url: "https://linux.oracle.com/errata/ELSA-2024-12884.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7169-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7167-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7167-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7170-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7170-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7173-1 vom 2024-12-17", url: "https://ubuntu.com/security/notices/USN-7173-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", url: "https://linux.oracle.com/errata/ELSA-2024-12887.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-2 vom 2024-12-18", url: "https://ubuntu.com/security/notices/USN-7169-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7179-1 vom 2024-12-20", url: "https://ubuntu.com/security/notices/USN-7179-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7173-2 vom 2024-12-20", url: "https://ubuntu.com/security/notices/USN-7173-2", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7184-1 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7184-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7186-1 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7186-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7179-2 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7179-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7183-1 vom 2025-01-06", url: "https://ubuntu.com/security/notices/USN-7183-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7167-2 vom 2025-01-07", url: "https://ubuntu.com/security/notices/USN-7167-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-3 vom 2025-01-07", url: "https://ubuntu.com/security/notices/USN-7169-3", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2025:0065 vom 2025-01-08", url: "https://access.redhat.com/errata/RHSA-2025:0065", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2025:0066 vom 2025-01-08", url: "https://access.redhat.com/errata/RHSA-2025:0066", }, { category: "external", summary: "Ubuntu Security Notice USN-7179-3 vom 2025-01-07", url: "https://ubuntu.com/security/notices/USN-7179-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7186-2 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7186-2", }, { category: "external", summary: "Google Cloud Platform Security Bulletin GCP-2025-002 vom 2025-01-09", url: "https://cloud.google.com/support/bulletins#gcp-2025-002", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-4 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7169-4", }, { category: "external", summary: "Ubuntu Security Notice USN-7196-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7196-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7195-1 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7195-1", }, { category: "external", summary: "Ubuntu Security Notice USN-7185-2 vom 2025-01-09", url: "https://ubuntu.com/security/notices/USN-7185-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7169-5 vom 2025-01-10", url: "https://ubuntu.com/security/notices/USN-7169-5", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2025:0066 vom 2025-01-11", url: "https://errata.build.resf.org/RLSA-2025:0066", }, { category: "external", summary: "Rocky Linux Security Advisory RLSA-2025:0065 vom 2025-01-11", url: "https://errata.build.resf.org/RLSA-2025:0065", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2025-0065 vom 2025-01-11", url: "http://linux.oracle.com/errata/ELSA-2025-0065.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", url: "https://linux.oracle.com/errata/ELSA-2025-20018.html", }, { category: "external", summary: "Ubuntu Security Notice USN-7195-2 vom 2025-01-14", url: "https://ubuntu.com/security/notices/USN-7195-2", }, { category: "external", summary: "Ubuntu Security Notice USN-7173-3 vom 2025-01-15", url: "https://ubuntu.com/security/notices/USN-7173-3", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html", }, ], source_lang: "en-US", title: "Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:18:47.755+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-3509", initial_release_date: "2024-11-19T23:00:00.000+00:00", revision_history: [ { date: "2024-11-19T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-24T23:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-12-15T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-12-16T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Ubuntu und Oracle Linux aufgenommen", }, { date: "2024-12-17T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2024-12-18T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE, Oracle Linux und Ubuntu aufgenommen", }, { date: "2024-12-19T23:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2024-12-22T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Ubuntu und SUSE aufgenommen", }, { date: "2025-01-06T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-07T23:00:00.000+00:00", number: "10", summary: "Neue Updates von Ubuntu und Red Hat aufgenommen", }, { date: "2025-01-08T23:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2025-01-09T23:00:00.000+00:00", number: "12", summary: "Neue Updates von Ubuntu und Google aufgenommen", }, { date: "2025-01-12T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Ubuntu, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen", }, { date: "2025-01-14T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-15T23:00:00.000+00:00", number: "15", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "16", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Google Container-Optimized OS", product: { name: "Google Container-Optimized OS", product_id: "1607324", product_identification_helper: { cpe: "cpe:/o:google:container-optimized_os:-", }, }, }, ], category: "vendor", name: "Google", }, { branches: [ { category: "product_name", name: "Open Source Linux Kernel", product: { name: "Open Source Linux Kernel", product_id: "T039341", product_identification_helper: { cpe: "cpe:/o:linux:linux_kernel:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "RESF Rocky Linux", product: { name: "RESF Rocky Linux", product_id: "T032255", product_identification_helper: { cpe: "cpe:/o:resf:rocky_linux:-", }, }, }, ], category: "vendor", name: "RESF", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2024-50303", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-50303", }, { cve: "CVE-2024-50304", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-50304", }, { cve: "CVE-2024-53042", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53042", }, { cve: "CVE-2024-53043", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53043", }, { cve: "CVE-2024-53044", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53044", }, { cve: "CVE-2024-53045", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53045", }, { cve: "CVE-2024-53046", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53046", }, { cve: "CVE-2024-53047", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53047", }, { cve: "CVE-2024-53048", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53048", }, { cve: "CVE-2024-53049", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53049", }, { cve: "CVE-2024-53050", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53050", }, { cve: "CVE-2024-53051", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53051", }, { cve: "CVE-2024-53052", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53052", }, { cve: "CVE-2024-53053", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53053", }, { cve: "CVE-2024-53054", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53054", }, { cve: "CVE-2024-53055", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53055", }, { cve: "CVE-2024-53056", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53056", }, { cve: "CVE-2024-53057", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53057", }, { cve: "CVE-2024-53058", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53058", }, { cve: "CVE-2024-53059", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53059", }, { cve: "CVE-2024-53060", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53060", }, { cve: "CVE-2024-53061", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53061", }, { cve: "CVE-2024-53062", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53062", }, { cve: "CVE-2024-53063", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53063", }, { cve: "CVE-2024-53064", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53064", }, { cve: "CVE-2024-53065", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53065", }, { cve: "CVE-2024-53066", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53066", }, { cve: "CVE-2024-53067", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53067", }, { cve: "CVE-2024-53068", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53068", }, { cve: "CVE-2024-53069", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53069", }, { cve: "CVE-2024-53070", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53070", }, { cve: "CVE-2024-53071", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53071", }, { cve: "CVE-2024-53072", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53072", }, { cve: "CVE-2024-53073", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53073", }, { cve: "CVE-2024-53074", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53074", }, { cve: "CVE-2024-53075", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53075", }, { cve: "CVE-2024-53076", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53076", }, { cve: "CVE-2024-53077", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53077", }, { cve: "CVE-2024-53078", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53078", }, { cve: "CVE-2024-53079", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53079", }, { cve: "CVE-2024-53080", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53080", }, { cve: "CVE-2024-53081", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53081", }, { cve: "CVE-2024-53082", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53082", }, { cve: "CVE-2024-53083", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53083", }, { cve: "CVE-2024-53084", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53084", }, { cve: "CVE-2024-53085", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53085", }, { cve: "CVE-2024-53086", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53086", }, { cve: "CVE-2024-53087", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53087", }, { cve: "CVE-2024-53088", notes: [ { category: "description", text: "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zurückzuführen sind. Komponenten wie drm, virtio, USB und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen.", }, ], product_status: { known_affected: [ "T039341", "2951", "T002207", "67646", "T000126", "T004914", "1607324", "T032255", ], }, release_date: "2024-11-19T23:00:00.000+00:00", title: "CVE-2024-53088", }, ], }
ghsa-j5vh-vfg7-3v94
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed to be either root or ingress. This assumption is bogus since it's valid to create egress qdiscs with major handle ffff: Budimir Markovic found that for qdiscs like DRR that maintain an active class list, it will cause a UAF with a dangling class pointer.
In 066a3b5b2346, the concern was to avoid iterating over the ingress qdisc since its parent is itself. The proper fix is to stop when parent TC_H_ROOT is reached because the only way to retrieve ingress is when a hierarchy which does not contain a ffff: major handle call into qdisc_lookup with TC_H_MAJ(TC_H_ROOT).
In the scenario where major ffff: is an egress qdisc in any of the tree levels, the updates will also propagate to TC_H_ROOT, which then the iteration must stop.
net/sched/sch_api.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
{ affected: [], aliases: [ "CVE-2024-53057", ], database_specific: { cwe_ids: [ "CWE-416", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-11-19T18:15:25Z", severity: "HIGH", }, details: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\n\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\nto be either root or ingress. This assumption is bogus since it's valid\nto create egress qdiscs with major handle ffff:\nBudimir Markovic found that for qdiscs like DRR that maintain an active\nclass list, it will cause a UAF with a dangling class pointer.\n\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\nqdisc since its parent is itself. The proper fix is to stop when parent\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\nhierarchy which does not contain a ffff: major handle call into\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\n\nIn the scenario where major ffff: is an egress qdisc in any of the tree\nlevels, the updates will also propagate to TC_H_ROOT, which then the\niteration must stop.\n\n\n net/sched/sch_api.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)", id: "GHSA-j5vh-vfg7-3v94", modified: "2024-11-22T21:32:13Z", published: "2024-11-19T18:31:06Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-53057", }, { type: "WEB", url: "https://git.kernel.org/stable/c/05df1b1dff8f197f1c275b57ccb2ca33021df552", }, { type: "WEB", url: "https://git.kernel.org/stable/c/2e95c4384438adeaa772caa560244b1a2efef816", }, { type: "WEB", url: "https://git.kernel.org/stable/c/580b3189c1972aff0f993837567d36392e9d981b", }, { type: "WEB", url: "https://git.kernel.org/stable/c/597cf9748c3477bf61bc35f0634129f56764ad24", }, { type: "WEB", url: "https://git.kernel.org/stable/c/9995909615c3431a5304c1210face5f268d24dba", }, { type: "WEB", url: "https://git.kernel.org/stable/c/ce691c814bc7a3c30c220ffb5b7422715458fd9b", }, { type: "WEB", url: "https://git.kernel.org/stable/c/dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20", }, { type: "WEB", url: "https://git.kernel.org/stable/c/e7f9a6f97eb067599a74f3bcb6761976b0ed303e", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
suse-su-2025:0236-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694).\n- CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045).\n- CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE (bsc#1215304).\n- CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148).\n- CVE-2023-52922: can: bcm: Fix UAF in bcm_proc_show() (bsc#1233977).\n- CVE-2024-26976: KVM: Always flush async #PF workqueue when vCPU is being destroyed (bsc#1223635).\n- CVE-2024-35847: irqchip/gic-v3-its: Prevent double free on error (bsc#1224697).\n- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).\n- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).\n- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).\n- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).\n- CVE-2024-47141: pinmux: Use sequential access to access desc->pinmux data (bsc#1235708).\n- CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait for it (bsc#1231453).\n- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).\n- CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).\n- CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).\n- CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).\n- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).\n- CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).\n- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).\n- CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).\n- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).\n- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).\n- CVE-2024-50287: media: v4l2-tpg: prevent the risk of a division by zero (bsc#1233476).\n- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).\n- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).\n- CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid (bsc#1233769).\n- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).\n- CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (bsc#1234834).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).\n- CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (bsc#1234827).\n- CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).\n- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).\n- CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923).\n- CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (bsc#1234971).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).\n- CVE-2024-53224: RDMA/mlx5: Cancel pkey work before destroying device resources (bsc#1235009).\n- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).\n- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).\n- CVE-2024-56531: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (bsc#1235057).\n- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).\n- CVE-2024-56551: drm/amdgpu: fix usage slab after free (bsc#1235075).\n- CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031).\n- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).\n- CVE-2024-56587: leds: class: Protect brightness_show() with led_cdev->led_access mutex (bsc#1235125).\n- CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).\n- CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).\n- CVE-2024-56616: drm/dp_mst: Fix MST sideband message body length check (bsc#1235427).\n- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).\n- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).\n- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).\n- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).\n- CVE-2024-56724: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (bsc#1235577).\n- CVE-2024-56756: nvme-pci: fix freeing of the HMB descriptor table (bsc#1234922).\n- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).\n- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).\n- CVE-2024-57887: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (bsc#1235952).\n- CVE-2024-57888: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416 bsc#1235918).\n- CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964).\n- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).\n \nThe following non-security bugs were fixed:\n\n- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).\n- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).\n- cifs: fix calc signature on big endian systems (bsc#1235888, bsc#1234921).\n- memcg: reduce memcg tree traversals for stats collection (bsc#1231877).\n- mm: memory.stat allow preemption (bsc#1231877).\n- net: marvell: mvpp2: phylink requires the link interrupt (bsc#1117016).\n- smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes).\n- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).\n- udf: Handle error when adding extent to a file (bsc#1234437).\n- udf: refactor udf_current_aext() to handle error (bsc#1234240).\n- udf: refactor udf_next_aext() to handle error (bsc#1234241).\n- workqueue: skip lockdep wq dependency in cancel_work_sync() (bsc#1235918).