Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:3227-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 69 vulnerabilities and has 17 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576).
- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
The following non-security bugs were fixed:
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3227=1
-
SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3227=1
-
SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3227=1
-
SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3227=1
Package List:
-
SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
- kernel-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
- kernel-rt-debugsource-5.14.21-150400.15.91.3
- kernel-rt-debuginfo-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
- kernel-source-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
- kernel-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro 5.3 (x86_64)
- kernel-rt-debugsource-5.14.21-150400.15.91.3
- kernel-rt-debuginfo-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro 5.3 (noarch)
- kernel-source-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
- kernel-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
- kernel-rt-debugsource-5.14.21-150400.15.91.3
- kernel-rt-debuginfo-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
- kernel-source-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
- kernel-rt-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro 5.4 (x86_64)
- kernel-rt-debugsource-5.14.21-150400.15.91.3
- kernel-rt-debuginfo-5.14.21-150400.15.91.3
-
SUSE Linux Enterprise Micro 5.4 (noarch)
- kernel-source-rt-5.14.21-150400.15.91.3
References:
- https://www.suse.com/security/cve/CVE-2021-4441.html
- https://www.suse.com/security/cve/CVE-2022-48868.html
- https://www.suse.com/security/cve/CVE-2022-48869.html
- https://www.suse.com/security/cve/CVE-2022-48870.html
- https://www.suse.com/security/cve/CVE-2022-48871.html
- https://www.suse.com/security/cve/CVE-2022-48872.html
- https://www.suse.com/security/cve/CVE-2022-48873.html
- https://www.suse.com/security/cve/CVE-2022-48875.html
- https://www.suse.com/security/cve/CVE-2022-48878.html
- https://www.suse.com/security/cve/CVE-2022-48880.html
- https://www.suse.com/security/cve/CVE-2022-48890.html
- https://www.suse.com/security/cve/CVE-2022-48891.html
- https://www.suse.com/security/cve/CVE-2022-48896.html
- https://www.suse.com/security/cve/CVE-2022-48898.html
- https://www.suse.com/security/cve/CVE-2022-48899.html
- https://www.suse.com/security/cve/CVE-2022-48903.html
- https://www.suse.com/security/cve/CVE-2022-48904.html
- https://www.suse.com/security/cve/CVE-2022-48905.html
- https://www.suse.com/security/cve/CVE-2022-48907.html
- https://www.suse.com/security/cve/CVE-2022-48909.html
- https://www.suse.com/security/cve/CVE-2022-48912.html
- https://www.suse.com/security/cve/CVE-2022-48913.html
- https://www.suse.com/security/cve/CVE-2022-48914.html
- https://www.suse.com/security/cve/CVE-2022-48915.html
- https://www.suse.com/security/cve/CVE-2022-48916.html
- https://www.suse.com/security/cve/CVE-2022-48917.html
- https://www.suse.com/security/cve/CVE-2022-48918.html
- https://www.suse.com/security/cve/CVE-2022-48919.html
- https://www.suse.com/security/cve/CVE-2022-48921.html
- https://www.suse.com/security/cve/CVE-2022-48924.html
