Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:4367-1 |
---|---|
Release Date: | 2024-12-17T17:59:55Z |
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 75 vulnerabilities and has eight security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-48853: swiotlb: fix info leak with DMA_FROM_DEVICE (bsc#1228015).
- CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset (bsc#1222413).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
- CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (bsc#1223769).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
- CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered (bsc#1230766).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).
- CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).
- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49938: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (bsc#1232552).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).
- CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (bsc#1231904).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50074: parport: Proper fix for array out-of-bounds access (bsc#1232507).
- CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent (bsc#1232873).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method (bsc#1232897).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister (bsc#1233063).
- CVE-2024-50150: usb: typec: altmode should keep reference to parent (bsc#1233051).
- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1233130).
- CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed (bsc#1233108).
- CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103).
- CVE-2024-50218: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (bsc#1233191).
- CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming device (bsc#1233211).
- CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx (bsc#1233212).
- CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (bsc#1233216).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
- CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (bsc#1233454).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53066: nfs: Fix KMSAN warning in decode_getfattr_attrs() (bsc#1233560).
- CVE-2024-53085: tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 bsc#1233577).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).
The following non-security bugs were fixed:
- drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644).
- lpfc: size cpu map by last cpu id set (bsc#1157160).
- net: relax socket state check at accept time (git-fixes).
- ocfs2: uncache inode which has failed entering the group (bsc#1234087).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4367=1
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4367=1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4367=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1
-
SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1
Package List:
-
SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
- kernel-default-4.12.14-122.237.1
-
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
- kernel-default-kgraft-4.12.14-122.237.1
- kernel-default-debuginfo-4.12.14-122.237.1
- kernel-default-kgraft-devel-4.12.14-122.237.1
- kernel-default-debugsource-4.12.14-122.237.1
- kgraft-patch-4_12_14-122_237-default-1-8.3.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- kernel-syms-4.12.14-122.237.1
- kernel-default-devel-4.12.14-122.237.1
- kernel-default-base-4.12.14-122.237.1
- kernel-default-debuginfo-4.12.14-122.237.1
- kernel-default-debugsource-4.12.14-122.237.1
- kernel-default-base-debuginfo-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- kernel-devel-4.12.14-122.237.1
- kernel-source-4.12.14-122.237.1
- kernel-macros-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
- kernel-default-man-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
- kernel-default-devel-debuginfo-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