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-236,SUSE-SLE-HA-12-SP5-2025-236,SUSE-SLE-Live-Patching-12-SP5-2025-236,SUSE-SLE-SERVER-12-SP5-LTSS-2025-236,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-236", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0236-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:0236-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20250236-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:0236-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html", }, { category: "self", summary: "SUSE Bug 1117016", url: "https://bugzilla.suse.com/1117016", }, { category: "self", summary: "SUSE Bug 1168202", url: "https://bugzilla.suse.com/1168202", }, { category: "self", summary: "SUSE Bug 1188924", url: "https://bugzilla.suse.com/1188924", }, { category: "self", summary: "SUSE Bug 1215304", url: "https://bugzilla.suse.com/1215304", }, { category: "self", summary: "SUSE Bug 1220148", url: "https://bugzilla.suse.com/1220148", }, { category: "self", summary: "SUSE Bug 1223635", url: "https://bugzilla.suse.com/1223635", }, { category: "self", summary: "SUSE Bug 1224697", url: "https://bugzilla.suse.com/1224697", }, { category: "self", summary: "SUSE Bug 1225725", url: "https://bugzilla.suse.com/1225725", }, { category: "self", summary: "SUSE Bug 1225730", url: "https://bugzilla.suse.com/1225730", }, { category: "self", summary: "SUSE Bug 1226694", url: "https://bugzilla.suse.com/1226694", }, { category: "self", summary: "SUSE Bug 1226748", url: "https://bugzilla.suse.com/1226748", }, { category: "self", summary: "SUSE Bug 1226872", url: "https://bugzilla.suse.com/1226872", }, { category: "self", summary: "SUSE Bug 1228405", url: "https://bugzilla.suse.com/1228405", }, { category: "self", summary: "SUSE Bug 1230697", url: "https://bugzilla.suse.com/1230697", }, { category: "self", summary: "SUSE Bug 1230766", url: "https://bugzilla.suse.com/1230766", }, { category: "self", summary: "SUSE Bug 1231453", url: "https://bugzilla.suse.com/1231453", }, { category: "self", summary: "SUSE Bug 1231854", url: "https://bugzilla.suse.com/1231854", }, { category: "self", summary: "SUSE Bug 1231877", url: "https://bugzilla.suse.com/1231877", }, { category: "self", summary: "SUSE Bug 1231909", url: "https://bugzilla.suse.com/1231909", }, { category: "self", summary: "SUSE Bug 1232045", url: "https://bugzilla.suse.com/1232045", }, { category: "self", summary: "SUSE Bug 1232048", url: "https://bugzilla.suse.com/1232048", }, { category: "self", summary: "SUSE Bug 1232166", url: "https://bugzilla.suse.com/1232166", }, { category: "self", summary: "SUSE Bug 1232224", url: "https://bugzilla.suse.com/1232224", }, { category: "self", summary: "SUSE Bug 1233038", url: "https://bugzilla.suse.com/1233038", }, { category: "self", summary: "SUSE Bug 1233050", url: "https://bugzilla.suse.com/1233050", }, { category: "self", summary: "SUSE Bug 1233055", url: "https://bugzilla.suse.com/1233055", }, { category: "self", summary: "SUSE Bug 1233096", url: "https://bugzilla.suse.com/1233096", }, { category: "self", summary: "SUSE Bug 1233112", url: "https://bugzilla.suse.com/1233112", }, { category: "self", summary: "SUSE Bug 1233200", url: "https://bugzilla.suse.com/1233200", }, { category: "self", summary: "SUSE Bug 1233204", url: "https://bugzilla.suse.com/1233204", }, { category: "self", summary: "SUSE Bug 1233239", url: "https://bugzilla.suse.com/1233239", }, { category: "self", summary: "SUSE Bug 1233467", url: "https://bugzilla.suse.com/1233467", }, { category: "self", summary: "SUSE Bug 1233469", url: "https://bugzilla.suse.com/1233469", }, { category: "self", summary: "SUSE Bug 1233476", url: "https://bugzilla.suse.com/1233476", }, { category: "self", summary: "SUSE Bug 1233488", url: "https://bugzilla.suse.com/1233488", }, { category: "self", summary: "SUSE Bug 1233551", url: "https://bugzilla.suse.com/1233551", }, { category: "self", summary: "SUSE Bug 1233769", url: "https://bugzilla.suse.com/1233769", }, { category: "self", summary: "SUSE Bug 1233977", url: "https://bugzilla.suse.com/1233977", }, { category: "self", summary: "SUSE Bug 1234087", url: "https://bugzilla.suse.com/1234087", }, { category: "self", summary: "SUSE Bug 1234161", url: "https://bugzilla.suse.com/1234161", }, { category: "self", summary: "SUSE Bug 1234240", url: "https://bugzilla.suse.com/1234240", }, { category: "self", summary: "SUSE Bug 1234241", url: "https://bugzilla.suse.com/1234241", }, { category: "self", summary: "SUSE Bug 1234242", url: "https://bugzilla.suse.com/1234242", }, { category: "self", summary: "SUSE Bug 1234243", url: "https://bugzilla.suse.com/1234243", }, { category: "self", summary: "SUSE Bug 1234281", url: "https://bugzilla.suse.com/1234281", }, { category: "self", summary: "SUSE Bug 1234381", url: "https://bugzilla.suse.com/1234381", }, { category: "self", summary: "SUSE Bug 1234437", url: "https://bugzilla.suse.com/1234437", }, { category: "self", summary: "SUSE Bug 1234690", url: "https://bugzilla.suse.com/1234690", }, { category: "self", summary: "SUSE Bug 1234827", url: "https://bugzilla.suse.com/1234827", }, { category: "self", summary: "SUSE Bug 1234834", url: "https://bugzilla.suse.com/1234834", }, { category: "self", summary: "SUSE Bug 1234846", url: "https://bugzilla.suse.com/1234846", }, { category: "self", summary: "SUSE Bug 1234853", url: "https://bugzilla.suse.com/1234853", }, { category: "self", summary: "SUSE Bug 1234891", url: "https://bugzilla.suse.com/1234891", }, { category: "self", summary: "SUSE Bug 1234898", url: "https://bugzilla.suse.com/1234898", }, { category: "self", summary: "SUSE Bug 1234921", url: "https://bugzilla.suse.com/1234921", }, { category: "self", summary: "SUSE Bug 1234922", url: "https://bugzilla.suse.com/1234922", }, { category: "self", summary: "SUSE Bug 1234923", url: "https://bugzilla.suse.com/1234923", }, { category: "self", summary: "SUSE Bug 1234971", url: "https://bugzilla.suse.com/1234971", }, { category: "self", summary: "SUSE Bug 1235004", url: "https://bugzilla.suse.com/1235004", }, { category: "self", summary: "SUSE Bug 1235009", url: "https://bugzilla.suse.com/1235009", }, { category: "self", summary: "SUSE Bug 1235031", url: "https://bugzilla.suse.com/1235031", }, { category: "self", summary: "SUSE Bug 1235035", url: "https://bugzilla.suse.com/1235035", }, { category: "self", summary: "SUSE Bug 1235054", url: "https://bugzilla.suse.com/1235054", }, { category: "self", summary: "SUSE Bug 1235056", url: "https://bugzilla.suse.com/1235056", }, { category: "self", summary: "SUSE Bug 1235057", url: "https://bugzilla.suse.com/1235057", }, { category: "self", summary: "SUSE Bug 1235061", url: "https://bugzilla.suse.com/1235061", }, { category: "self", summary: "SUSE Bug 1235073", url: "https://bugzilla.suse.com/1235073", }, { category: "self", summary: "SUSE Bug 1235075", url: "https://bugzilla.suse.com/1235075", }, { category: "self", summary: "SUSE Bug 1235125", url: "https://bugzilla.suse.com/1235125", }, { category: "self", summary: "SUSE Bug 1235138", url: "https://bugzilla.suse.com/1235138", }, { category: "self", summary: "SUSE Bug 1235249", url: "https://bugzilla.suse.com/1235249", }, { category: "self", summary: "SUSE Bug 1235415", url: "https://bugzilla.suse.com/1235415", }, { category: "self", summary: "SUSE Bug 1235416", url: "https://bugzilla.suse.com/1235416", }, { category: "self", summary: "SUSE Bug 1235417", url: "https://bugzilla.suse.com/1235417", }, { category: "self", summary: "SUSE Bug 1235427", url: "https://bugzilla.suse.com/1235427", }, { category: "self", summary: "SUSE Bug 1235433", url: "https://bugzilla.suse.com/1235433", }, { category: "self", summary: "SUSE Bug 1235480", url: "https://bugzilla.suse.com/1235480", }, { category: "self", summary: "SUSE Bug 1235577", url: "https://bugzilla.suse.com/1235577", }, { category: "self", summary: "SUSE Bug 1235584", url: "https://bugzilla.suse.com/1235584", }, { category: "self", summary: "SUSE Bug 1235708", url: "https://bugzilla.suse.com/1235708", }, { category: "self", summary: "SUSE Bug 1235759", url: "https://bugzilla.suse.com/1235759", }, { category: "self", summary: "SUSE Bug 1235814", url: "https://bugzilla.suse.com/1235814", }, { category: "self", summary: "SUSE Bug 1235888", url: "https://bugzilla.suse.com/1235888", }, { category: "self", summary: "SUSE Bug 1235918", url: "https://bugzilla.suse.com/1235918", }, { category: "self", summary: "SUSE Bug 1235920", url: "https://bugzilla.suse.com/1235920", }, { category: "self", summary: "SUSE Bug 1235952", url: "https://bugzilla.suse.com/1235952", }, { category: "self", summary: "SUSE Bug 1235964", url: "https://bugzilla.suse.com/1235964", }, { category: "self", summary: "SUSE CVE CVE-2022-48742 page", url: "https://www.suse.com/security/cve/CVE-2022-48742/", }, { category: "self", summary: "SUSE CVE CVE-2022-49033 page", url: "https://www.suse.com/security/cve/CVE-2022-49033/", }, { category: "self", summary: "SUSE CVE CVE-2022-49035 page", url: "https://www.suse.com/security/cve/CVE-2022-49035/", }, { category: "self", summary: "SUSE CVE CVE-2023-52434 page", url: "https://www.suse.com/security/cve/CVE-2023-52434/", }, { category: "self", summary: "SUSE CVE CVE-2023-52922 page", url: "https://www.suse.com/security/cve/CVE-2023-52922/", }, { category: "self", summary: "SUSE CVE CVE-2024-26976 page", url: "https://www.suse.com/security/cve/CVE-2024-26976/", }, { category: "self", summary: "SUSE CVE CVE-2024-35847 page", url: "https://www.suse.com/security/cve/CVE-2024-35847/", }, { category: "self", summary: "SUSE CVE CVE-2024-36484 page", url: "https://www.suse.com/security/cve/CVE-2024-36484/", }, { category: "self", summary: "SUSE CVE CVE-2024-36883 page", url: "https://www.suse.com/security/cve/CVE-2024-36883/", }, { category: "self", summary: "SUSE CVE CVE-2024-36886 page", url: "https://www.suse.com/security/cve/CVE-2024-36886/", }, { category: "self", summary: "SUSE CVE CVE-2024-38589 page", url: "https://www.suse.com/security/cve/CVE-2024-38589/", }, { category: "self", summary: "SUSE CVE CVE-2024-41013 page", url: "https://www.suse.com/security/cve/CVE-2024-41013/", }, { category: "self", summary: "SUSE CVE CVE-2024-46771 page", url: "https://www.suse.com/security/cve/CVE-2024-46771/", }, { category: "self", summary: "SUSE CVE CVE-2024-47141 page", url: "https://www.suse.com/security/cve/CVE-2024-47141/", }, { category: "self", summary: "SUSE CVE CVE-2024-47666 page", url: "https://www.suse.com/security/cve/CVE-2024-47666/", }, { category: "self", summary: "SUSE CVE CVE-2024-47678 page", url: "https://www.suse.com/security/cve/CVE-2024-47678/", }, { category: "self", summary: "SUSE CVE CVE-2024-47709 page", url: "https://www.suse.com/security/cve/CVE-2024-47709/", }, { category: "self", summary: "SUSE CVE CVE-2024-49925 page", url: "https://www.suse.com/security/cve/CVE-2024-49925/", }, { category: "self", summary: "SUSE CVE CVE-2024-49944 page", url: "https://www.suse.com/security/cve/CVE-2024-49944/", }, { category: "self", summary: "SUSE CVE CVE-2024-50039 page", url: "https://www.suse.com/security/cve/CVE-2024-50039/", }, { category: "self", summary: "SUSE CVE CVE-2024-50143 page", url: "https://www.suse.com/security/cve/CVE-2024-50143/", }, { category: "self", summary: "SUSE CVE CVE-2024-50151 page", url: "https://www.suse.com/security/cve/CVE-2024-50151/", }, { category: "self", summary: "SUSE CVE CVE-2024-50166 page", url: "https://www.suse.com/security/cve/CVE-2024-50166/", }, { category: "self", summary: "SUSE CVE CVE-2024-50199 page", url: "https://www.suse.com/security/cve/CVE-2024-50199/", }, { category: "self", summary: "SUSE CVE CVE-2024-50211 page", url: "https://www.suse.com/security/cve/CVE-2024-50211/", }, { category: "self", summary: "SUSE CVE CVE-2024-50228 page", url: "https://www.suse.com/security/cve/CVE-2024-50228/", }, { category: "self", summary: "SUSE CVE CVE-2024-50256 page", url: "https://www.suse.com/security/cve/CVE-2024-50256/", }, { category: "self", summary: "SUSE CVE CVE-2024-50262 page", url: "https://www.suse.com/security/cve/CVE-2024-50262/", }, { category: "self", summary: "SUSE CVE CVE-2024-50278 page", url: "https://www.suse.com/security/cve/CVE-2024-50278/", }, { category: "self", summary: "SUSE CVE CVE-2024-50280 page", url: "https://www.suse.com/security/cve/CVE-2024-50280/", }, { category: "self", summary: "SUSE CVE CVE-2024-50287 page", url: "https://www.suse.com/security/cve/CVE-2024-50287/", }, { category: "self", summary: "SUSE CVE CVE-2024-50299 page", url: "https://www.suse.com/security/cve/CVE-2024-50299/", }, { category: "self", summary: "SUSE CVE CVE-2024-53057 page", url: "https://www.suse.com/security/cve/CVE-2024-53057/", }, { category: "self", summary: "SUSE CVE CVE-2024-53101 page", url: "https://www.suse.com/security/cve/CVE-2024-53101/", }, { category: "self", summary: "SUSE CVE CVE-2024-53112 page", url: "https://www.suse.com/security/cve/CVE-2024-53112/", }, { category: "self", summary: "SUSE CVE CVE-2024-53136 page", url: "https://www.suse.com/security/cve/CVE-2024-53136/", }, { category: "self", summary: "SUSE CVE CVE-2024-53141 page", url: "https://www.suse.com/security/cve/CVE-2024-53141/", }, { category: "self", summary: "SUSE CVE CVE-2024-53144 page", url: "https://www.suse.com/security/cve/CVE-2024-53144/", }, { category: "self", summary: "SUSE CVE CVE-2024-53146 page", url: "https://www.suse.com/security/cve/CVE-2024-53146/", }, { category: "self", summary: "SUSE CVE CVE-2024-53150 page", url: "https://www.suse.com/security/cve/CVE-2024-53150/", }, { category: "self", summary: "SUSE CVE CVE-2024-53156 page", url: "https://www.suse.com/security/cve/CVE-2024-53156/", }, { category: "self", summary: "SUSE CVE CVE-2024-53157 page", url: "https://www.suse.com/security/cve/CVE-2024-53157/", }, { category: "self", summary: "SUSE CVE CVE-2024-53172 page", url: "https://www.suse.com/security/cve/CVE-2024-53172/", }, { category: "self", summary: "SUSE CVE CVE-2024-53173 page", url: "https://www.suse.com/security/cve/CVE-2024-53173/", }, { category: "self", summary: "SUSE CVE CVE-2024-53179 page", url: "https://www.suse.com/security/cve/CVE-2024-53179/", }, { category: "self", summary: "SUSE CVE CVE-2024-53198 page", url: "https://www.suse.com/security/cve/CVE-2024-53198/", }, { category: "self", summary: "SUSE CVE CVE-2024-53210 page", url: "https://www.suse.com/security/cve/CVE-2024-53210/", }, { category: "self", summary: "SUSE CVE CVE-2024-53214 page", url: "https://www.suse.com/security/cve/CVE-2024-53214/", }, { category: "self", summary: "SUSE CVE CVE-2024-53224 page", url: "https://www.suse.com/security/cve/CVE-2024-53224/", }, { category: "self", summary: "SUSE CVE CVE-2024-53239 page", url: "https://www.suse.com/security/cve/CVE-2024-53239/", }, { category: "self", summary: "SUSE CVE CVE-2024-53240 page", url: "https://www.suse.com/security/cve/CVE-2024-53240/", }, { category: "self", summary: "SUSE CVE CVE-2024-56531 page", url: "https://www.suse.com/security/cve/CVE-2024-56531/", }, { category: "self", summary: "SUSE CVE CVE-2024-56548 page", url: "https://www.suse.com/security/cve/CVE-2024-56548/", }, { category: "self", summary: "SUSE CVE CVE-2024-56551 page", url: "https://www.suse.com/security/cve/CVE-2024-56551/", }, { category: "self", summary: "SUSE CVE CVE-2024-56569 page", url: "https://www.suse.com/security/cve/CVE-2024-56569/", }, { category: "self", summary: "SUSE CVE CVE-2024-56570 page", url: "https://www.suse.com/security/cve/CVE-2024-56570/", }, { category: "self", summary: "SUSE CVE CVE-2024-56587 page", url: "https://www.suse.com/security/cve/CVE-2024-56587/", }, { category: "self", summary: "SUSE CVE CVE-2024-56599 page", url: "https://www.suse.com/security/cve/CVE-2024-56599/", }, { category: "self", summary: "SUSE CVE CVE-2024-5660 page", url: "https://www.suse.com/security/cve/CVE-2024-5660/", }, { category: "self", summary: "SUSE CVE CVE-2024-56603 page", url: "https://www.suse.com/security/cve/CVE-2024-56603/", }, { category: "self", summary: "SUSE CVE CVE-2024-56604 page", url: "https://www.suse.com/security/cve/CVE-2024-56604/", }, { category: "self", summary: "SUSE CVE CVE-2024-56605 page", url: "https://www.suse.com/security/cve/CVE-2024-56605/", }, { category: "self", summary: "SUSE CVE CVE-2024-56606 page", url: "https://www.suse.com/security/cve/CVE-2024-56606/", }, { category: "self", summary: "SUSE CVE CVE-2024-56616 page", url: "https://www.suse.com/security/cve/CVE-2024-56616/", }, { category: "self", summary: "SUSE CVE CVE-2024-56631 page", url: "https://www.suse.com/security/cve/CVE-2024-56631/", }, { category: "self", summary: "SUSE CVE CVE-2024-56642 page", url: "https://www.suse.com/security/cve/CVE-2024-56642/", }, { category: "self", summary: "SUSE CVE CVE-2024-56664 page", url: "https://www.suse.com/security/cve/CVE-2024-56664/", }, { category: "self", summary: "SUSE CVE CVE-2024-56704 page", url: "https://www.suse.com/security/cve/CVE-2024-56704/", }, { category: "self", summary: "SUSE CVE CVE-2024-56724 page", url: "https://www.suse.com/security/cve/CVE-2024-56724/", }, { category: "self", summary: "SUSE CVE CVE-2024-56756 page", url: "https://www.suse.com/security/cve/CVE-2024-56756/", }, { category: "self", summary: "SUSE CVE CVE-2024-57791 page", url: "https://www.suse.com/security/cve/CVE-2024-57791/", }, { category: "self", summary: "SUSE CVE CVE-2024-57849 page", url: "https://www.suse.com/security/cve/CVE-2024-57849/", }, { category: "self", summary: "SUSE CVE CVE-2024-57887 page", url: "https://www.suse.com/security/cve/CVE-2024-57887/", }, { category: "self", summary: "SUSE CVE CVE-2024-57888 page", url: "https://www.suse.com/security/cve/CVE-2024-57888/", }, { category: "self", summary: "SUSE CVE CVE-2024-57892 page", url: "https://www.suse.com/security/cve/CVE-2024-57892/", }, { category: "self", summary: "SUSE CVE CVE-2024-57893 page", url: "https://www.suse.com/security/cve/CVE-2024-57893/", }, { category: "self", summary: "SUSE CVE CVE-2024-8805 page", url: "https://www.suse.com/security/cve/CVE-2024-8805/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2025-01-24T17:02:35Z", generator: { date: "2025-01-24T17:02:35Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:0236-1", initial_release_date: "2025-01-24T17:02:35Z", revision_history: [ { date: "2025-01-24T17:02:35Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.244.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-122.244.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.244.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-122.244.1.aarch64", product_id: "dlm-kmp-default-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.244.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-122.244.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.244.1.aarch64", product: { name: "kernel-default-4.12.14-122.244.1.aarch64", product_id: "kernel-default-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.244.1.aarch64", product: { name: "kernel-default-base-4.12.14-122.244.1.aarch64", product_id: "kernel-default-base-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.244.1.aarch64", product: { name: "kernel-default-devel-4.12.14-122.244.1.aarch64", product_id: "kernel-default-devel-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.244.1.aarch64", product: { name: "kernel-default-extra-4.12.14-122.244.1.aarch64", product_id: "kernel-default-extra-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.244.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-122.244.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.244.1.aarch64", product: { name: "kernel-obs-build-4.12.14-122.244.1.aarch64", product_id: "kernel-obs-build-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.244.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-122.244.1.aarch64", product_id: "kernel-obs-qa-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.244.1.aarch64", product: { name: "kernel-syms-4.12.14-122.244.1.aarch64", product_id: "kernel-syms-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.244.1.aarch64", product: { name: "kernel-vanilla-4.12.14-122.244.1.aarch64", product_id: "kernel-vanilla-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.244.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-122.244.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.244.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-122.244.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.244.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-122.244.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-122.244.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.244.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-122.244.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-122.244.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-122.244.1.noarch", product: { name: "kernel-devel-4.12.14-122.244.1.noarch", product_id: "kernel-devel-4.12.14-122.244.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-122.244.1.noarch", product: { name: "kernel-docs-4.12.14-122.244.1.noarch", product_id: "kernel-docs-4.12.14-122.244.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-122.244.1.noarch", product: { name: "kernel-docs-html-4.12.14-122.244.1.noarch", product_id: "kernel-docs-html-4.12.14-122.244.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-122.244.1.noarch", product: { name: "kernel-macros-4.12.14-122.244.1.noarch", product_id: "kernel-macros-4.12.14-122.244.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-122.244.1.noarch", product: { name: "kernel-source-4.12.14-122.244.1.noarch", product_id: "kernel-source-4.12.14-122.244.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-122.244.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-122.244.1.noarch", product_id: "kernel-source-vanilla-4.12.14-122.244.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.244.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-122.244.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.244.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-122.244.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.244.1.ppc64le", product: { name: "kernel-debug-4.12.14-122.244.1.ppc64le", product_id: "kernel-debug-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.244.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-122.244.1.ppc64le", product_id: "kernel-debug-base-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.244.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-122.244.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.244.1.ppc64le", product: { name: "kernel-default-4.12.14-122.244.1.ppc64le", product_id: "kernel-default-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.244.1.ppc64le", product: { name: "kernel-default-base-4.12.14-122.244.1.ppc64le", product_id: "kernel-default-base-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.244.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-122.244.1.ppc64le", product_id: "kernel-default-devel-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.244.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-122.244.1.ppc64le", product_id: "kernel-default-extra-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.244.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-122.244.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.244.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-122.244.1.ppc64le", product_id: "kernel-obs-build-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.244.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-122.244.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.244.1.ppc64le", product: { name: "kernel-syms-4.12.14-122.244.1.ppc64le", product_id: "kernel-syms-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.244.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-122.244.1.ppc64le", product_id: "kernel-vanilla-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.244.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-122.244.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.244.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-122.244.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", product: { name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", product_id: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.244.