- https://www.suse.com/security/cve/CVE-2022-48925.html
- https://www.suse.com/security/cve/CVE-2022-48926.html
- https://www.suse.com/security/cve/CVE-2022-48927.html
- https://www.suse.com/security/cve/CVE-2022-48928.html
- https://www.suse.com/security/cve/CVE-2022-48929.html
- https://www.suse.com/security/cve/CVE-2022-48930.html
- https://www.suse.com/security/cve/CVE-2022-48931.html
- https://www.suse.com/security/cve/CVE-2022-48932.html
- https://www.suse.com/security/cve/CVE-2022-48934.html
- https://www.suse.com/security/cve/CVE-2022-48935.html
- https://www.suse.com/security/cve/CVE-2022-48937.html
- https://www.suse.com/security/cve/CVE-2022-48938.html
- https://www.suse.com/security/cve/CVE-2022-48941.html
- https://www.suse.com/security/cve/CVE-2022-48942.html
- https://www.suse.com/security/cve/CVE-2022-48943.html
- https://www.suse.com/security/cve/CVE-2023-52489.html
- https://www.suse.com/security/cve/CVE-2023-52893.html
- https://www.suse.com/security/cve/CVE-2023-52894.html
- https://www.suse.com/security/cve/CVE-2023-52896.html
- https://www.suse.com/security/cve/CVE-2023-52898.html
- https://www.suse.com/security/cve/CVE-2023-52900.html
- https://www.suse.com/security/cve/CVE-2023-52901.html
- https://www.suse.com/security/cve/CVE-2023-52905.html
- https://www.suse.com/security/cve/CVE-2023-52907.html
- https://www.suse.com/security/cve/CVE-2023-52911.html
- https://www.suse.com/security/cve/CVE-2024-40910.html
- https://www.suse.com/security/cve/CVE-2024-41009.html
- https://www.suse.com/security/cve/CVE-2024-41062.html
- https://www.suse.com/security/cve/CVE-2024-41087.html
- https://www.suse.com/security/cve/CVE-2024-42077.html
- https://www.suse.com/security/cve/CVE-2024-42126.html
- https://www.suse.com/security/cve/CVE-2024-42232.html
- https://www.suse.com/security/cve/CVE-2024-42271.html
- https://www.suse.com/security/cve/CVE-2024-43853.html
- https://www.suse.com/security/cve/CVE-2024-43861.html
- https://www.suse.com/security/cve/CVE-2024-43882.html
- https://www.suse.com/security/cve/CVE-2024-43883.html
- https://www.suse.com/security/cve/CVE-2024-44938.html
- https://www.suse.com/security/cve/CVE-2024-44947.html
- https://bugzilla.suse.com/show_bug.cgi?id=1193629
- https://bugzilla.suse.com/show_bug.cgi?id=1194111
- https://bugzilla.suse.com/show_bug.cgi?id=1194765
- https://bugzilla.suse.com/show_bug.cgi?id=1196261
- https://bugzilla.suse.com/show_bug.cgi?id=1196516
- https://bugzilla.suse.com/show_bug.cgi?id=1196894
- https://bugzilla.suse.com/show_bug.cgi?id=1198017
- https://bugzilla.suse.com/show_bug.cgi?id=1203360
- https://bugzilla.suse.com/show_bug.cgi?id=1206006
- https://bugzilla.suse.com/show_bug.cgi?id=1206258
- https://bugzilla.suse.com/show_bug.cgi?id=1207158
- https://bugzilla.suse.com/show_bug.cgi?id=1216834
- https://bugzilla.suse.com/show_bug.cgi?id=1221326
- https://bugzilla.suse.com/show_bug.cgi?id=1221645
- https://bugzilla.suse.com/show_bug.cgi?id=1223191
- https://bugzilla.suse.com/show_bug.cgi?id=1224105
- https://bugzilla.suse.com/show_bug.cgi?id=1227832
- https://bugzilla.suse.com/show_bug.cgi?id=1228020
- https://bugzilla.suse.com/show_bug.cgi?id=1228466
- https://bugzilla.suse.com/show_bug.cgi?id=1228516
- https://bugzilla.suse.com/show_bug.cgi?id=1228576
- https://bugzilla.suse.com/show_bug.cgi?id=1228718