- kernel-default-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- kernel-syms-4.12.14-122.237.1
- kernel-default-devel-debuginfo-4.12.14-122.237.1
- kernel-default-devel-4.12.14-122.237.1
- kernel-default-base-4.12.14-122.237.1
- kernel-default-debuginfo-4.12.14-122.237.1
- kernel-default-debugsource-4.12.14-122.237.1
- kernel-default-base-debuginfo-4.12.14-122.237.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- kernel-devel-4.12.14-122.237.1
- kernel-source-4.12.14-122.237.1
- kernel-macros-4.12.14-122.237.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- gfs2-kmp-default-4.12.14-122.237.1
- ocfs2-kmp-default-4.12.14-122.237.1
- gfs2-kmp-default-debuginfo-4.12.14-122.237.1
- cluster-md-kmp-default-debuginfo-4.12.14-122.237.1
- dlm-kmp-default-4.12.14-122.237.1
- ocfs2-kmp-default-debuginfo-4.12.14-122.237.1
- kernel-default-debuginfo-4.12.14-122.237.1
- dlm-kmp-default-debuginfo-4.12.14-122.237.1
- cluster-md-kmp-default-4.12.14-122.237.1
- kernel-default-debugsource-4.12.14-122.237.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
- kernel-default-4.12.14-122.237.1
-
SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64)
- gfs2-kmp-default-4.12.14-122.237.1
- ocfs2-kmp-default-4.12.14-122.237.1
- gfs2-kmp-default-debuginfo-4.12.14-122.237.1
- cluster-md-kmp-default-debuginfo-4.12.14-122.237.1
- dlm-kmp-default-4.12.14-122.237.1
- ocfs2-kmp-default-debuginfo-4.12.14-122.237.1
- kernel-default-debuginfo-4.12.14-122.237.1
- dlm-kmp-default-debuginfo-4.12.14-122.237.1
- cluster-md-kmp-default-4.12.14-122.237.1
- kernel-default-debugsource-4.12.14-122.237.1
-
SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
- kernel-default-4.12.14-122.237.1
References:
- https://www.suse.com/security/cve/CVE-2021-47162.html
- https://www.suse.com/security/cve/CVE-2022-48853.html
- https://www.suse.com/security/cve/CVE-2024-26801.html
- https://www.suse.com/security/cve/CVE-2024-26852.html
- https://www.suse.com/security/cve/CVE-2024-26886.html
- https://www.suse.com/security/cve/CVE-2024-27051.html
- https://www.suse.com/security/cve/CVE-2024-35937.html
- https://www.suse.com/security/cve/CVE-2024-36886.html
- https://www.suse.com/security/cve/CVE-2024-36905.html
- https://www.suse.com/security/cve/CVE-2024-36954.html
- https://www.suse.com/security/cve/CVE-2024-42098.html
- https://www.suse.com/security/cve/CVE-2024-42131.html
- https://www.suse.com/security/cve/CVE-2024-42229.html
- https://www.suse.com/security/cve/CVE-2024-44995.html
- https://www.suse.com/security/cve/CVE-2024-45016.html
- https://www.suse.com/security/cve/CVE-2024-46771.html
- https://www.suse.com/security/cve/CVE-2024-46777.html
- https://www.suse.com/security/cve/CVE-2024-46800.html
- https://www.suse.com/security/cve/CVE-2024-47660.html
- https://www.suse.com/security/cve/CVE-2024-47679.html
- https://www.suse.com/security/cve/CVE-2024-47701.html
- https://www.suse.com/security/cve/CVE-2024-49858.html
- https://www.suse.com/security/cve/CVE-2024-49868.html
- https://www.suse.com/security/cve/CVE-2024-49884.html
- https://www.suse.com/security/cve/CVE-2024-49921.html
- https://www.suse.com/security/cve/CVE-2024-49925.html
- https://www.suse.com/security/cve/CVE-2024-49938.html
- https://www.suse.com/security/cve/CVE-2024-49945.html
- https://www.suse.com/security/cve/CVE-2024-49950.html
- https://www.suse.com/security/cve/CVE-2024-49952.html
- https://www.suse.com/security/cve/CVE-2024-50044.html
- https://www.suse.com/security/cve/CVE-2024-50055.html
- https://www.suse.com/security/cve/CVE-2024-50073.html
- https://www.suse.com/security/cve/CVE-2024-50074.html
- https://www.suse.com/security/cve/CVE-2024-50095.html
- https://www.suse.com/security/cve/CVE-2024-50099.html
- https://www.suse.com/security/cve/CVE-2024-50115.html
- https://www.suse.com/security/cve/CVE-2024-50117.html
- https://www.suse.com/security/cve/CVE-2024-50125.html
- https://www.suse.com/security/cve/CVE-2024-50135.html