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-122.244.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-122.244.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.244.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-122.244.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.244.1.s390x", product: { name: "dlm-kmp-default-4.12.14-122.244.1.s390x", product_id: "dlm-kmp-default-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.244.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-122.244.1.s390x", product_id: "gfs2-kmp-default-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.244.1.s390x", product: { name: "kernel-default-4.12.14-122.244.1.s390x", product_id: "kernel-default-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.244.1.s390x", product: { name: "kernel-default-base-4.12.14-122.244.1.s390x", product_id: "kernel-default-base-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.244.1.s390x", product: { name: "kernel-default-devel-4.12.14-122.244.1.s390x", product_id: "kernel-default-devel-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.244.1.s390x", product: { name: "kernel-default-extra-4.12.14-122.244.1.s390x", product_id: "kernel-default-extra-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.244.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-122.244.1.s390x", product_id: "kernel-default-kgraft-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-122.244.1.s390x", product: { name: "kernel-default-man-4.12.14-122.244.1.s390x", product_id: "kernel-default-man-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.244.1.s390x", product: { name: "kernel-obs-build-4.12.14-122.244.1.s390x", product_id: "kernel-obs-build-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.244.1.s390x", product: { name: "kernel-obs-qa-4.12.14-122.244.1.s390x", product_id: "kernel-obs-qa-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.244.1.s390x", product: { name: "kernel-syms-4.12.14-122.244.1.s390x", product_id: "kernel-syms-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.244.1.s390x", product: { name: "kernel-vanilla-4.12.14-122.244.1.s390x", product_id: "kernel-vanilla-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.244.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-122.244.1.s390x", product_id: "kernel-vanilla-base-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.244.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-122.244.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-122.244.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-122.244.1.s390x", product_id: "kernel-zfcpdump-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-122.244.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-122.244.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", product: { name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", product_id: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.244.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-122.244.1.s390x", product_id: "kselftests-kmp-default-4.12.14-122.244.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.244.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-122.244.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-122.244.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.244.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-122.244.1.x86_64", product_id: "dlm-kmp-default-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.244.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-122.244.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.244.1.x86_64", product: { name: "kernel-debug-4.12.14-122.244.1.x86_64", product_id: "kernel-debug-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.244.1.x86_64", product: { name: "kernel-debug-base-4.12.14-122.244.1.x86_64", product_id: "kernel-debug-base-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.244.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-122.244.1.x86_64", product_id: "kernel-debug-devel-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.244.1.x86_64", product: { name: "kernel-default-4.12.14-122.244.1.x86_64", product_id: "kernel-default-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.244.1.x86_64", product: { name: "kernel-default-base-4.12.14-122.244.1.x86_64", product_id: "kernel-default-base-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.244.1.x86_64", product: { name: "kernel-default-devel-4.12.14-122.244.1.x86_64", product_id: "kernel-default-devel-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.244.1.x86_64", product: { name: "kernel-default-extra-4.12.14-122.244.1.x86_64", product_id: "kernel-default-extra-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.244.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-122.244.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-122.244.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-122.244.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-122.244.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-122.244.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-122.244.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-122.244.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.244.1.x86_64", product: { name: "kernel-obs-build-4.12.14-122.244.1.x86_64", product_id: "kernel-obs-build-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.244.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-122.244.1.x86_64", product_id: "kernel-obs-qa-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.244.1.x86_64", product: { name: "kernel-syms-4.12.14-122.244.1.x86_64", product_id: "kernel-syms-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.244.1.x86_64", product: { name: "kernel-vanilla-4.12.14-122.244.1.x86_64", product_id: "kernel-vanilla-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.244.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-122.244.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.244.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-122.244.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", product: { name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", product_id: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.244.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-122.244.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-122.244.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP5", product: { name: "SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product: { name: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss-extended-security:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", }, product_reference: "kernel-default-kgraft-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", }, product_reference: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", }, product_reference: "kernel-default-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.244.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.244.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.244.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.244.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.244.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", }, product_reference: "kernel-source-4.12.14-122.244.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.244.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.244.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.244.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.244.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-122.244.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.244.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.244.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.244.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.244.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.244.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", }, product_reference: "kernel-source-4.12.14-122.244.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", product_id: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.244.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2022-48742", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-48742", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nrtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()\n\nWhile looking at one unrelated syzbot bug, I found the replay logic\nin __rtnl_newlink() to potentially trigger use-after-free.\n\nIt is better to clear master_dev and m_ops inside the loop,\nin case we have to replay it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-48742", url: "https://www.suse.com/security/cve/CVE-2022-48742", }, { category: "external", summary: "SUSE Bug 1226694 for CVE-2022-48742", url: "https://bugzilla.suse.com/1226694", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2022-48742", }, { cve: "CVE-2022-49033", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-49033", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit()\n\nSyzkaller reported BUG as follows:\n\n BUG: sleeping function called from invalid context at\n include/linux/sched/mm.h:274\n Call Trace:\n <TASK>\n dump_stack_lvl+0xcd/0x134\n __might_resched.cold+0x222/0x26b\n kmem_cache_alloc+0x2e7/0x3c0\n update_qgroup_limit_item+0xe1/0x390\n btrfs_qgroup_inherit+0x147b/0x1ee0\n create_subvol+0x4eb/0x1710\n btrfs_mksubvol+0xfe5/0x13f0\n __btrfs_ioctl_snap_create+0x2b0/0x430\n btrfs_ioctl_snap_create_v2+0x25a/0x520\n btrfs_ioctl+0x2a1c/0x5ce0\n __x64_sys_ioctl+0x193/0x200\n do_syscall_64+0x35/0x80\n\nFix this by calling qgroup_dirty() on @dstqgroup, and update limit item in\nbtrfs_run_qgroups() later outside of the spinlock context.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-49033", url: "https://www.suse.com/security/cve/CVE-2022-49033", }, { category: "external", summary: "SUSE Bug 1232045 for CVE-2022-49033", url: "https://bugzilla.suse.com/1232045", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2022-49033", }, { cve: "CVE-2022-49035", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-49035", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE\n\nI expect that the hardware will have limited this to 16, but just in\ncase it hasn't, check for this corner case.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-49035", url: "https://www.suse.com/security/cve/CVE-2022-49035", }, { category: "external", summary: "SUSE Bug 1215304 for CVE-2022-49035", url: "https://bugzilla.suse.com/1215304", }, { category: "external", summary: "SUSE Bug 1235013 for CVE-2022-49035", url: "https://bugzilla.suse.com/1235013", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2022-49035", }, { cve: "CVE-2023-52434", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52434", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential OOBs in smb2_parse_contexts()\n\nValidate offsets and lengths before dereferencing create contexts in\nsmb2_parse_contexts().\n\nThis fixes following oops when accessing invalid create contexts from\nserver:\n\n BUG: unable to handle page fault for address: ffff8881178d8cc3\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 4a01067 P4D 4a01067 PUD 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\n RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs]\n Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00\n 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7\n 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00\n RSP: 0018:ffffc900007939e0 EFLAGS: 00010216\n RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90\n RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000\n RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000\n R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000\n R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22\n FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000)\n knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0\n PKRU: 55555554\n Call Trace:\n <TASK>\n ? __die+0x23/0x70\n ? page_fault_oops+0x181/0x480\n ? search_module_extables+0x19/0x60\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? exc_page_fault+0x1b6/0x1c0\n ? asm_exc_page_fault+0x26/0x30\n ? smb2_parse_contexts+0xa0/0x3a0 [cifs]\n SMB2_open+0x38d/0x5f0 [cifs]\n ? smb2_is_path_accessible+0x138/0x260 [cifs]\n smb2_is_path_accessible+0x138/0x260 [cifs]\n cifs_is_path_remote+0x8d/0x230 [cifs]\n cifs_mount+0x7e/0x350 [cifs]\n cifs_smb3_do_mount+0x128/0x780 [cifs]\n smb3_get_tree+0xd9/0x290 [cifs]\n vfs_get_tree+0x2c/0x100\n ? capable+0x37/0x70\n path_mount+0x2d7/0xb80\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? _raw_spin_unlock_irqrestore+0x44/0x60\n __x64_sys_mount+0x11a/0x150\n do_syscall_64+0x47/0xf0\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n RIP: 0033:0x7f8737657b1e", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52434", url: "https://www.suse.com/security/cve/CVE-2023-52434", }, { category: "external", summary: "SUSE Bug 1220148 for CVE-2023-52434", url: "https://bugzilla.suse.com/1220148", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2023-52434", }, { cve: "CVE-2023-52922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-52922", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Fix UAF in bcm_proc_show()\n\nBUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80\nRead of size 8 at addr ffff888155846230 by task cat/7862\n\nCPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0xd5/0x150\n print_report+0xc1/0x5e0\n kasan_report+0xba/0xf0\n bcm_proc_show+0x969/0xa80\n seq_read_iter+0x4f6/0x1260\n seq_read+0x165/0x210\n proc_reg_read+0x227/0x300\n vfs_read+0x1d5/0x8d0\n ksys_read+0x11e/0x240\n do_syscall_64+0x35/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAllocated by task 7846:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x9e/0xa0\n bcm_sendmsg+0x264b/0x44e0\n sock_sendmsg+0xda/0x180\n ____sys_sendmsg+0x735/0x920\n ___sys_sendmsg+0x11d/0x1b0\n __sys_sendmsg+0xfa/0x1d0\n do_syscall_64+0x35/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nFreed by task 7846:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n ____kasan_slab_free+0x161/0x1c0\n slab_free_freelist_hook+0x119/0x220\n __kmem_cache_free+0xb4/0x2e0\n rcu_core+0x809/0x1bd0\n\nbcm_op is freed before procfs entry be removed in bcm_release(),\nthis lead to bcm_proc_show() may read the freed bcm_op.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-52922", url: "https://www.suse.com/security/cve/CVE-2023-52922", }, { category: "external", summary: "SUSE Bug 1233977 for CVE-2023-52922", url: "https://bugzilla.suse.com/1233977", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2023-52922", }, { cve: "CVE-2024-26976", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26976", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Always flush async #PF workqueue when vCPU is being destroyed\n\nAlways flush the per-vCPU async #PF workqueue when a vCPU is clearing its\ncompletion queue, e.g. when a VM and all its vCPUs is being destroyed.\nKVM must ensure that none of its workqueue callbacks is running when the\nlast reference to the KVM _module_ is put. Gifting a reference to the\nassociated VM prevents the workqueue callback from dereferencing freed\nvCPU/VM memory, but does not prevent the KVM module from being unloaded\nbefore the callback completes.\n\nDrop the misguided VM refcount gifting, as calling kvm_put_kvm() from\nasync_pf_execute() if kvm_put_kvm() flushes the async #PF workqueue will\nresult in deadlock. async_pf_execute() can't return until kvm_put_kvm()\nfinishes, and kvm_put_kvm() can't return until async_pf_execute() finishes:\n\n WARNING: CPU: 8 PID: 251 at virt/kvm/kvm_main.c:1435 kvm_put_kvm+0x2d/0x320 [kvm]\n Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel kvm irqbypass\n CPU: 8 PID: 251 Comm: kworker/8:1 Tainted: G W 6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Workqueue: events async_pf_execute [kvm]\n RIP: 0010:kvm_put_kvm+0x2d/0x320 [kvm]\n Call Trace:\n <TASK>\n async_pf_execute+0x198/0x260 [kvm]\n process_one_work+0x145/0x2d0\n worker_thread+0x27e/0x3a0\n kthread+0xba/0xe0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x11/0x20\n </TASK>\n ---[ end trace 0000000000000000 ]---\n INFO: task kworker/8:1:251 blocked for more than 120 seconds.\n Tainted: G W 6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/8:1 state:D stack:0 pid:251 ppid:2 flags:0x00004000\n Workqueue: events async_pf_execute [kvm]\n Call Trace:\n <TASK>\n __schedule+0x33f/0xa40\n schedule+0x53/0xc0\n schedule_timeout+0x12a/0x140\n __wait_for_common+0x8d/0x1d0\n __flush_work.isra.0+0x19f/0x2c0\n kvm_clear_async_pf_completion_queue+0x129/0x190 [kvm]\n kvm_arch_destroy_vm+0x78/0x1b0 [kvm]\n kvm_put_kvm+0x1c1/0x320 [kvm]\n async_pf_execute+0x198/0x260 [kvm]\n process_one_work+0x145/0x2d0\n worker_thread+0x27e/0x3a0\n kthread+0xba/0xe0\n ret_from_fork+0x2d/0x50\n ret_from_fork_asm+0x11/0x20\n </TASK>\n\nIf kvm_clear_async_pf_completion_queue() actually flushes the workqueue,\nthen there's no need to gift async_pf_execute() a reference because all\ninvocations of async_pf_execute() will be forced to complete before the\nvCPU and its VM are destroyed/freed. And that in turn fixes the module\nunloading bug as __fput() won't do module_put() on the last vCPU reference\nuntil the vCPU has been freed, e.g. if closing the vCPU file also puts the\nlast reference to the KVM module.\n\nNote that kvm_check_async_pf_completion() may also take the work item off\nthe completion queue and so also needs to flush the work queue, as the\nwork will not be seen by kvm_clear_async_pf_completion_queue(). Waiting\non the workqueue could theoretically delay a vCPU due to waiting for the\nwork to complete, but that's a very, very small chance, and likely a very\nsmall delay. kvm_arch_async_page_present_queued() unconditionally makes a\nnew request, i.e. will effectively delay entering the guest, so the\nremaining work is really just:\n\n trace_kvm_async_pf_completed(addr, cr2_or_gpa);\n\n __kvm_vcpu_wake_up(vcpu);\n\n mmput(mm);\n\nand mmput() can't drop the last reference to the page tables if the vCPU is\nstill alive, i.e. the vCPU won't get stuck tearing down page tables.\n\nAdd a helper to do the flushing, specifically to deal with \"wakeup all\"\nwork items, as they aren't actually work items, i.e. are never placed in a\nworkqueue. Trying to flush a bogus workqueue entry rightly makes\n__flush_work() complain (kudos to whoever added that sanity check).\n\nNote, commit 5f6de5cbebee (\"KVM: Prevent module exit until al\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26976", url: "https://www.suse.com/security/cve/CVE-2024-26976", }, { category: "external", summary: "SUSE Bug 1223635 for CVE-2024-26976", url: "https://bugzilla.suse.com/1223635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-26976", }, { cve: "CVE-2024-35847", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-35847", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Prevent double free on error\n\nThe error handling path in its_vpe_irq_domain_alloc() causes a double free\nwhen its_vpe_init() fails after successfully allocating at least one\ninterrupt. This happens because its_vpe_irq_domain_free() frees the\ninterrupts along with the area bitmap and the vprop_page and\nits_vpe_irq_domain_alloc() subsequently frees the area bitmap and the\nvprop_page again.\n\nFix this by unconditionally invoking its_vpe_irq_domain_free() which\nhandles all cases correctly and by removing the bitmap/vprop_page freeing\nfrom its_vpe_irq_domain_alloc().\n\n[ tglx: Massaged change log ]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-35847", url: "https://www.suse.com/security/cve/CVE-2024-35847", }, { category: "external", summary: "SUSE Bug 1224697 for CVE-2024-35847", url: "https://bugzilla.suse.com/1224697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-35847", }, { cve: "CVE-2024-36484", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36484", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: relax socket state check at accept time.\n\nChristoph reported the following splat:\n\nWARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0\nModules linked in:\nCPU: 1 PID: 772 Comm: syz-executor510 Not tainted 6.9.0-rc7-g7da7119fe22b #56\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014\nRIP: 0010:__inet_accept+0x1f4/0x4a0 net/ipv4/af_inet.c:759\nCode: 04 38 84 c0 0f 85 87 00 00 00 41 c7 04 24 03 00 00 00 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ec b7 da fd <0f> 0b e9 7f fe ff ff e8 e0 b7 da fd 0f 0b e9 fe fe ff ff 89 d9 80\nRSP: 0018:ffffc90000c2fc58 EFLAGS: 00010293\nRAX: ffffffff836bdd14 RBX: 0000000000000000 RCX: ffff888104668000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: dffffc0000000000 R08: ffffffff836bdb89 R09: fffff52000185f64\nR10: dffffc0000000000 R11: fffff52000185f64 R12: dffffc0000000000\nR13: 1ffff92000185f98 R14: ffff88810754d880 R15: ffff8881007b7800\nFS: 000000001c772880(0000) GS:ffff88811b280000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fb9fcf2e178 CR3: 00000001045d2002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n inet_accept+0x138/0x1d0 net/ipv4/af_inet.c:786\n do_accept+0x435/0x620 net/socket.c:1929\n __sys_accept4_file net/socket.c:1969 [inline]\n __sys_accept4+0x9b/0x110 net/socket.c:1999\n __do_sys_accept net/socket.c:2016 [inline]\n __se_sys_accept net/socket.c:2013 [inline]\n __x64_sys_accept+0x7d/0x90 net/socket.c:2013\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x58/0x100 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x4315f9\nCode: fd ff 48 81 c4 80 00 00 00 e9 f1 fe ff ff 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 ab b4 fd ff c3 66 2e 0f 1f 84 00 00 00 00\nRSP: 002b:00007ffdb26d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b\nRAX: ffffffffffffffda RBX: 0000000000400300 RCX: 00000000004315f9\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004\nRBP: 00000000006e1018 R08: 0000000000400300 R09: 0000000000400300\nR10: 0000000000400300 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000040cdf0 R14: 000000000040ce80 R15: 0000000000000055\n </TASK>\n\nThe reproducer invokes shutdown() before entering the listener status.