- https://bugzilla.suse.com/show_bug.cgi?id=1228801
- https://bugzilla.suse.com/show_bug.cgi?id=1228959
- https://bugzilla.suse.com/show_bug.cgi?id=1229042
- https://bugzilla.suse.com/show_bug.cgi?id=1229292
- https://bugzilla.suse.com/show_bug.cgi?id=1229400
- https://bugzilla.suse.com/show_bug.cgi?id=1229454
- https://bugzilla.suse.com/show_bug.cgi?id=1229500
- https://bugzilla.suse.com/show_bug.cgi?id=1229503
- https://bugzilla.suse.com/show_bug.cgi?id=1229506
- https://bugzilla.suse.com/show_bug.cgi?id=1229507
- https://bugzilla.suse.com/show_bug.cgi?id=1229508
- https://bugzilla.suse.com/show_bug.cgi?id=1229509
- https://bugzilla.suse.com/show_bug.cgi?id=1229510
- https://bugzilla.suse.com/show_bug.cgi?id=1229512
- https://bugzilla.suse.com/show_bug.cgi?id=1229516
- https://bugzilla.suse.com/show_bug.cgi?id=1229522
- https://bugzilla.suse.com/show_bug.cgi?id=1229526
- https://bugzilla.suse.com/show_bug.cgi?id=1229528
- https://bugzilla.suse.com/show_bug.cgi?id=1229531
- https://bugzilla.suse.com/show_bug.cgi?id=1229533
- https://bugzilla.suse.com/show_bug.cgi?id=1229535
- https://bugzilla.suse.com/show_bug.cgi?id=1229536
- https://bugzilla.suse.com/show_bug.cgi?id=1229537
- https://bugzilla.suse.com/show_bug.cgi?id=1229540
- https://bugzilla.suse.com/show_bug.cgi?id=1229544
- https://bugzilla.suse.com/show_bug.cgi?id=1229554
- https://bugzilla.suse.com/show_bug.cgi?id=1229557
- https://bugzilla.suse.com/show_bug.cgi?id=1229565
- https://bugzilla.suse.com/show_bug.cgi?id=1229566
- https://bugzilla.suse.com/show_bug.cgi?id=1229568
- https://bugzilla.suse.com/show_bug.cgi?id=1229581
- https://bugzilla.suse.com/show_bug.cgi?id=1229598
- https://bugzilla.suse.com/show_bug.cgi?id=1229603
- https://bugzilla.suse.com/show_bug.cgi?id=1229604
- https://bugzilla.suse.com/show_bug.cgi?id=1229608
- https://bugzilla.suse.com/show_bug.cgi?id=1229611
- https://bugzilla.suse.com/show_bug.cgi?id=1229612
- https://bugzilla.suse.com/show_bug.cgi?id=1229613
- https://bugzilla.suse.com/show_bug.cgi?id=1229614
- https://bugzilla.suse.com/show_bug.cgi?id=1229617
- https://bugzilla.suse.com/show_bug.cgi?id=1229619
- https://bugzilla.suse.com/show_bug.cgi?id=1229620
- https://bugzilla.suse.com/show_bug.cgi?id=1229622
- https://bugzilla.suse.com/show_bug.cgi?id=1229623
- https://bugzilla.suse.com/show_bug.cgi?id=1229624
- https://bugzilla.suse.com/show_bug.cgi?id=1229625
- https://bugzilla.suse.com/show_bug.cgi?id=1229626
- https://bugzilla.suse.com/show_bug.cgi?id=1229628
- https://bugzilla.suse.com/show_bug.cgi?id=1229629
- https://bugzilla.suse.com/show_bug.cgi?id=1229630
- https://bugzilla.suse.com/show_bug.cgi?id=1229631
- https://bugzilla.suse.com/show_bug.cgi?id=1229635
- https://bugzilla.suse.com/show_bug.cgi?id=1229636
- https://bugzilla.suse.com/show_bug.cgi?id=1229637
- https://bugzilla.suse.com/show_bug.cgi?id=1229638
- https://bugzilla.suse.com/show_bug.cgi?id=1229639
- https://bugzilla.suse.com/show_bug.cgi?id=1229641
- https://bugzilla.suse.com/show_bug.cgi?id=1229642
- https://bugzilla.suse.com/show_bug.cgi?id=1229643
- https://bugzilla.suse.com/show_bug.cgi?id=1229645
- https://bugzilla.suse.com/show_bug.cgi?id=1229657
- https://bugzilla.suse.com/show_bug.cgi?id=1229664
- https://bugzilla.suse.com/show_bug.cgi?id=1229707
- https://bugzilla.suse.com/show_bug.cgi?id=1229792