\nAfter commit 94062790aedb (\"tcp: defer shutdown(SEND_SHUTDOWN) for\nTCP_SYN_RECV sockets\"), the above causes the child to reach the accept\nsyscall in FIN_WAIT1 status.\n\nEric noted we can relax the existing assertion in __inet_accept()", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36484", url: "https://www.suse.com/security/cve/CVE-2024-36484", }, { category: "external", summary: "SUSE Bug 1226872 for CVE-2024-36484", url: "https://bugzilla.suse.com/1226872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "low", }, ], title: "CVE-2024-36484", }, { cve: "CVE-2024-36883", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36883", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix out-of-bounds access in ops_init\n\nnet_alloc_generic is called by net_alloc, which is called without any\nlocking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It\nis read twice, first to allocate an array, then to set s.len, which is\nlater used to limit the bounds of the array access.\n\nIt is possible that the array is allocated and another thread is\nregistering a new pernet ops, increments max_gen_ptrs, which is then used\nto set s.len with a larger than allocated length for the variable array.\n\nFix it by reading max_gen_ptrs only once in net_alloc_generic. If\nmax_gen_ptrs is later incremented, it will be caught in net_assign_generic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36883", url: "https://www.suse.com/security/cve/CVE-2024-36883", }, { category: "external", summary: "SUSE Bug 1225725 for CVE-2024-36883", url: "https://bugzilla.suse.com/1225725", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-36883", }, { cve: "CVE-2024-36886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-36886", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix UAF in error path\n\nSam Page (sam4k) working with Trend Micro Zero Day Initiative reported\na UAF in the tipc_buf_append() error path:\n\nBUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0\nlinux/net/core/skbuff.c:1183\nRead of size 8 at addr ffff88804d2a7c80 by task poc/8034\n\nCPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.0-debian-1.16.0-5 04/01/2014\nCall Trace:\n <IRQ>\n __dump_stack linux/lib/dump_stack.c:88\n dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106\n print_address_description linux/mm/kasan/report.c:377\n print_report+0xc4/0x620 linux/mm/kasan/report.c:488\n kasan_report+0xda/0x110 linux/mm/kasan/report.c:601\n kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183\n skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026\n skb_release_all linux/net/core/skbuff.c:1094\n __kfree_skb linux/net/core/skbuff.c:1108\n kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144\n kfree_skb linux/./include/linux/skbuff.h:1244\n tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186\n tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324\n tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824\n tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159\n tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390\n udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108\n udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186\n udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346\n __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422\n ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254\n dst_input linux/./include/net/dst.h:461\n ip_rcv_finish linux/net/ipv4/ip_input.c:449\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534\n __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648\n process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976\n __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576\n napi_poll linux/net/core/dev.c:6645\n net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781\n __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553\n do_softirq linux/kernel/softirq.c:454\n do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441\n </IRQ>\n <TASK>\n __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381\n local_bh_enable linux/./include/linux/bottom_half.h:33\n rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851\n __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378\n dev_queue_xmit linux/./include/linux/netdevice.h:3169\n neigh_hh_output linux/./include/net/neighbour.h:526\n neigh_output linux/./include/net/neighbour.h:540\n ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235\n __ip_finish_output linux/net/ipv4/ip_output.c:313\n __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323\n NF_HOOK_COND linux/./include/linux/netfilter.h:303\n ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433\n dst_output linux/./include/net/dst.h:451\n ip_local_out linux/net/ipv4/ip_output.c:129\n ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492\n udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963\n udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250\n inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850\n sock_sendmsg_nosec linux/net/socket.c:730\n __sock_sendmsg linux/net/socket.c:745\n __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191\n __do_sys_sendto linux/net/socket.c:2203\n __se_sys_sendto linux/net/socket.c:2199\n __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199\n do_syscall_x64 linux/arch/x86/entry/common.c:52\n do_syscall_\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-36886", url: "https://www.suse.com/security/cve/CVE-2024-36886", }, { category: "external", summary: "SUSE Bug 1225730 for CVE-2024-36886", url: "https://bugzilla.suse.com/1225730", }, { category: "external", summary: "SUSE Bug 1225742 for CVE-2024-36886", url: "https://bugzilla.suse.com/1225742", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-36886", }, { cve: "CVE-2024-38589", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-38589", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: fix possible dead-lock in nr_rt_ioctl()\n\nsyzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1]\n\nMake sure we always acquire nr_node_list_lock before nr_node_lock(nr_node)\n\n[1]\nWARNING: possible circular locking dependency detected\n6.9.0-rc7-syzkaller-02147-g654de42f3fc6 #0 Not tainted\n------------------------------------------------------\nsyz-executor350/5129 is trying to acquire lock:\n ffff8880186e2070 (&nr_node->node_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]\n ffff8880186e2070 (&nr_node->node_lock){+...}-{2:2}, at: nr_node_lock include/net/netrom.h:152 [inline]\n ffff8880186e2070 (&nr_node->node_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:464 [inline]\n ffff8880186e2070 (&nr_node->node_lock){+...}-{2:2}, at: nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697\n\nbut task is already holding lock:\n ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]\n ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]\n ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_rt_ioctl+0x10a/0x1090 net/netrom/nr_route.c:697\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #1 (nr_node_list_lock){+...}-{2:2}:\n lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754\n __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]\n _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178\n spin_lock_bh include/linux/spinlock.h:356 [inline]\n nr_remove_node net/netrom/nr_route.c:299 [inline]\n nr_del_node+0x4b4/0x820 net/netrom/nr_route.c:355\n nr_rt_ioctl+0xa95/0x1090 net/netrom/nr_route.c:683\n sock_do_ioctl+0x158/0x460 net/socket.c:1222\n sock_ioctl+0x629/0x8e0 net/socket.c:1341\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\n-> #0 (&nr_node->node_lock){+...}-{2:2}:\n check_prev_add kernel/locking/lockdep.c:3134 [inline]\n check_prevs_add kernel/locking/lockdep.c:3253 [inline]\n validate_chain+0x18cb/0x58e0 kernel/locking/lockdep.c:3869\n __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137\n lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754\n __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]\n _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178\n spin_lock_bh include/linux/spinlock.h:356 [inline]\n nr_node_lock include/net/netrom.h:152 [inline]\n nr_dec_obs net/netrom/nr_route.c:464 [inline]\n nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697\n sock_do_ioctl+0x158/0x460 net/socket.c:1222\n sock_ioctl+0x629/0x8e0 net/socket.c:1341\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:904 [inline]\n __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(nr_node_list_lock);\n lock(&nr_node->node_lock);\n lock(nr_node_list_lock);\n lock(&nr_node->node_lock);\n\n *** DEADLOCK ***\n\n1 lock held by syz-executor350/5129:\n #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]\n #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]\n #0: ffffffff8f70\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-38589", url: "https://www.suse.com/security/cve/CVE-2024-38589", }, { category: "external", summary: "SUSE Bug 1226748 for CVE-2024-38589", url: "https://bugzilla.suse.com/1226748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-38589", }, { cve: "CVE-2024-41013", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-41013", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don't walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don't stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup->length to dup->length-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-41013", url: "https://www.suse.com/security/cve/CVE-2024-41013", }, { category: "external", summary: "SUSE Bug 1228405 for CVE-2024-41013", url: "https://bugzilla.suse.com/1228405", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "low", }, ], title: "CVE-2024-41013", }, { cve: "CVE-2024-46771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-46771", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Remove proc entry when dev is unregistered.\n\nsyzkaller reported a warning in bcm_connect() below. [0]\n\nThe repro calls connect() to vxcan1, removes vxcan1, and calls\nconnect() with ifindex == 0.\n\nCalling connect() for a BCM socket allocates a proc entry.\nThen, bcm_sk(sk)->bound is set to 1 to prevent further connect().\n\nHowever, removing the bound device resets bcm_sk(sk)->bound to 0\nin bcm_notify().\n\nThe 2nd connect() tries to allocate a proc entry with the same\nname and sets NULL to bcm_sk(sk)->bcm_proc_read, leaking the\noriginal proc entry.\n\nSince the proc entry is available only for connect()ed sockets,\nlet's clean up the entry when the bound netdev is unregistered.\n\n[0]:\nproc_dir_entry 'can-bcm/2456' already registered\nWARNING: CPU: 1 PID: 394 at fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375\nModules linked in:\nCPU: 1 PID: 394 Comm: syz-executor403 Not tainted 6.10.0-rc7-g852e42cc2dd4\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375\nCode: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48\nRSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246\nRAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002\nRBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0\nR10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec\nFS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220\n bcm_connect+0x472/0x840 net/can/bcm.c:1673\n __sys_connect_file net/socket.c:2049 [inline]\n __sys_connect+0x5d2/0x690 net/socket.c:2066\n __do_sys_connect net/socket.c:2076 [inline]\n __se_sys_connect net/socket.c:2073 [inline]\n __x64_sys_connect+0x8f/0x100 net/socket.c:2073\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fbd708b0e5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d\nRDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003\nRBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040\nR10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098\nR13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000\n </TASK>\nremove_proc_entry: removing non-empty directory 'net/can-bcm', leaking at least '2456'", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-46771", url: "https://www.suse.com/security/cve/CVE-2024-46771", }, { category: "external", summary: "SUSE Bug 1230766 for CVE-2024-46771", url: "https://bugzilla.suse.com/1230766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-46771", }, { cve: "CVE-2024-47141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-47141", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\npinmux: Use sequential access to access desc->pinmux data\n\nWhen two client of the same gpio call pinctrl_select_state() for the\nsame functionality, we are seeing NULL pointer issue while accessing\ndesc->mux_owner.\n\nLet's say two processes A, B executing in pin_request() for the same pin\nand process A updates the desc->mux_usecount but not yet updated the\ndesc->mux_owner while process B see the desc->mux_usecount which got\nupdated by A path and further executes strcmp and while accessing\ndesc->mux_owner it crashes with NULL pointer.\n\nSerialize the access to mux related setting with a mutex lock.\n\n\tcpu0 (process A)\t\t\tcpu1(process B)\n\npinctrl_select_state() {\t\t pinctrl_select_state() {\n pin_request() {\t\t\t\tpin_request() {\n ...\n\t\t\t\t\t\t ....\n } else {\n desc->mux_usecount++;\n \t\t\t\t\t\tdesc->mux_usecount && strcmp(desc->mux_owner, owner)) {\n\n if (desc->mux_usecount > 1)\n return 0;\n desc->mux_owner = owner;\n\n }\t\t\t\t\t\t}", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-47141", url: "https://www.suse.com/security/cve/CVE-2024-47141", }, { category: "external", summary: "SUSE Bug 1235708 for CVE-2024-47141", url: "https://bugzilla.suse.com/1235708", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-47141", }, { cve: "CVE-2024-47666", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-47666", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Set phy->enable_completion only when we wait for it\n\npm8001_phy_control() populates the enable_completion pointer with a stack\naddress, sends a PHY_LINK_RESET / PHY_HARD_RESET, waits 300 ms, and\nreturns. The problem arises when a phy control response comes late. After\n300 ms the pm8001_phy_control() function returns and the passed\nenable_completion stack address is no longer valid. Late phy control\nresponse invokes complete() on a dangling enable_completion pointer which\nleads to a kernel crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-47666", url: "https://www.suse.com/security/cve/CVE-2024-47666", }, { category: "external", summary: "SUSE Bug 1231453 for CVE-2024-47666", url: "https://bugzilla.suse.com/1231453", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-47666", }, { cve: "CVE-2024-47678", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-47678", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: change the order of rate limits\n\nICMP messages are ratelimited :\n\nAfter the blamed commits, the two rate limiters are applied in this order:\n\n1) host wide ratelimit (icmp_global_allow())\n\n2) Per destination ratelimit (inetpeer based)\n\nIn order to avoid side-channels attacks, we need to apply\nthe per destination check first.\n\nThis patch makes the following change :\n\n1) icmp_global_allow() checks if the host wide limit is reached.\n But credits are not yet consumed. This is deferred to 3)\n\n2) The per destination limit is checked/updated.\n This might add a new node in inetpeer tree.\n\n3) icmp_global_consume() consumes tokens if prior operations succeeded.\n\nThis means that host wide ratelimit is still effective\nin keeping inetpeer tree small even under DDOS.\n\nAs a bonus, I removed icmp_global.lock as the fast path\ncan use a lock-free operation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-47678", url: "https://www.suse.com/security/cve/CVE-2024-47678", }, { category: "external", summary: "SUSE Bug 1231854 for CVE-2024-47678", url: "https://bugzilla.suse.com/1231854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-47678", }, { cve: "CVE-2024-47709", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-47709", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Clear bo->bcm_proc_read after remove_proc_entry().\n\nsyzbot reported a warning in bcm_release(). [0]\n\nThe blamed change fixed another warning that is triggered when\nconnect() is issued again for a socket whose connect()ed device has\nbeen unregistered.\n\nHowever, if the socket is just close()d without the 2nd connect(), the\nremaining bo->bcm_proc_read triggers unnecessary remove_proc_entry()\nin bcm_release().\n\nLet's clear bo->bcm_proc_read after remove_proc_entry() in bcm_notify().\n\n[0]\nname '4986'\nWARNING: CPU: 0 PID: 5234 at fs/proc/generic.c:711 remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 0 UID: 0 PID: 5234 Comm: syz-executor606 Not tainted 6.11.0-rc5-syzkaller-00178-g5517ae241919 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nRIP: 0010:remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711\nCode: ff eb 05 e8 cb 1e 5e ff 48 8b 5c 24 10 48 c7 c7 e0 f7 aa 8e e8 2a 38 8e 09 90 48 c7 c7 60 3a 1b 8c 48 89 de e8 da 42 20 ff 90 <0f> 0b 90 90 48 8b 44 24 18 48 c7 44 24 40 0e 36 e0 45 49 c7 04 07\nRSP: 0018:ffffc9000345fa20 EFLAGS: 00010246\nRAX: 2a2d0aee2eb64600 RBX: ffff888032f1f548 RCX: ffff888029431e00\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffc9000345fb08 R08: ffffffff8155b2f2 R09: 1ffff1101710519a\nR10: dffffc0000000000 R11: ffffed101710519b R12: ffff888011d38640\nR13: 0000000000000004 R14: 0000000000000000 R15: dffffc0000000000\nFS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fcfb52722f0 CR3: 000000000e734000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n bcm_release+0x250/0x880 net/can/bcm.c:1578\n __sock_release net/socket.c:659 [inline]\n sock_close+0xbc/0x240 net/socket.c:1421\n __fput+0x24a/0x8a0 fs/file_table.c:422\n task_work_run+0x24f/0x310 kernel/task_work.c:228\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0xa2f/0x27f0 kernel/exit.c:882\n do_group_exit+0x207/0x2c0 kernel/exit.c:1031\n __do_sys_exit_group kernel/exit.c:1042 [inline]\n __se_sys_exit_group kernel/exit.c:1040 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040\n x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcfb51ee969\nCode: Unable to access opcode bytes at 0x7fcfb51ee93f.\nRSP: 002b:00007ffce0109ca8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fcfb51ee969\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\nRBP: 00007fcfb526f3b0 R08: ffffffffffffffb8 R09: 0000555500000000\nR10: 0000555500000000 R11: 0000000000000246 R12: 00007fcfb526f3b0\nR13: 0000000000000000 R14: 00007fcfb5271ee0 R15: 00007fcfb51bf160\n </TASK>", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-47709", url: "https://www.suse.com/security/cve/CVE-2024-47709", }, { category: "external", summary: "SUSE Bug 1232048 for CVE-2024-47709", url: "https://bugzilla.suse.com/1232048", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-47709", }, { cve: "CVE-2024-49925", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-49925", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: efifb: Register sysfs groups through driver core\n\nThe driver core can register and cleanup sysfs groups already.\nMake use of that functionality to simplify the error handling and\ncleanup.\n\nAlso avoid a UAF race during unregistering where the sysctl attributes\nwere usable after the info struct was freed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-49925", url: "https://www.suse.com/security/cve/CVE-2024-49925", }, { category: "external", summary: "SUSE Bug 1232224 for CVE-2024-49925", url: "https://bugzilla.suse.com/1232224", }, { category: "external", summary: "SUSE Bug 1232225 for CVE-2024-49925", url: "https://bugzilla.suse.com/1232225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-49925", }, { cve: "CVE-2024-49944", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-49944", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start\n\nIn sctp_listen_start() invoked by sctp_inet_listen(), it should set the\nsk_state back to CLOSED if sctp_autobind() fails due to whatever reason.\n\nOtherwise, next time when calling sctp_inet_listen(), if sctp_sk(sk)->reuse\nis already set via setsockopt(SCTP_REUSE_PORT), sctp_sk(sk)->bind_hash will\nbe dereferenced as sk_state is LISTENING, which causes a crash as bind_hash\nis NULL.\n\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:sctp_inet_listen+0x7f0/0xa20 net/sctp/socket.c:8617\n Call Trace:\n <TASK>\n __sys_listen_socket net/socket.c:1883 [inline]\n __sys_listen+0x1b7/0x230 net/socket.c:1894\n __do_sys_listen net/socket.c:1902 [inline]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-49944", url: "https://www.suse.com/security/cve/CVE-2024-49944", }, { category: "external", summary: "SUSE Bug 1232166 for CVE-2024-49944", url: "https://bugzilla.suse.com/1232166", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-49944", }, { cve: "CVE-2024-50039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50039", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: accept TCA_STAB only for root qdisc\n\nMost qdiscs maintain their backlog using qdisc_pkt_len(skb)\non the assumption it is invariant between the enqueue()\nand dequeue() handlers.\n\nUnfortunately syzbot can crash a host rather easily using\na TBF + SFQ combination, with an STAB on SFQ [1]\n\nWe can't support TCA_STAB on arbitrary level, this would\nrequire to maintain per-qdisc storage.\n\n[1]\n[ 88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 88.798611] #PF: supervisor read access in kernel mode\n[ 88.799014] #PF: error_code(0x0000) - not-present page\n[ 88.799506] PGD 0 P4D 0\n[ 88.799829] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117\n[ 88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[ 88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq\n[ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a <4c> 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00\nAll code\n========\n 0:\t0f b7 50 12 \tmovzwl 0x12(%rax),%edx\n 4:\t48 8d 04 d5 00 00 00 \tlea 0x0(,%rdx,8),%rax\n b:\t00\n c:\t48 89 d6 \tmov %rdx,%rsi\n f:\t48 29 d0 \tsub %rdx,%rax\n 12:\t48 8b 91 c0 01 00 00 \tmov 0x1c0(%rcx),%rdx\n 19:\t48 c1 e0 03 \tshl $0x3,%rax\n 1d:\t48 01 c2 \tadd %rax,%rdx\n 20:\t66 83 7a 1a 00 \tcmpw $0x0,0x1a(%rdx)\n 25:\t7e c0 \tjle 0xffffffffffffffe7\n 27:\t48 8b 3a \tmov (%rdx),%rdi\n 2a:*\t4c 8b 07 \tmov (%rdi),%r8\t\t<-- trapping instruction\n 2d:\t4c 89 02 \tmov %r8,(%rdx)\n 30:\t49 89 50 08 \tmov %rdx,0x8(%r8)\n 34:\t48 c7 47 08 00 00 00 \tmovq $0x0,0x8(%rdi)\n 3b:\t00\n 3c:\t48 \trex.W\n 3d:\tc7 \t.byte 0xc7\n 3e:\t07 \t(bad)\n\t...\n\nCode starting with the faulting instruction\n===========================================\n 0:\t4c 8b 07 \tmov (%rdi),%r8\n 3:\t4c 89 02 \tmov %r8,(%rdx)\n 6:\t49 89 50 08 \tmov %rdx,0x8(%r8)\n a:\t48 c7 47 08 00 00 00 \tmovq $0x0,0x8(%rdi)\n 11:\t00\n 12:\t48 \trex.W\n 13:\tc7 \t.byte 0xc7\n 14:\t07 \t(bad)\n\t...\n[ 88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206\n[ 88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800\n[ 88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000\n[ 88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f\n[ 88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140\n[ 88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac\n[ 88.806734] FS: 00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000\n[ 88.807225] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0\n[ 88.808165] Call Trace:\n[ 88.808459] <TASK>\n[ 88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)\n[ 88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715)\n[ 88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539)\n[ 88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)\n[ 88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq\n[ 88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq\n[ 88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50039", url: "https://www.suse.com/security/cve/CVE-2024-50039", }, { category: "external", summary: "SUSE Bug 1231909 for CVE-2024-50039", url: "https://bugzilla.suse.com/1231909", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50039", }, { cve: "CVE-2024-50143", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50143", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: fix uninit-value use in udf_get_fileshortad\n\nCheck for overflow when computing alen in udf_current_aext to mitigate\nlater uninit-value use in udf_get_fileshortad KMSAN bug[1].\nAfter applying the patch reproducer did not trigger any issue[2].\n\n[1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df\n[2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50143", url: "https://www.suse.com/security/cve/CVE-2024-50143", }, { category: "external", summary: "SUSE Bug 1233038 for CVE-2024-50143", url: "https://bugzilla.suse.com/1233038", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50143", }, { cve: "CVE-2024-50151", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50151", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix OOBs when building SMB2_IOCTL request\n\nWhen using encryption, either enforced by the server or when using\n'seal' mount option, the client will squash all compound request buffers\ndown for encryption into a single iov in smb2_set_next_command().\n\nSMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the\nSMB2_IOCTL request in the first iov, and if the user passes an input\nbuffer that is greater than 328 bytes, smb2_set_next_command() will\nend up writing off the end of @rqst->iov[0].iov_base as shown below:\n\n mount.cifs //srv/share /mnt -o ...,seal\n ln -s $(perl -e \"print('a')for 1..1024\") /mnt/link\n\n BUG: KASAN: slab-out-of-bounds in\n smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n Write of size 4116 at addr ffff8881148fcab8 by task ln/859\n\n CPU: 1 UID: 0 PID: 859 Comm: ln Not tainted 6.12.0-rc3 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n 1.16.3-2.fc40 04/01/2014\n Call Trace:\n <TASK>\n dump_stack_lvl+0x5d/0x80\n ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n print_report+0x156/0x4d9\n ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n ? __virt_addr_valid+0x145/0x310\n ? __phys_addr+0x46/0x90\n ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n kasan_report+0xda/0x110\n ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n kasan_check_range+0x10f/0x1f0\n __asan_memcpy+0x3c/0x60\n smb2_set_next_command.cold+0x1d6/0x24c [cifs]\n smb2_compound_op+0x238c/0x3840 [cifs]\n ? kasan_save_track+0x14/0x30\n ? kasan_save_free_info+0x3b/0x70\n ? vfs_symlink+0x1a1/0x2c0\n ? do_symlinkat+0x108/0x1c0\n ? __pfx_smb2_compound_op+0x10/0x10 [cifs]\n ? kmem_cache_free+0x118/0x3e0\n ? cifs_get_writable_path+0xeb/0x1a0 [cifs]\n smb2_get_reparse_inode+0x423/0x540 [cifs]\n ? __pfx_smb2_get_reparse_inode+0x10/0x10 [cifs]\n ? rcu_is_watching+0x20/0x50\n ? __kmalloc_noprof+0x37c/0x480\n ? smb2_create_reparse_symlink+0x257/0x490 [cifs]\n ? smb2_create_reparse_symlink+0x38f/0x490 [cifs]\n smb2_create_reparse_symlink+0x38f/0x490 [cifs]\n ? __pfx_smb2_create_reparse_symlink+0x10/0x10 [cifs]\n ? find_held_lock+0x8a/0xa0\n ? hlock_class+0x32/0xb0\n ? __build_path_from_dentry_optional_prefix+0x19d/0x2e0 [cifs]\n cifs_symlink+0x24f/0x960 [cifs]\n ? __pfx_make_vfsuid+0x10/0x10\n ? __pfx_cifs_symlink+0x10/0x10 [cifs]\n ? make_vfsgid+0x6b/0xc0\n ? generic_permission+0x96/0x2d0\n vfs_symlink+0x1a1/0x2c0\n do_symlinkat+0x108/0x1c0\n ? __pfx_do_symlinkat+0x10/0x10\n ? strncpy_from_user+0xaa/0x160\n __x64_sys_symlinkat+0xb9/0xf0\n do_syscall_64+0xbb/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f08d75c13bb", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50151", url: "https://www.suse.com/security/cve/CVE-2024-50151", }, { category: "external", summary: "SUSE Bug 1233055 for CVE-2024-50151", url: "https://bugzilla.suse.com/1233055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50151", }, { cve: "CVE-2024-50166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50166", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfsl/fman: Fix refcount handling of fman-related devices\n\nIn mac_probe() there are multiple calls to of_find_device_by_node(),\nfman_bind() and fman_port_bind() which takes references to of_dev->dev.\nNot all references taken by these calls are released later on error path\nin mac_probe() and in mac_remove() which lead to reference leaks.\n\nAdd references release.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50166", url: "https://www.suse.com/security/cve/CVE-2024-50166", }, { category: "external", summary: "SUSE Bug 1233050 for CVE-2024-50166", url: "https://bugzilla.suse.com/1233050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50166", }, { cve: "CVE-2024-50199", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50199", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/swapfile: skip HugeTLB pages for unuse_vma\n\nI got a bad pud error and lost a 1GB HugeTLB when calling swapoff. The\nproblem can be reproduced by the following steps:\n\n 1. Allocate an anonymous 1GB HugeTLB and some other anonymous memory.\n 2. Swapout the above anonymous memory.\n 3. run swapoff and we will get a bad pud error in kernel message:\n\n mm/pgtable-generic.c:42: bad pud 00000000743d215d(84000001400000e7)\n\nWe can tell that pud_clear_bad is called by pud_none_or_clear_bad in\nunuse_pud_range() by ftrace. And therefore the HugeTLB pages will never\nbe freed because we lost it from page table. We can skip HugeTLB pages\nfor unuse_vma to fix it.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50199", url: "https://www.suse.com/security/cve/CVE-2024-50199", }, { category: "external", summary: "SUSE Bug 1233112 for CVE-2024-50199", url: "https://bugzilla.suse.com/1233112", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50199", }, { cve: "CVE-2024-50211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50211", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: refactor inode_bmap() to handle error\n\nRefactor inode_bmap() to handle error since udf_next_aext() can return\nerror now. On situations like ftruncate, udf_extend_file() can now\ndetect errors and bail out early without resorting to checking for\nparticular offsets and assuming internal behavior of these functions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50211", url: "https://www.suse.com/security/cve/CVE-2024-50211", }, { category: "external", summary: "SUSE Bug 1233096 for CVE-2024-50211", url: "https://bugzilla.suse.com/1233096", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50211", }, { cve: "CVE-2024-50228", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50228", }, ], notes: [ { category: "general", text: "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50228", url: "https://www.suse.com/security/cve/CVE-2024-50228", }, { category: "external", summary: "SUSE Bug 1233204 for CVE-2024-50228", url: "https://bugzilla.suse.com/1233204", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "low", }, ], title: "CVE-2024-50228", }, { cve: "CVE-2024-50256", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50256", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()\n\nI got a syzbot report without a repro [1] crashing in nf_send_reset6()\n\nI think the issue is that dev->hard_header_len is zero, and we attempt\nlater to push an Ethernet header.\n\nUse LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c.\n\n[1]\n\nskbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun\n kernel BUG at net/core/skbuff.c:206 !\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\n RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]\n RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216\nCode: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3\nRSP: 0018:ffffc900045269b0 EFLAGS: 00010282\nRAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800\nRDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000\nRBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc\nR10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140\nR13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c\nFS: 00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n skb_push+0xe5/0x100 net/core/skbuff.c:2636\n eth_header+0x38/0x1f0 net/ethernet/eth.c:83\n dev_hard_header include/linux/netdevice.h:3208 [inline]\n nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358\n nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288\n nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626\n nf_hook include/linux/netfilter.h:269 [inline]\n NF_HOOK include/linux/netfilter.h:312 [inline]\n br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]\n br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424\n __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562\n __netif_receive_skb_one_core net/core/dev.c:5666 [inline]\n __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781\n netif_receive_skb_internal net/core/dev.c:5867 [inline]\n netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926\n tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550\n tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007\n tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053\n new_sync_write fs/read_write.c:590 [inline]\n vfs_write+0xa6d/0xc90 fs/read_write.c:683\n ksys_write+0x183/0x2b0 fs/read_write.c:736\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fdbeeb7d1ff\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48\nRSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff\nRDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8\nRBP: 00007fdbeebf12be R08: 0000000\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50256", url: "https://www.suse.com/security/cve/CVE-2024-50256", }, { category: "external", summary: "SUSE Bug 1233200 for CVE-2024-50256", url: "https://bugzilla.suse.com/1233200", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50256", }, { cve: "CVE-2024-50262", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50262", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds write in trie_get_next_key()\n\ntrie_get_next_key() allocates a node stack with size trie->max_prefixlen,\nwhile it writes (trie->max_prefixlen + 1) nodes to the stack when it has\nfull paths from the root to leaves. For example, consider a trie with\nmax_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ...\n0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with\n.prefixlen = 8 make 9 nodes be written on the node stack with size 8.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50262", url: "https://www.suse.com/security/cve/CVE-2024-50262", }, { category: "external", summary: "SUSE Bug 1233239 for CVE-2024-50262", url: "https://bugzilla.suse.com/1233239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50262", }, { cve: "CVE-2024-50278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50278", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix potential out-of-bounds access on the first resume\n\nOut-of-bounds access occurs if the fast device is expanded unexpectedly\nbefore the first-time resume of the cache table. This happens because\nexpanding the fast device requires reloading the cache table for\ncache_create to allocate new in-core data structures that fit the new\nsize, and the check in cache_preresume is not performed during the\nfirst resume, leading to the issue.\n\nReproduce steps:\n\n1. prepare component devices:\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\n\n2. load a cache table of 512 cache blocks, and deliberately expand the\n fast device before resuming the cache, making the in-core data\n structures inadequate.\n\ndmsetup create cache --notable\ndmsetup reload cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\ndmsetup reload cdata --table \"0 131072 linear /dev/sdc 8192\"\ndmsetup resume cdata\ndmsetup resume cache\n\n3. suspend the cache to write out the in-core dirty bitset and hint\n array, leading to out-of-bounds access to the dirty bitset at offset\n 0x40:\n\ndmsetup suspend cache\n\nKASAN reports:\n\n BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80\n Read of size 8 at addr ffffc90000085040 by task dmsetup/90\n\n (...snip...)\n The buggy address belongs to the virtual mapping at\n [ffffc90000085000, ffffc90000087000) created by:\n cache_ctr+0x176a/0x35f0\n\n (...snip...)\n Memory state around the buggy address:\n ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n >ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8\n ^\n ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n\nFix by checking the size change on the first resume.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50278", url: "https://www.suse.com/security/cve/CVE-2024-50278", }, { category: "external", summary: "SUSE Bug 1233467 for CVE-2024-50278", url: "https://bugzilla.suse.com/1233467", }, { category: "external", summary: "SUSE Bug 1233709 for CVE-2024-50278", url: "https://bugzilla.suse.com/1233709", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50278", }, { cve: "CVE-2024-50280", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50280", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix flushing uninitialized delayed_work on cache_ctr error\n\nAn unexpected WARN_ON from flush_work() may occur when cache creation\nfails, caused by destroying the uninitialized delayed_work waker in the\nerror path of cache_create(). For example, the warning appears on the\nsuperblock checksum error.\n\nReproduce steps:\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\ndmsetup create cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\n\nKernel logs:\n\n(snip)\nWARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890\n\nFix by pulling out the cancel_delayed_work_sync() from the constructor's\nerror path. This patch doesn't affect the use-after-free fix for\nconcurrent dm_resume and dm_destroy (commit 6a459d8edbdb (\"dm cache: Fix\nUAF in destroy()\")) as cache_dtr is not changed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50280", url: "https://www.suse.com/security/cve/CVE-2024-50280", }, { category: "external", summary: "SUSE Bug 1233469 for CVE-2024-50280", url: "https://bugzilla.suse.com/1233469", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50280", }, { cve: "CVE-2024-50287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50287", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-tpg: prevent the risk of a division by zero\n\nAs reported by Coverity, the logic at tpg_precalculate_line()\nblindly rescales the buffer even when scaled_witdh is equal to\nzero. If this ever happens, this will cause a division by zero.\n\nInstead, add a WARN_ON_ONCE() to trigger such cases and return\nwithout doing any precalculation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50287", url: "https://www.suse.com/security/cve/CVE-2024-50287", }, { category: "external", summary: "SUSE Bug 1233476 for CVE-2024-50287", url: "https://bugzilla.suse.com/1233476", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50287", }, { cve: "CVE-2024-50299", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50299", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: properly validate chunk size in sctp_sf_ootb()\n\nA size validation fix similar to that in Commit 50619dbf8db7 (\"sctp: add\nsize validation when walking chunks\") is also required in sctp_sf_ootb()\nto address a crash reported by syzbot:\n\n BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712\n sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712\n sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166\n sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407\n sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\n sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243\n sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159\n ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-50299", url: "https://www.suse.com/security/cve/CVE-2024-50299", }, { category: "external", summary: "SUSE Bug 1233488 for CVE-2024-50299", url: "https://bugzilla.suse.com/1233488", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-50299", }, { cve: "CVE-2024-53057", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53057", }, ], notes: [ { category: "general", text: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53057", url: "https://www.suse.com/security/cve/CVE-2024-53057", }, { category: "external", summary: "SUSE Bug 1233551 for CVE-2024-53057", url: "https://bugzilla.suse.com/1233551", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53057", }, { cve: "CVE-2024-53101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53101", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Fix uninitialized value issue in from_kuid and from_kgid\n\nocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in\na trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.\n\nInitialize all fields of newattrs to avoid uninitialized variables, by\nchecking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53101", url: "https://www.suse.com/security/cve/CVE-2024-53101", }, { category: "external", summary: "SUSE Bug 1233769 for CVE-2024-53101", url: "https://bugzilla.suse.com/1233769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53101", }, { cve: "CVE-2024-53112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53112", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: uncache inode which has failed entering the group\n\nSyzbot has reported the following BUG:\n\nkernel BUG at fs/ocfs2/uptodate.c:509!\n...\nCall Trace:\n <TASK>\n ? __die_body+0x5f/0xb0\n ? die+0x9e/0xc0\n ? do_trap+0x15a/0x3a0\n ? ocfs2_set_new_buffer_uptodate+0x145/0x160\n ? do_error_trap+0x1dc/0x2c0\n ? ocfs2_set_new_buffer_uptodate+0x145/0x160\n ? __pfx_do_error_trap+0x10/0x10\n ? handle_invalid_op+0x34/0x40\n ? ocfs2_set_new_buffer_uptodate+0x145/0x160\n ? exc_invalid_op+0x38/0x50\n ? asm_exc_invalid_op+0x1a/0x20\n ? ocfs2_set_new_buffer_uptodate+0x2e/0x160\n ? ocfs2_set_new_buffer_uptodate+0x144/0x160\n ? ocfs2_set_new_buffer_uptodate+0x145/0x160\n ocfs2_group_add+0x39f/0x15a0\n ? __pfx_ocfs2_group_add+0x10/0x10\n ? __pfx_lock_acquire+0x10/0x10\n ? mnt_get_write_access+0x68/0x2b0\n ? __pfx_lock_release+0x10/0x10\n ? rcu_read_lock_any_held+0xb7/0x160\n ? __pfx_rcu_read_lock_any_held+0x10/0x10\n ? smack_log+0x123/0x540\n ? mnt_get_write_access+0x68/0x2b0\n ? mnt_get_write_access+0x68/0x2b0\n ? mnt_get_write_access+0x226/0x2b0\n ocfs2_ioctl+0x65e/0x7d0\n ? __pfx_ocfs2_ioctl+0x10/0x10\n ? smack_file_ioctl+0x29e/0x3a0\n ? __pfx_smack_file_ioctl+0x10/0x10\n ? lockdep_hardirqs_on_prepare+0x43d/0x780\n ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10\n ? __pfx_ocfs2_ioctl+0x10/0x10\n __se_sys_ioctl+0xfb/0x170\n do_syscall_64+0xf3/0x230\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n </TASK>\n\nWhen 'ioctl(OCFS2_IOC_GROUP_ADD, ...)' has failed for the particular\ninode in 'ocfs2_verify_group_and_input()', corresponding buffer head\nremains cached and subsequent call to the same 'ioctl()' for the same\ninode issues the BUG() in 'ocfs2_set_new_buffer_uptodate()' (trying\nto cache the same buffer head of that inode). Fix this by uncaching\nthe buffer head with 'ocfs2_remove_from_cache()' on error path in\n'ocfs2_group_add()'.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53112", url: "https://www.suse.com/security/cve/CVE-2024-53112", }, { category: "external", summary: "SUSE Bug 1234087 for CVE-2024-53112", url: "https://bugzilla.suse.com/1234087", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53112", }, { cve: "CVE-2024-53136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53136", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: revert \"mm: shmem: fix data-race in shmem_getattr()\"\n\nRevert d949d1d14fa2 (\"mm: shmem: fix data-race in shmem_getattr()\") as\nsuggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over\nNFS.\n\nAs Hugh commented, \"added just to silence a syzbot sanitizer splat: added\nwhere there has never been any practical problem\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53136", url: "https://www.suse.com/security/cve/CVE-2024-53136", }, { category: "external", summary: "SUSE Bug 1234161 for CVE-2024-53136", url: "https://bugzilla.suse.com/1234161", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53136", }, { cve: "CVE-2024-53141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53141", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add missing range check in bitmap_ip_uadt\n\nWhen tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,\nthe values of ip and ip_to are slightly swapped. Therefore, the range check\nfor ip should be done later, but this part is missing and it seems that the\nvulnerability occurs.\n\nSo we should add missing range checks and remove unnecessary range checks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53141", url: "https://www.suse.com/security/cve/CVE-2024-53141", }, { category: "external", summary: "SUSE Bug 1234381 for CVE-2024-53141", url: "https://bugzilla.suse.com/1234381", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53141", }, { cve: "CVE-2024-53144", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53144", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE\n\nThis aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4\n(\"Bluetooth: Always request for user confirmation for Just Works\")\nalways request user confirmation with confirm_hint set since the\nlikes of bluetoothd have dedicated policy around JUST_WORKS method\n(e.g. main.conf:JustWorksRepairing).\n\nCVE: CVE-2024-8805", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53144", url: "https://www.suse.com/security/cve/CVE-2024-53144", }, { category: "external", summary: "SUSE Bug 1234690 for CVE-2024-53144", url: "https://bugzilla.suse.com/1234690", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53144", }, { cve: "CVE-2024-53146", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53146", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is >= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53146", url: "https://www.suse.com/security/cve/CVE-2024-53146", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53146", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1234854 for CVE-2024-53146", url: "https://bugzilla.suse.com/1234854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53146", }, { cve: "CVE-2024-53150", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53150", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out of bounds reads when finding clock sources\n\nThe current USB-audio driver code doesn't check bLength of each\ndescriptor at traversing for clock descriptors. That is, when a\ndevice provides a bogus descriptor with a shorter bLength, the driver\nmight hit out-of-bounds reads.\n\nFor addressing it, this patch adds sanity checks to the validator\nfunctions for the clock descriptor traversal. When the descriptor\nlength is shorter than expected, it's skipped in the loop.\n\nFor the clock source and clock multiplier descriptors, we can just\ncheck bLength against the sizeof() of each descriptor type.\nOTOH, the clock selector descriptor of UAC2 and UAC3 has an array\nof bNrInPins elements and two more fields at its tail, hence those\nhave to be checked in addition to the sizeof() check.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53150", url: "https://www.suse.com/security/cve/CVE-2024-53150", }, { category: "external", summary: "SUSE Bug 1234834 for CVE-2024-53150", url: "https://bugzilla.suse.com/1234834", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53150", }, { cve: "CVE-2024-53156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53156", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()\n\nI found the following bug in my fuzzer:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51\n index 255 is out of range for type 'htc_endpoint [22]'\n CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: events request_firmware_work_func\n Call Trace:\n <TASK>\n dump_stack_lvl+0x180/0x1b0\n __ubsan_handle_out_of_bounds+0xd4/0x130\n htc_issue_send.constprop.0+0x20c/0x230\n ? _raw_spin_unlock_irqrestore+0x3c/0x70\n ath9k_wmi_cmd+0x41d/0x610\n ? mark_held_locks+0x9f/0xe0\n ...\n\nSince this bug has been confirmed to be caused by insufficient verification\nof conn_rsp_epid, I think it would be appropriate to add a range check for\nconn_rsp_epid to htc_connect_service() to prevent the bug from occurring.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53156", url: "https://www.suse.com/security/cve/CVE-2024-53156", }, { category: "external", summary: "SUSE Bug 1234846 for CVE-2024-53156", url: "https://bugzilla.suse.com/1234846", }, { category: "external", summary: "SUSE Bug 1234847 for CVE-2024-53156", url: "https://bugzilla.suse.com/1234847", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53156", url: "https://bugzilla.suse.com/1234853", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53156", }, { cve: "CVE-2024-53157", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53157", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Check the DVFS OPP count returned by the firmware\n\nFix a kernel crash with the below call trace when the SCPI firmware\nreturns OPP count of zero.\n\ndvfs_info.opp_count may be zero on some platforms during the reboot\ntest, and the kernel will crash after dereferencing the pointer to\nkcalloc(info->count, sizeof(*opp), GFP_KERNEL).\n\n | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028\n | Mem abort info:\n | ESR = 0x96000004\n | Exception class = DABT (current EL), IL = 32 bits\n | SET = 0, FnV = 0\n | EA = 0, S1PTW = 0\n | Data abort info:\n | ISV = 0, ISS = 0x00000004\n | CM = 0, WnR = 0\n | user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c\n | [0000000000000028] pgd=0000000000000000\n | Internal error: Oops: 96000004 [#1] SMP\n | scpi-hwmon: probe of PHYT000D:00 failed with error -110\n | Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)\n | CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1\n | Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS\n | pstate: 60000005 (nZCv daif -PAN -UAO)\n | pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]\n | lr : clk_register+0x438/0x720\n | Call trace:\n | scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]\n | devm_clk_hw_register+0x50/0xa0\n | scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]\n | scpi_clocks_probe+0x528/0x70c [clk_scpi]\n | platform_drv_probe+0x58/0xa8\n | really_probe+0x260/0x3d0\n | driver_probe_device+0x12c/0x148\n | device_driver_attach+0x74/0x98\n | __driver_attach+0xb4/0xe8\n | bus_for_each_dev+0x88/0xe0\n | driver_attach+0x30/0x40\n | bus_add_driver+0x178/0x2b0\n | driver_register+0x64/0x118\n | __platform_driver_register+0x54/0x60\n | scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]\n | do_one_initcall+0x54/0x220\n | do_init_module+0x54/0x1c8\n | load_module+0x14a4/0x1668\n | __se_sys_finit_module+0xf8/0x110\n | __arm64_sys_finit_module+0x24/0x30\n | el0_svc_common+0x78/0x170\n | el0_svc_handler+0x38/0x78\n | el0_svc+0x8/0x340\n | Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)\n | ---[ end trace 06feb22469d89fa8 ]---\n | Kernel panic - not syncing: Fatal exception\n | SMP: stopping secondary CPUs\n | Kernel Offset: disabled\n | CPU features: 0x10,a0002008\n | Memory Limit: none", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53157", url: "https://www.suse.com/security/cve/CVE-2024-53157", }, { category: "external", summary: "SUSE Bug 1234827 for CVE-2024-53157", url: "https://bugzilla.suse.com/1234827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53157", }, { cve: "CVE-2024-53172", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53172", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nubi: fastmap: Fix duplicate slab cache names while attaching\n\nSince commit 4c39529663b9 (\"slab: Warn on duplicate cache names when\nDEBUG_VM=y\"), the duplicate slab cache names can be detected and a\nkernel WARNING is thrown out.\nIn UBI fast attaching process, alloc_ai() could be invoked twice\nwith the same slab cache name 'ubi_aeb_slab_cache', which will trigger\nfollowing warning messages:\n kmem_cache of name 'ubi_aeb_slab_cache' already exists\n WARNING: CPU: 0 PID: 7519 at mm/slab_common.c:107\n __kmem_cache_create_args+0x100/0x5f0\n Modules linked in: ubi(+) nandsim [last unloaded: nandsim]\n CPU: 0 UID: 0 PID: 7519 Comm: modprobe Tainted: G 6.12.0-rc2\n RIP: 0010:__kmem_cache_create_args+0x100/0x5f0\n Call Trace:\n __kmem_cache_create_args+0x100/0x5f0\n alloc_ai+0x295/0x3f0 [ubi]\n ubi_attach+0x3c3/0xcc0 [ubi]\n ubi_attach_mtd_dev+0x17cf/0x3fa0 [ubi]\n ubi_init+0x3fb/0x800 [ubi]\n do_init_module+0x265/0x7d0\n __x64_sys_finit_module+0x7a/0xc0\n\nThe problem could be easily reproduced by loading UBI device by fastmap\nwith CONFIG_DEBUG_VM=y.\nFix it by using different slab names for alloc_ai() callers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53172", url: "https://www.suse.com/security/cve/CVE-2024-53172", }, { category: "external", summary: "SUSE Bug 1234898 for CVE-2024-53172", url: "https://bugzilla.suse.com/1234898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53172", }, { cve: "CVE-2024-53173", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53173", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53173", url: "https://www.suse.com/security/cve/CVE-2024-53173", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53173", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1234891 for CVE-2024-53173", url: "https://bugzilla.suse.com/1234891", }, { category: "external", summary: "SUSE Bug 1234892 for CVE-2024-53173", url: "https://bugzilla.suse.com/1234892", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53173", }, { cve: "CVE-2024-53179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53179", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free of signing key\n\nCustomers have reported use-after-free in @ses->auth_key.response with\nSMB2.1 + sign mounts which occurs due to following race:\n\ntask A task B\ncifs_mount()\n dfs_mount_share()\n get_session()\n cifs_mount_get_session() cifs_send_recv()\n cifs_get_smb_ses() compound_send_recv()\n cifs_setup_session() smb2_setup_request()\n kfree_sensitive() smb2_calc_signature()\n crypto_shash_setkey() *UAF*\n\nFix this by ensuring that we have a valid @ses->auth_key.response by\nchecking whether @ses->ses_status is SES_GOOD or SES_EXITING with\n@ses->ses_lock held. After commit 24a9799aa8ef (\"smb: client: fix UAF\nin smb2_reconnect_server()\"), we made sure to call ->logoff() only\nwhen @ses was known to be good (e.g. valid ->auth_key.response), so\nit's safe to access signing key when @ses->ses_status == SES_EXITING.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53179", url: "https://www.suse.com/security/cve/CVE-2024-53179", }, { category: "external", summary: "SUSE Bug 1234921 for CVE-2024-53179", url: "https://bugzilla.suse.com/1234921", }, { category: "external", summary: "SUSE Bug 1234927 for CVE-2024-53179", url: "https://bugzilla.suse.com/1234927", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53179", }, { cve: "CVE-2024-53198", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53198", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxen: Fix the issue of resource not being properly released in xenbus_dev_probe()\n\nThis patch fixes an issue in the function xenbus_dev_probe(). In the\nxenbus_dev_probe() function, within the if (err) branch at line 313, the\nprogram incorrectly returns err directly without releasing the resources\nallocated by err = drv->probe(dev, id). As the return value is non-zero,\nthe upper layers assume the processing logic has failed. However, the probe\noperation was performed earlier without a corresponding remove operation.\nSince the probe actually allocates resources, failing to perform the remove\noperation could lead to problems.\n\nTo fix this issue, we followed the resource release logic of the\nxenbus_dev_remove() function by adding a new block fail_remove before the\nfail_put block. After entering the branch if (err) at line 313, the\nfunction will use a goto statement to jump to the fail_remove block,\nensuring that the previously acquired resources are correctly released,\nthus preventing the reference count leak.\n\nThis bug was identified by an experimental static analysis tool developed\nby our team. The tool specializes in analyzing reference count operations\nand detecting potential issues where resources are not properly managed.\nIn this case, the tool flagged the missing release operation as a\npotential problem, which led to the development of this patch.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53198", url: "https://www.suse.com/security/cve/CVE-2024-53198", }, { category: "external", summary: "SUSE Bug 1234923 for CVE-2024-53198", url: "https://bugzilla.suse.com/1234923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53198", }, { cve: "CVE-2024-53210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53210", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()\n\nPassing MSG_PEEK flag to skb_recv_datagram() increments skb refcount\n(skb->users) and iucv_sock_recvmsg() does not decrement skb refcount\nat exit.\nThis results in skb memory leak in skb_queue_purge() and WARN_ON in\niucv_sock_destruct() during socket close. To fix this decrease\nskb refcount by one if MSG_PEEK is set in order to prevent memory\nleak and WARN_ON.\n\nWARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv]\nCPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G W 6.10.0-rc7 #1\nHardware name: IBM 3931 A01 704 (z/VM 7.3.0)\nCall Trace:\n [<001587c682c4aa98>] iucv_sock_destruct+0x148/0x1a0 [af_iucv]\n [<001587c682c4a9d0>] iucv_sock_destruct+0x80/0x1a0 [af_iucv]\n [<001587c704117a32>] __sk_destruct+0x52/0x550\n [<001587c704104a54>] __sock_release+0xa4/0x230\n [<001587c704104c0c>] sock_close+0x2c/0x40\n [<001587c702c5f5a8>] __fput+0x2e8/0x970\n [<001587c7024148c4>] task_work_run+0x1c4/0x2c0\n [<001587c7023b0716>] do_exit+0x996/0x1050\n [<001587c7023b13aa>] do_group_exit+0x13a/0x360\n [<001587c7023b1626>] __s390x_sys_exit_group+0x56/0x60\n [<001587c7022bccca>] do_syscall+0x27a/0x380\n [<001587c7049a6a0c>] __do_syscall+0x9c/0x160\n [<001587c7049ce8a8>] system_call+0x70/0x98\n Last Breaking-Event-Address:\n [<001587c682c4a9d4>] iucv_sock_destruct+0x84/0x1a0 [af_iucv]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53210", url: "https://www.suse.com/security/cve/CVE-2024-53210", }, { category: "external", summary: "SUSE Bug 1234971 for CVE-2024-53210", url: "https://bugzilla.suse.com/1234971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53210", }, { cve: "CVE-2024-53214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53214", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the 'Next\nCapability Offset' field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device->pci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n <TASK>\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53214", url: "https://www.suse.com/security/cve/CVE-2024-53214", }, { category: "external", summary: "SUSE Bug 1235004 for CVE-2024-53214", url: "https://bugzilla.suse.com/1235004", }, { category: "external", summary: "SUSE Bug 1235005 for CVE-2024-53214", url: "https://bugzilla.suse.com/1235005", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53214", }, { cve: "CVE-2024-53224", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53224", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Move events notifier registration to be after device registration\n\nMove pkey change work initialization and cleanup from device resources\nstage to notifier stage, since this is the stage which handles this work\nevents.\n\nFix a race between the device deregistration and pkey change work by moving\nMLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to\nensure that the notifier is deregistered before the device during cleanup.\nWhich ensures there are no works that are being executed after the\ndevice has already unregistered which can cause the panic below.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1\nHardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023\nWorkqueue: events pkey_change_handler [mlx5_ib]\nRIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]\nCode: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 <4c> 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40\nRSP: 0018:ffffbcc54068be20 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36\nRDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128\nRBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001\nR10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000\nR13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905\nFS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\nmlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]\nprocess_one_work+0x1e8/0x3c0\nworker_thread+0x50/0x3b0\n? rescuer_thread+0x380/0x380\nkthread+0x149/0x170\n? set_kthread_struct+0x50/0x50\nret_from_fork+0x22/0x30\nModules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]\nCR2: 0000000000000000\n---[ end trace f6f8be4eae12f7bc ]---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53224", url: "https://www.suse.com/security/cve/CVE-2024-53224", }, { category: "external", summary: "SUSE Bug 1235009 for CVE-2024-53224", url: "https://bugzilla.suse.com/1235009", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53224", }, { cve: "CVE-2024-53239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53239", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: 6fire: Release resources at card release\n\nThe current 6fire code tries to release the resources right after the\ncall of usb6fire_chip_abort(). But at this moment, the card object\nmight be still in use (as we're calling snd_card_free_when_closed()).\n\nFor avoid potential UAFs, move the release of resources to the card's\nprivate_free instead of the manual call of usb6fire_chip_destroy() at\nthe USB disconnect callback.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53239", url: "https://www.suse.com/security/cve/CVE-2024-53239", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-53239", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1235054 for CVE-2024-53239", url: "https://bugzilla.suse.com/1235054", }, { category: "external", summary: "SUSE Bug 1235055 for CVE-2024-53239", url: "https://bugzilla.suse.com/1235055", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-53239", }, { cve: "CVE-2024-53240", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-53240", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/netfront: fix crash when removing device\n\nWhen removing a netfront device directly after a suspend/resume cycle\nit might happen that the queues have not been setup again, causing a\ncrash during the attempt to stop the queues another time.\n\nFix that by checking the queues are existing before trying to stop\nthem.\n\nThis is XSA-465 / CVE-2024-53240.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-53240", url: "https://www.suse.com/security/cve/CVE-2024-53240", }, { category: "external", summary: "SUSE Bug 1234281 for CVE-2024-53240", url: "https://bugzilla.suse.com/1234281", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-53240", }, { cve: "CVE-2024-56531", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56531", }, ], notes: [ { category: "general", text: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56531", url: "https://www.suse.com/security/cve/CVE-2024-56531", }, { category: "external", summary: "SUSE Bug 1235057 for CVE-2024-56531", url: "https://bugzilla.suse.com/1235057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "low", }, ], title: "CVE-2024-56531", }, { cve: "CVE-2024-56548", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56548", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: don't query the device logical block size multiple times\n\nDevices block sizes may change. One of these cases is a loop device by\nusing ioctl LOOP_SET_BLOCK_SIZE.\n\nWhile this may cause other issues like IO being rejected, in the case of\nhfsplus, it will allocate a block by using that size and potentially write\nout-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the\nlatter function reads a different io_size.\n\nUsing a new min_io_size initally set to sb_min_blocksize works for the\npurposes of the original fix, since it will be set to the max between\nHFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the\nmax between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not\ninitialized.\n\nTested by mounting an hfsplus filesystem with loop block sizes 512, 1024\nand 4096.\n\nThe produced KASAN report before the fix looks like this:\n\n[ 419.944641] ==================================================================\n[ 419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a\n[ 419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678\n[ 419.947612]\n[ 419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84\n[ 419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[ 419.950035] Call Trace:\n[ 419.950384] <TASK>\n[ 419.950676] dump_stack_lvl+0x57/0x78\n[ 419.951212] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.951830] print_report+0x14c/0x49e\n[ 419.952361] ? __virt_addr_valid+0x267/0x278\n[ 419.952979] ? kmem_cache_debug_flags+0xc/0x1d\n[ 419.953561] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.954231] kasan_report+0x89/0xb0\n[ 419.954748] ? hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955367] hfsplus_read_wrapper+0x659/0xa0a\n[ 419.955948] ? __pfx_hfsplus_read_wrapper+0x10/0x10\n[ 419.956618] ? do_raw_spin_unlock+0x59/0x1a9\n[ 419.957214] ? _raw_spin_unlock+0x1a/0x2e\n[ 419.957772] hfsplus_fill_super+0x348/0x1590\n[ 419.958355] ? hlock_class+0x4c/0x109\n[ 419.958867] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.959499] ? __pfx_string+0x10/0x10\n[ 419.960006] ? lock_acquire+0x3e2/0x454\n[ 419.960532] ? bdev_name.constprop.0+0xce/0x243\n[ 419.961129] ? __pfx_bdev_name.constprop.0+0x10/0x10\n[ 419.961799] ? pointer+0x3f0/0x62f\n[ 419.962277] ? __pfx_pointer+0x10/0x10\n[ 419.962761] ? vsnprintf+0x6c4/0xfba\n[ 419.963178] ? __pfx_vsnprintf+0x10/0x10\n[ 419.963621] ? setup_bdev_super+0x376/0x3b3\n[ 419.964029] ? snprintf+0x9d/0xd2\n[ 419.964344] ? __pfx_snprintf+0x10/0x10\n[ 419.964675] ? lock_acquired+0x45c/0x5e9\n[ 419.965016] ? set_blocksize+0x139/0x1c1\n[ 419.965381] ? sb_set_blocksize+0x6d/0xae\n[ 419.965742] ? __pfx_hfsplus_fill_super+0x10/0x10\n[ 419.966179] mount_bdev+0x12f/0x1bf\n[ 419.966512] ? __pfx_mount_bdev+0x10/0x10\n[ 419.966886] ? vfs_parse_fs_string+0xce/0x111\n[ 419.967293] ? __pfx_vfs_parse_fs_string+0x10/0x10\n[ 419.967702] ? __pfx_hfsplus_mount+0x10/0x10\n[ 419.968073] legacy_get_tree+0x104/0x178\n[ 419.968414] vfs_get_tree+0x86/0x296\n[ 419.968751] path_mount+0xba3/0xd0b\n[ 419.969157] ? __pfx_path_mount+0x10/0x10\n[ 419.969594] ? kmem_cache_free+0x1e2/0x260\n[ 419.970311] do_mount+0x99/0xe0\n[ 419.970630] ? __pfx_do_mount+0x10/0x10\n[ 419.971008] __do_sys_mount+0x199/0x1c9\n[ 419.971397] do_syscall_64+0xd0/0x135\n[ 419.971761] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 419.972233] RIP: 0033:0x7c3cb812972e\n[ 419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48\n[ 419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5\n[ 419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e\n[ 419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56548", url: "https://www.suse.com/security/cve/CVE-2024-56548", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-56548", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1235073 for CVE-2024-56548", url: "https://bugzilla.suse.com/1235073", }, { category: "external", summary: "SUSE Bug 1235074 for CVE-2024-56548", url: "https://bugzilla.suse.com/1235074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-56548", }, { cve: "CVE-2024-56551", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56551", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix usage slab after free\n\n[ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]\n[ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147\n\n[ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1\n[ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[ +0.000016] Call Trace:\n[ +0.000008] <TASK>\n[ +0.000009] dump_stack_lvl+0x76/0xa0\n[ +0.000017] print_report+0xce/0x5f0\n[ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]\n[ +0.000019] ? srso_return_thunk+0x5/0x5f\n[ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200\n[ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]\n[ +0.000019] kasan_report+0xbe/0x110\n[ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]\n[ +0.000023] __asan_report_load8_noabort+0x14/0x30\n[ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]\n[ +0.000020] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? __kasan_check_write+0x14/0x30\n[ +0.000016] ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched]\n[ +0.000020] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? __kasan_check_write+0x14/0x30\n[ +0.000013] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? enable_work+0x124/0x220\n[ +0.000015] ? __pfx_enable_work+0x10/0x10\n[ +0.000013] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? free_large_kmalloc+0x85/0xf0\n[ +0.000016] drm_sched_entity_destroy+0x18/0x30 [gpu_sched]\n[ +0.000020] amdgpu_vce_sw_fini+0x55/0x170 [amdgpu]\n[ +0.000735] ? __kasan_check_read+0x11/0x20\n[ +0.000016] vce_v4_0_sw_fini+0x80/0x110 [amdgpu]\n[ +0.000726] amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu]\n[ +0.000679] ? mutex_unlock+0x80/0xe0\n[ +0.000017] ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu]\n[ +0.000662] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? __kasan_check_write+0x14/0x30\n[ +0.000013] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? mutex_unlock+0x80/0xe0\n[ +0.000016] amdgpu_driver_release_kms+0x16/0x80 [amdgpu]\n[ +0.000663] drm_minor_release+0xc9/0x140 [drm]\n[ +0.000081] drm_release+0x1fd/0x390 [drm]\n[ +0.000082] __fput+0x36c/0xad0\n[ +0.000018] __fput_sync+0x3c/0x50\n[ +0.000014] __x64_sys_close+0x7d/0xe0\n[ +0.000014] x64_sys_call+0x1bc6/0x2680\n[ +0.000014] do_syscall_64+0x70/0x130\n[ +0.000014] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? irqentry_exit_to_user_mode+0x60/0x190\n[ +0.000015] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? irqentry_exit+0x43/0x50\n[ +0.000012] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? exc_page_fault+0x7c/0x110\n[ +0.000015] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ +0.000014] RIP: 0033:0x7ffff7b14f67\n[ +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff\n[ +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003\n[ +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67\n[ +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003\n[ +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000\n[ +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8\n[ +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040\n[ +0.000020] </TASK>\n\n[ +0.000016] Allocated by task 383 on cpu 7 at 26.880319s:\n[ +0.000014] kasan_save_stack+0x28/0x60\n[ +0.000008] kasan_save_track+0x18/0x70\n[ +0.000007] kasan_save_alloc_info+0x38/0x60\n[ +0.000007] __kasan_kmalloc+0xc1/0xd0\n[ +0.000007] kmalloc_trace_noprof+0x180/0x380\n[ +0.000007] drm_sched_init+0x411/0xec0 [gpu_sched]\n[ +0.000012] amdgpu_device_init+0x695f/0xa610 [amdgpu]\n[ +0.000658] amdgpu_driver_load_kms+0x1a/0x120 [amdgpu]\n[ +0.000662] amdgpu_pci_p\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56551", url: "https://www.suse.com/security/cve/CVE-2024-56551", }, { category: "external", summary: "SUSE Bug 1235075 for CVE-2024-56551", url: "https://bugzilla.suse.com/1235075", }, { category: "external", summary: "SUSE Bug 1235102 for CVE-2024-56551", url: "https://bugzilla.suse.com/1235102", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56551", }, { cve: "CVE-2024-56569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56569", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix regression with module command in stack_trace_filter\n\nWhen executing the following command:\n\n # echo \"write*:mod:ext3\" > /sys/kernel/tracing/stack_trace_filter\n\nThe current mod command causes a null pointer dereference. While commit\n0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\")\nhas addressed part of the issue, it left a corner case unhandled, which still\nresults in a kernel crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56569", url: "https://www.suse.com/security/cve/CVE-2024-56569", }, { category: "external", summary: "SUSE Bug 1235031 for CVE-2024-56569", url: "https://bugzilla.suse.com/1235031", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56569", }, { cve: "CVE-2024-56570", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56570", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56570", url: "https://www.suse.com/security/cve/CVE-2024-56570", }, { category: "external", summary: "SUSE Bug 1235035 for CVE-2024-56570", url: "https://bugzilla.suse.com/1235035", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56570", }, { cve: "CVE-2024-56587", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56587", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: class: Protect brightness_show() with led_cdev->led_access mutex\n\nThere is NULL pointer issue observed if from Process A where hid device\nbeing added which results in adding a led_cdev addition and later a\nanother call to access of led_cdev attribute from Process B can result\nin NULL pointer issue.\n\nUse mutex led_cdev->led_access to protect access to led->cdev and its\nattribute inside brightness_show() and max_brightness_show() and also\nupdate the comment for mutex that it should be used to protect the led\nclass device fields.\n\n\tProcess A \t\t\t\tProcess B\n\n kthread+0x114\n worker_thread+0x244\n process_scheduled_works+0x248\n uhid_device_add_worker+0x24\n hid_add_device+0x120\n device_add+0x268\n bus_probe_device+0x94\n device_initial_probe+0x14\n __device_attach+0xfc\n bus_for_each_drv+0x10c\n __device_attach_driver+0x14c\n driver_probe_device+0x3c\n __driver_probe_device+0xa0\n really_probe+0x190\n hid_device_probe+0x130\n ps_probe+0x990\n ps_led_register+0x94\n devm_led_classdev_register_ext+0x58\n led_classdev_register_ext+0x1f8\n device_create_with_groups+0x48\n device_create_groups_vargs+0xc8\n device_add+0x244\n kobject_uevent+0x14\n kobject_uevent_env[jt]+0x224\n mutex_unlock[jt]+0xc4\n __mutex_unlock_slowpath+0xd4\n wake_up_q+0x70\n try_to_wake_up[jt]+0x48c\n preempt_schedule_common+0x28\n __schedule+0x628\n __switch_to+0x174\n\t\t\t\t\t\tel0t_64_sync+0x1a8/0x1ac\n\t\t\t\t\t\tel0t_64_sync_handler+0x68/0xbc\n\t\t\t\t\t\tel0_svc+0x38/0x68\n\t\t\t\t\t\tdo_el0_svc+0x1c/0x28\n\t\t\t\t\t\tel0_svc_common+0x80/0xe0\n\t\t\t\t\t\tinvoke_syscall+0x58/0x114\n\t\t\t\t\t\t__arm64_sys_read+0x1c/0x2c\n\t\t\t\t\t\tksys_read+0x78/0xe8\n\t\t\t\t\t\tvfs_read+0x1e0/0x2c8\n\t\t\t\t\t\tkernfs_fop_read_iter+0x68/0x1b4\n\t\t\t\t\t\tseq_read_iter+0x158/0x4ec\n\t\t\t\t\t\tkernfs_seq_show+0x44/0x54\n\t\t\t\t\t\tsysfs_kf_seq_show+0xb4/0x130\n\t\t\t\t\t\tdev_attr_show+0x38/0x74\n\t\t\t\t\t\tbrightness_show+0x20/0x4c\n\t\t\t\t\t\tdualshock4_led_get_brightness+0xc/0x74\n\n[ 3313.874295][ T4013] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060\n[ 3313.874301][ T4013] Mem abort info:\n[ 3313.874303][ T4013] ESR = 0x0000000096000006\n[ 3313.874305][ T4013] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 3313.874307][ T4013] SET = 0, FnV = 0\n[ 3313.874309][ T4013] EA = 0, S1PTW = 0\n[ 3313.874311][ T4013] FSC = 0x06: level 2 translation fault\n[ 3313.874313][ T4013] Data abort info:\n[ 3313.874314][ T4013] ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000\n[ 3313.874316][ T4013] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 3313.874318][ T4013] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 3313.874320][ T4013] user pgtable: 4k pages, 39-bit VAs, pgdp=00000008f2b0a000\n..\n\n[ 3313.874332][ T4013] Dumping ftrace buffer:\n[ 3313.874334][ T4013] (ftrace buffer empty)\n..\n..\n[ dd3313.874639][ T4013] CPU: 6 PID: 4013 Comm: InputReader\n[ 3313.874648][ T4013] pc : dualshock4_led_get_brightness+0xc/0x74\n[ 3313.874653][ T4013] lr : led_update_brightness+0x38/0x60\n[ 3313.874656][ T4013] sp : ffffffc0b910bbd0\n..\n..\n[ 3313.874685][ T4013] Call trace:\n[ 3313.874687][ T4013] dualshock4_led_get_brightness+0xc/0x74\n[ 3313.874690][ T4013] brightness_show+0x20/0x4c\n[ 3313.874692][ T4013] dev_attr_show+0x38/0x74\n[ 3313.874696][ T4013] sysfs_kf_seq_show+0xb4/0x130\n[ 3313.874700][ T4013] kernfs_seq_show+0x44/0x54\n[ 3313.874703][ T4013] seq_read_iter+0x158/0x4ec\n[ 3313.874705][ T4013] kernfs_fop_read_iter+0x68/0x1b4\n[ 3313.874708][ T4013] vfs_read+0x1e0/0x2c8\n[ 3313.874711][ T4013] ksys_read+0x78/0xe8\n[ 3313.874714][ T4013] __arm64_sys_read+0x1c/0x2c\n[ 3313.874718][ T4013] invoke_syscall+0x58/0x114\n[ 3313.874721][ T4013] el0_svc_common+0x80/0xe0\n[ 3313.874724][ T4013] do_el0_svc+0x1c/0x28\n[ 3313.874727][ T4013] el0_svc+0x38/0x68\n[ 3313.874730][ T4013] el0t_64_sync_handler+0x68/0xbc\n[ 3313.874732][ T4013] el0t_64_sync+0x1a8/0x1ac", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56587", url: "https://www.suse.com/security/cve/CVE-2024-56587", }, { category: "external", summary: "SUSE Bug 1235125 for CVE-2024-56587", url: "https://bugzilla.suse.com/1235125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56587", }, { cve: "CVE-2024-56599", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56599", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: avoid NULL pointer error during sdio remove\n\nWhen running 'rmmod ath10k', ath10k_sdio_remove() will free sdio\nworkqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON\nis set to yes, kernel panic will happen:\nCall trace:\n destroy_workqueue+0x1c/0x258\n ath10k_sdio_remove+0x84/0x94\n sdio_bus_remove+0x50/0x16c\n device_release_driver_internal+0x188/0x25c\n device_driver_detach+0x20/0x2c\n\nThis is because during 'rmmod ath10k', ath10k_sdio_remove() will call\nath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()\nwill finally be called in ath10k_core_destroy(). This function will free\nstruct cfg80211_registered_device *rdev and all its members, including\nwiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio\nworkqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.\n\nAfter device release, destroy_workqueue() will use NULL pointer then the\nkernel panic happen.\n\nCall trace:\nath10k_sdio_remove\n ->ath10k_core_unregister\n ……\n ->ath10k_core_stop\n ->ath10k_hif_stop\n ->ath10k_sdio_irq_disable\n ->ath10k_hif_power_down\n ->del_timer_sync(&ar_sdio->sleep_timer)\n ->ath10k_core_destroy\n ->ath10k_mac_destroy\n ->ieee80211_free_hw\n ->wiphy_free\n ……\n ->wiphy_dev_release\n ->destroy_workqueue\n\nNeed to call destroy_workqueue() before ath10k_core_destroy(), free\nthe work queue buffer first and then free pointer of work queue by\nath10k_core_destroy(). This order matches the error path order in\nath10k_sdio_probe().\n\nNo work will be queued on sdio workqueue between it is destroyed and\nath10k_core_destroy() is called. Based on the call_stack above, the\nreason is:\nOnly ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and\nath10k_sdio_irq_disable() will queue work on sdio workqueue.\nSleep timer will be deleted before ath10k_core_destroy() in\nath10k_hif_power_down().\nath10k_sdio_irq_disable() only be called in ath10k_hif_stop().\nath10k_core_unregister() will call ath10k_hif_power_down() to stop hif\nbus, so ath10k_sdio_hif_tx_sg() won't be called anymore.\n\nTested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56599", url: "https://www.suse.com/security/cve/CVE-2024-56599", }, { category: "external", summary: "SUSE Bug 1235138 for CVE-2024-56599", url: "https://bugzilla.suse.com/1235138", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56599", }, { cve: "CVE-2024-5660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-5660", }, ], notes: [ { category: "general", text: "Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710, Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925, Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2 may permit bypass of Stage-2 translation and/or GPT protection.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-5660", url: "https://www.suse.com/security/cve/CVE-2024-5660", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "critical", }, ], title: "CVE-2024-5660", }, { cve: "CVE-2024-56603", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56603", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: af_can: do not leave a dangling sk pointer in can_create()\n\nOn error can_create() frees the allocated sk object, but sock_init_data()\nhas already attached it to the provided sock object. This will leave a\ndangling sk pointer in the sock object and may cause use-after-free later.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56603", url: "https://www.suse.com/security/cve/CVE-2024-56603", }, { category: "external", summary: "SUSE Bug 1235415 for CVE-2024-56603", url: "https://bugzilla.suse.com/1235415", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56603", }, { cve: "CVE-2024-56604", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56604", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()\n\nbt_sock_alloc() attaches allocated sk object to the provided sock object.\nIf rfcomm_dlc_alloc() fails, we release the sk object, but leave the\ndangling pointer in the sock object, which may cause use-after-free.\n\nFix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56604", url: "https://www.suse.com/security/cve/CVE-2024-56604", }, { category: "external", summary: "SUSE Bug 1235056 for CVE-2024-56604", url: "https://bugzilla.suse.com/1235056", }, { category: "external", summary: "SUSE Bug 1235058 for CVE-2024-56604", url: "https://bugzilla.suse.com/1235058", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-56604", }, { cve: "CVE-2024-56605", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56605", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56605", url: "https://www.suse.com/security/cve/CVE-2024-56605", }, { category: "external", summary: "SUSE Bug 1234853 for CVE-2024-56605", url: "https://bugzilla.suse.com/1234853", }, { category: "external", summary: "SUSE Bug 1235061 for CVE-2024-56605", url: "https://bugzilla.suse.com/1235061", }, { category: "external", summary: "SUSE Bug 1235062 for CVE-2024-56605", url: "https://bugzilla.suse.com/1235062", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-56605", }, { cve: "CVE-2024-56606", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56606", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\naf_packet: avoid erroring out after sock_init_data() in packet_create()\n\nAfter sock_init_data() the allocated sk object is attached to the provided\nsock object. On error, packet_create() frees the sk object leaving the\ndangling pointer in the sock object on return. Some other code may try\nto use this pointer and cause use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56606", url: "https://www.suse.com/security/cve/CVE-2024-56606", }, { category: "external", summary: "SUSE Bug 1235417 for CVE-2024-56606", url: "https://bugzilla.suse.com/1235417", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56606", }, { cve: "CVE-2024-56616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56616", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Fix MST sideband message body length check\n\nFix the MST sideband message body length check, which must be at least 1\nbyte accounting for the message body CRC (aka message data CRC) at the\nend of the message.\n\nThis fixes a case where an MST branch device returns a header with a\ncorrect header CRC (indicating a correctly received body length), with\nthe body length being incorrectly set to 0. This will later lead to a\nmemory corruption in drm_dp_sideband_append_payload() and the following\nerrors in dmesg:\n\n UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25\n index -1 is out of range for type 'u8 [48]'\n Call Trace:\n drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]\n drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]\n\n memcpy: detected field-spanning write (size 18446744073709551615) of single field \"&msg->msg[msg->curlen]\" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)\n Call Trace:\n drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]\n drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56616", url: "https://www.suse.com/security/cve/CVE-2024-56616", }, { category: "external", summary: "SUSE Bug 1235427 for CVE-2024-56616", url: "https://bugzilla.suse.com/1235427", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56616", }, { cve: "CVE-2024-56631", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56631", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: sg: Fix slab-use-after-free read in sg_release()\n\nFix a use-after-free bug in sg_release(), detected by syzbot with KASAN:\n\nBUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30\nkernel/locking/lockdep.c:5838\n__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912\nsg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407\n\nIn sg_release(), the function kref_put(&sfp->f_ref, sg_remove_sfp) is\ncalled before releasing the open_rel_lock mutex. The kref_put() call may\ndecrement the reference count of sfp to zero, triggering its cleanup\nthrough sg_remove_sfp(). This cleanup includes scheduling deferred work\nvia sg_remove_sfp_usercontext(), which ultimately frees sfp.\n\nAfter kref_put(), sg_release() continues to unlock open_rel_lock and may\nreference sfp or sdp. If sfp has already been freed, this results in a\nslab-use-after-free error.\n\nMove the kref_put(&sfp->f_ref, sg_remove_sfp) call after unlocking the\nopen_rel_lock mutex. This ensures:\n\n - No references to sfp or sdp occur after the reference count is\n decremented.\n\n - Cleanup functions such as sg_remove_sfp() and\n sg_remove_sfp_usercontext() can safely execute without impacting the\n mutex handling in sg_release().\n\nThe fix has been tested and validated by syzbot. This patch closes the\nbug reported at the following syzkaller link and ensures proper\nsequencing of resource cleanup and mutex operations, eliminating the\nrisk of use-after-free errors in sg_release().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56631", url: "https://www.suse.com/security/cve/CVE-2024-56631", }, { category: "external", summary: "SUSE Bug 1235480 for CVE-2024-56631", url: "https://bugzilla.suse.com/1235480", }, { category: "external", summary: "SUSE Bug 1235482 for CVE-2024-56631", url: "https://bugzilla.suse.com/1235482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-56631", }, { cve: "CVE-2024-56642", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56642", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_exit_net() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56642", url: "https://www.suse.com/security/cve/CVE-2024-56642", }, { category: "external", summary: "SUSE Bug 1235433 for CVE-2024-56642", url: "https://bugzilla.suse.com/1235433", }, { category: "external", summary: "SUSE Bug 1235434 for CVE-2024-56642", url: "https://bugzilla.suse.com/1235434", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-56642", }, { cve: "CVE-2024-56664", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56664", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix race between element replace and close()\n\nElement replace (with a socket different from the one stored) may race\nwith socket's close() link popping & unlinking. __sock_map_delete()\nunconditionally unrefs the (wrong) element:\n\n// set map[0] = s0\nmap_update_elem(map, 0, s0)\n\n// drop fd of s0\nclose(s0)\n sock_map_close()\n lock_sock(sk) (s0!)\n sock_map_remove_links(sk)\n link = sk_psock_link_pop()\n sock_map_unlink(sk, link)\n sock_map_delete_from_link\n // replace map[0] with s1\n map_update_elem(map, 0, s1)\n sock_map_update_elem\n (s1!) lock_sock(sk)\n sock_map_update_common\n psock = sk_psock(sk)\n spin_lock(&stab->lock)\n osk = stab->sks[idx]\n sock_map_add_link(..., &stab->sks[idx])\n sock_map_unref(osk, &stab->sks[idx])\n psock = sk_psock(osk)\n sk_psock_put(sk, psock)\n if (refcount_dec_and_test(&psock))\n sk_psock_drop(sk, psock)\n spin_unlock(&stab->lock)\n unlock_sock(sk)\n __sock_map_delete\n spin_lock(&stab->lock)\n sk = *psk // s1 replaced s0; sk == s1\n if (!sk_test || sk_test == sk) // sk_test (s0) != sk (s1); no branch\n sk = xchg(psk, NULL)\n if (sk)\n sock_map_unref(sk, psk) // unref s1; sks[idx] will dangle\n psock = sk_psock(sk)\n sk_psock_put(sk, psock)\n if (refcount_dec_and_test())\n sk_psock_drop(sk, psock)\n spin_unlock(&stab->lock)\n release_sock(sk)\n\nThen close(map) enqueues bpf_map_free_deferred, which finally calls\nsock_map_free(). This results in some refcount_t warnings along with\na KASAN splat [1].\n\nFix __sock_map_delete(), do not allow sock_map_unref() on elements that\nmay have been replaced.\n\n[1]:\nBUG: KASAN: slab-use-after-free in sock_map_free+0x10e/0x330\nWrite of size 4 at addr ffff88811f5b9100 by task kworker/u64:12/1063\n\nCPU: 14 UID: 0 PID: 1063 Comm: kworker/u64:12 Not tainted 6.12.0+ #125\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\nWorkqueue: events_unbound bpf_map_free_deferred\nCall Trace:\n <TASK>\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n kasan_check_range+0x10f/0x1e0\n sock_map_free+0x10e/0x330\n bpf_map_free_deferred+0x173/0x320\n process_one_work+0x846/0x1420\n worker_thread+0x5b3/0xf80\n kthread+0x29e/0x360\n ret_from_fork+0x2d/0x70\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 1202:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n unix_create1+0x88/0x8a0\n unix_create+0xc5/0x180\n __sock_create+0x241/0x650\n __sys_socketpair+0x1ce/0x420\n __x64_sys_socketpair+0x92/0x100\n do_syscall_64+0x93/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 46:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n sk_psock_destroy+0x73e/0xa50\n process_one_work+0x846/0x1420\n worker_thread+0x5b3/0xf80\n kthread+0x29e/0x360\n ret_from_fork+0x2d/0x70\n ret_from_fork_asm+0x1a/0x30\n\nThe bu\n---truncated---", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56664", url: "https://www.suse.com/security/cve/CVE-2024-56664", }, { category: "external", summary: "SUSE Bug 1235249 for CVE-2024-56664", url: "https://bugzilla.suse.com/1235249", }, { category: "external", summary: "SUSE Bug 1235250 for CVE-2024-56664", url: "https://bugzilla.suse.com/1235250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56664", }, { cve: "CVE-2024-56704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56704", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\n9p/xen: fix release of IRQ\n\nKernel logs indicate an IRQ was double-freed.\n\nPass correct device ID during IRQ release.\n\n[Dominique: remove confusing variable reset to 0]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56704", url: "https://www.suse.com/security/cve/CVE-2024-56704", }, { category: "external", summary: "SUSE Bug 1235584 for CVE-2024-56704", url: "https://bugzilla.suse.com/1235584", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56704", }, { cve: "CVE-2024-56724", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56724", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device\n\nWhile design wise the idea of converting the driver to use\nthe hierarchy of the IRQ chips is correct, the implementation\nhas (inherited) flaws. This was unveiled when platform_get_irq()\nhad started WARN() on IRQ 0 that is supposed to be a Linux\nIRQ number (also known as vIRQ).\n\nRework the driver to respect IRQ domain when creating each MFD\ndevice separately, as the domain is not the same for all of them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56724", url: "https://www.suse.com/security/cve/CVE-2024-56724", }, { category: "external", summary: "SUSE Bug 1235577 for CVE-2024-56724", url: "https://bugzilla.suse.com/1235577", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56724", }, { cve: "CVE-2024-56756", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56756", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix freeing of the HMB descriptor table\n\nThe HMB descriptor table is sized to the maximum number of descriptors\nthat could be used for a given device, but __nvme_alloc_host_mem could\nbreak out of the loop earlier on memory allocation failure and end up\nusing less descriptors than planned for, which leads to an incorrect\nsize passed to dma_free_coherent.\n\nIn practice this was not showing up because the number of descriptors\ntends to be low and the dma coherent allocator always allocates and\nfrees at least a page.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56756", url: "https://www.suse.com/security/cve/CVE-2024-56756", }, { category: "external", summary: "SUSE Bug 1234922 for CVE-2024-56756", url: "https://bugzilla.suse.com/1234922", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-56756", }, { cve: "CVE-2024-57791", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-57791", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check return value of sock_recvmsg when draining clc data\n\nWhen receiving clc msg, the field length in smc_clc_msg_hdr indicates the\nlength of msg should be received from network and the value should not be\nfully trusted as it is from the network. Once the value of length exceeds\nthe value of buflen in function smc_clc_wait_msg it may run into deadloop\nwhen trying to drain the remaining data exceeding buflen.\n\nThis patch checks the return value of sock_recvmsg when draining data in\ncase of deadloop in draining.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-57791", url: "https://www.suse.com/security/cve/CVE-2024-57791", }, { category: "external", summary: "SUSE Bug 1235759 for CVE-2024-57791", url: "https://bugzilla.suse.com/1235759", }, { category: "external", summary: "SUSE Bug 1235760 for CVE-2024-57791", url: "https://bugzilla.suse.com/1235760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-57791", }, { cve: "CVE-2024-57849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-57849", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/cpum_sf: Handle CPU hotplug remove during sampling\n\nCPU hotplug remove handling triggers the following function\ncall sequence:\n\n CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu()\n ...\n CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu()\n\nThe s390 CPUMF sampling CPU hotplug handler invokes:\n\n s390_pmu_sf_offline_cpu()\n +--> cpusf_pmu_setup()\n +--> setup_pmc_cpu()\n +--> deallocate_buffers()\n\nThis function de-allocates all sampling data buffers (SDBs) allocated\nfor that CPU at event initialization. It also clears the\nPMU_F_RESERVED bit. The CPU is gone and can not be sampled.\n\nWith the event still being active on the removed CPU, the CPU event\nhotplug support in kernel performance subsystem triggers the\nfollowing function calls on the removed CPU:\n\n perf_event_exit_cpu()\n +--> perf_event_exit_cpu_context()\n +--> __perf_event_exit_context()\n\t +--> __perf_remove_from_context()\n\t +--> event_sched_out()\n\t +--> cpumsf_pmu_del()\n\t +--> cpumsf_pmu_stop()\n +--> hw_perf_event_update()\n\nto stop and remove the event. During removal of the event, the\nsampling device driver tries to read out the remaining samples from\nthe sample data buffers (SDBs). But they have already been freed\n(and may have been re-assigned). This may lead to a use after free\nsituation in which case the samples are most likely invalid. In the\nbest case the memory has not been reassigned and still contains\nvalid data.\n\nRemedy this situation and check if the CPU is still in reserved\nstate (bit PMU_F_RESERVED set). In this case the SDBs have not been\nreleased an contain valid data. This is always the case when\nthe event is removed (and no CPU hotplug off occured).\nIf the PMU_F_RESERVED bit is not set, the SDB buffers are gone.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-57849", url: "https://www.suse.com/security/cve/CVE-2024-57849", }, { category: "external", summary: "SUSE Bug 1235814 for CVE-2024-57849", url: "https://bugzilla.suse.com/1235814", }, { category: "external", summary: "SUSE Bug 1235815 for CVE-2024-57849", url: "https://bugzilla.suse.com/1235815", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-57849", }, { cve: "CVE-2024-57887", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-57887", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: adv7511: Fix use-after-free in adv7533_attach_dsi()\n\nThe host_node pointer was assigned and freed in adv7533_parse_dt(), and\nlater, adv7533_attach_dsi() uses the same. Fix this use-after-free issue\nby dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()\nin error path of probe() and also in the remove().", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-57887", url: "https://www.suse.com/security/cve/CVE-2024-57887", }, { category: "external", summary: "SUSE Bug 1235952 for CVE-2024-57887", url: "https://bugzilla.suse.com/1235952", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-57887", }, { cve: "CVE-2024-57888", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-57888", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nworkqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker\n\nAfter commit\n746ae46c1113 (\"drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM\")\namdgpu started seeing the following warning:\n\n [ ] workqueue: WQ_MEM_RECLAIM sdma0:drm_sched_run_job_work [gpu_sched] is flushing !WQ_MEM_RECLAIM events:amdgpu_device_delay_enable_gfx_off [amdgpu]\n...\n [ ] Workqueue: sdma0 drm_sched_run_job_work [gpu_sched]\n...\n [ ] Call Trace:\n [ ] <TASK>\n...\n [ ] ? check_flush_dependency+0xf5/0x110\n...\n [ ] cancel_delayed_work_sync+0x6e/0x80\n [ ] amdgpu_gfx_off_ctrl+0xab/0x140 [amdgpu]\n [ ] amdgpu_ring_alloc+0x40/0x50 [amdgpu]\n [ ] amdgpu_ib_schedule+0xf4/0x810 [amdgpu]\n [ ] ? drm_sched_run_job_work+0x22c/0x430 [gpu_sched]\n [ ] amdgpu_job_run+0xaa/0x1f0 [amdgpu]\n [ ] drm_sched_run_job_work+0x257/0x430 [gpu_sched]\n [ ] process_one_work+0x217/0x720\n...\n [ ] </TASK>\n\nThe intent of the verifcation done in check_flush_depedency is to ensure\nforward progress during memory reclaim, by flagging cases when either a\nmemory reclaim process, or a memory reclaim work item is flushed from a\ncontext not marked as memory reclaim safe.\n\nThis is correct when flushing, but when called from the\ncancel(_delayed)_work_sync() paths it is a false positive because work is\neither already running, or will not be running at all. Therefore\ncancelling it is safe and we can relax the warning criteria by letting the\nhelper know of the calling context.\n\nReferences: 746ae46c1113 (\"drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM\")", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-57888", url: "https://www.suse.com/security/cve/CVE-2024-57888", }, { category: "external", summary: "SUSE Bug 1235918 for CVE-2024-57888", url: "https://bugzilla.suse.com/1235918", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-57888", }, { cve: "CVE-2024-57892", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-57892", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix slab-use-after-free due to dangling pointer dqi_priv\n\nWhen mounting ocfs2 and then remounting it as read-only, a\nslab-use-after-free occurs after the user uses a syscall to\nquota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the\ndangling pointer.\n\nDuring the remounting process, the pointer dqi_priv is freed but is never\nset as null leaving it to be accessed. Additionally, the read-only option\nfor remounting sets the DQUOT_SUSPENDED flag instead of setting the\nDQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the\nnext quota, the function ocfs2_get_next_id is called and only checks the\nquota usage flags and not the quota suspended flags.\n\nTo fix this, I set dqi_priv to null when it is freed after remounting with\nread-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id.\n\n[akpm@linux-foundation.org: coding-style cleanups]", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-57892", url: "https://www.suse.com/security/cve/CVE-2024-57892", }, { category: "external", summary: "SUSE Bug 1235964 for CVE-2024-57892", url: "https://bugzilla.suse.com/1235964", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "moderate", }, ], title: "CVE-2024-57892", }, { cve: "CVE-2024-57893", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-57893", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-57893", url: "https://www.suse.com/security/cve/CVE-2024-57893", }, { category: "external", summary: "SUSE Bug 1235920 for CVE-2024-57893", url: "https://bugzilla.suse.com/1235920", }, { category: "external", summary: "SUSE Bug 1235921 for CVE-2024-57893", url: "https://bugzilla.suse.com/1235921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-57893", }, { cve: "CVE-2024-8805", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-8805", }, ], notes: [ { category: "general", text: "BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-8805", url: "https://www.suse.com/security/cve/CVE-2024-8805", }, { category: "external", summary: "SUSE Bug 1230697 for CVE-2024-8805", url: "https://bugzilla.suse.com/1230697", }, { category: "external", summary: "SUSE Bug 1240804 for CVE-2024-8805", url: "https://bugzilla.suse.com/1240804", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_244-default-1-8.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.244.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.244.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.244.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-01-24T17:02:35Z", details: "important", }, ], title: "CVE-2024-8805", }, ], }
fkie_cve-2024-53057
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | 6.12 | |
linux | linux_kernel | 6.12 | |
linux | linux_kernel | 6.12 | |
linux | linux_kernel | 6.12 | |
linux | linux_kernel | 6.12 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "CC1BB872-C9E6-412A-A696-AAF936DC97C5", versionEndExcluding: "4.19.323", versionStartIncluding: "2.6.25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B5A89369-320F-47FC-8695-56F61F87E4C0", versionEndExcluding: "5.4.285", versionStartIncluding: "4.20", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "1A03CABE-9B43-4E7F-951F-10DEEADAA426", versionEndExcluding: "5.10.229", versionStartIncluding: "5.5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "2BE18665-48ED-417A-90AA-41F3AC0B4E9A", versionEndExcluding: "5.15.171", versionStartIncluding: "5.11", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "43EFDC15-E4D4-4F1E-B70D-62F0854BFDF3", versionEndExcluding: "6.1.116", versionStartIncluding: "5.16", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "75088E5E-2400-4D20-915F-7A65C55D9CCD", versionEndExcluding: "6.6.60", versionStartIncluding: "6.2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "E96F53A4-5E87-4A70-BD9A-BC327828D57F", versionEndExcluding: "6.11.7", versionStartIncluding: "6.7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", matchCriteriaId: "7F361E1D-580F-4A2D-A509-7615F73167A1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", matchCriteriaId: "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", matchCriteriaId: "3C95E234-D335-4B6C-96BF-E2CEBD8654ED", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", matchCriteriaId: "E0F717D8-3014-4F84-8086-0124B2111379", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", matchCriteriaId: "24DBE6C7-2AAE-4818-AED2-E131F153D2FA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT\n\nIn qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed\nto be either root or ingress. This assumption is bogus since it's valid\nto create egress qdiscs with major handle ffff:\nBudimir Markovic found that for qdiscs like DRR that maintain an active\nclass list, it will cause a UAF with a dangling class pointer.\n\nIn 066a3b5b2346, the concern was to avoid iterating over the ingress\nqdisc since its parent is itself. The proper fix is to stop when parent\nTC_H_ROOT is reached because the only way to retrieve ingress is when a\nhierarchy which does not contain a ffff: major handle call into\nqdisc_lookup with TC_H_MAJ(TC_H_ROOT).\n\nIn the scenario where major ffff: is an egress qdisc in any of the tree\nlevels, the updates will also propagate to TC_H_ROOT, which then the\niteration must stop.\n\n\n net/sched/sch_api.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)", }, { lang: "es", value: "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: stop qdisc_tree_reduce_backlog en TC_H_ROOT En qdisc_tree_reduce_backlog, se supone que las Qdisc con el identificador principal ffff: son raíz o de entrada. Esta suposición es falsa ya que es válido crear qdiscs de salida con el identificador principal ffff: Budimir Markovic descubrió que para las qdisc como DRR que mantienen una lista de clases activa, provocará un UAF con un puntero de clase colgante. En 066a3b5b2346, la preocupación era evitar iterar sobre la qdisc de entrada ya que su padre es ella misma. La solución adecuada es detener cuando se alcanza el padre TC_H_ROOT porque la única forma de recuperar la entrada es cuando una jerarquía que no contiene un identificador principal ffff: llama a qdisc_lookup con TC_H_MAJ(TC_H_ROOT). En el escenario donde el ffff principal es una qdisc de salida en cualquiera de los niveles del árbol, las actualizaciones también se propagarán a TC_H_ROOT, donde luego la iteración debe detenerse. net/sched/sch_api.c | 2 +- 1 archivo modificado, 1 inserción(+), 1 eliminación(-)", }, ], id: "CVE-2024-53057", lastModified: "2024-12-11T15:15:17.757", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-11-19T18:15:25.700", references: [ { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/05df1b1dff8f197f1c275b57ccb2ca33021df552", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/2e95c4384438adeaa772caa560244b1a2efef816", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/580b3189c1972aff0f993837567d36392e9d981b", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/597cf9748c3477bf61bc35f0634129f56764ad24", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/9995909615c3431a5304c1210face5f268d24dba", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/ce691c814bc7a3c30c220ffb5b7422715458fd9b", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/dbe778b08b5101df9e89bc06e0a3a7ecd2f4ef20", }, { source: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", tags: [ "Patch", ], url: "https://git.kernel.org/stable/c/e7f9a6f97eb067599a74f3bcb6761976b0ed303e", }, ], sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-416", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.