- https://www.suse.com/security/cve/CVE-2024-50148.html
- https://www.suse.com/security/cve/CVE-2024-50150.html
- https://www.suse.com/security/cve/CVE-2024-50154.html
- https://www.suse.com/security/cve/CVE-2024-50167.html
- https://www.suse.com/security/cve/CVE-2024-50171.html
- https://www.suse.com/security/cve/CVE-2024-50179.html
- https://www.suse.com/security/cve/CVE-2024-50183.html
- https://www.suse.com/security/cve/CVE-2024-50187.html
- https://www.suse.com/security/cve/CVE-2024-50194.html
- https://www.suse.com/security/cve/CVE-2024-50195.html
- https://www.suse.com/security/cve/CVE-2024-50210.html
- https://www.suse.com/security/cve/CVE-2024-50218.html
- https://www.suse.com/security/cve/CVE-2024-50234.html
- https://www.suse.com/security/cve/CVE-2024-50236.html
- https://www.suse.com/security/cve/CVE-2024-50237.html
- https://www.suse.com/security/cve/CVE-2024-50264.html
- https://www.suse.com/security/cve/CVE-2024-50265.html
- https://www.suse.com/security/cve/CVE-2024-50267.html
- https://www.suse.com/security/cve/CVE-2024-50273.html
- https://www.suse.com/security/cve/CVE-2024-50278.html
- https://www.suse.com/security/cve/CVE-2024-50279.html
- https://www.suse.com/security/cve/CVE-2024-50289.html
- https://www.suse.com/security/cve/CVE-2024-50290.html
- https://www.suse.com/security/cve/CVE-2024-50296.html
- https://www.suse.com/security/cve/CVE-2024-50301.html
- https://www.suse.com/security/cve/CVE-2024-50302.html
- https://www.suse.com/security/cve/CVE-2024-53058.html
- https://www.suse.com/security/cve/CVE-2024-53061.html
- https://www.suse.com/security/cve/CVE-2024-53063.html
- https://www.suse.com/security/cve/CVE-2024-53066.html
- https://www.suse.com/security/cve/CVE-2024-53085.html
- https://www.suse.com/security/cve/CVE-2024-53088.html
- https://www.suse.com/security/cve/CVE-2024-53104.html
- https://www.suse.com/security/cve/CVE-2024-53114.html
- https://www.suse.com/security/cve/CVE-2024-53142.html
- https://bugzilla.suse.com/show_bug.cgi?id=1082555
- https://bugzilla.suse.com/show_bug.cgi?id=1157160
- https://bugzilla.suse.com/show_bug.cgi?id=1218644
- https://bugzilla.suse.com/show_bug.cgi?id=1221977
- https://bugzilla.suse.com/show_bug.cgi?id=1222364
- https://bugzilla.suse.com/show_bug.cgi?id=1222413
- https://bugzilla.suse.com/show_bug.cgi?id=1223044
- https://bugzilla.suse.com/show_bug.cgi?id=1223057
- https://bugzilla.suse.com/show_bug.cgi?id=1223769
- https://bugzilla.suse.com/show_bug.cgi?id=1224526
- https://bugzilla.suse.com/show_bug.cgi?id=1225730
- https://bugzilla.suse.com/show_bug.cgi?id=1225742
- https://bugzilla.suse.com/show_bug.cgi?id=1225764
- https://bugzilla.suse.com/show_bug.cgi?id=1228015
- https://bugzilla.suse.com/show_bug.cgi?id=1228650
- https://bugzilla.suse.com/show_bug.cgi?id=1228708
- https://bugzilla.suse.com/show_bug.cgi?id=1228779
- https://bugzilla.suse.com/show_bug.cgi?id=1230231
- https://bugzilla.suse.com/show_bug.cgi?id=1230429
- https://bugzilla.suse.com/show_bug.cgi?id=1230766
- https://bugzilla.suse.com/show_bug.cgi?id=1230773
- https://bugzilla.suse.com/show_bug.cgi?id=1230784
- https://bugzilla.suse.com/show_bug.cgi?id=1230827
- https://bugzilla.suse.com/show_bug.cgi?id=1231184
- https://bugzilla.suse.com/show_bug.cgi?id=1231439
- https://bugzilla.suse.com/show_bug.cgi?id=1231904
- https://bugzilla.suse.com/show_bug.cgi?id=1231920
- https://bugzilla.suse.com/show_bug.cgi?id=1231930
- https://bugzilla.suse.com/show_bug.cgi?id=1232157
- https://bugzilla.suse.com/show_bug.cgi?id=1232159
- https://bugzilla.suse.com/show_bug.cgi?id=1232165
- https://bugzilla.suse.com/show_bug.cgi?id=1232198
- https://bugzilla.suse.com/show_bug.cgi?id=1232201
- https://bugzilla.suse.com/show_bug.cgi?id=1232224
- https://bugzilla.suse.com/show_bug.cgi?id=1232251
- https://bugzilla.suse.com/show_bug.cgi?id=1232272
- https://bugzilla.suse.com/show_bug.cgi?id=1232329
- https://bugzilla.suse.com/show_bug.cgi?id=1232371
- https://bugzilla.suse.com/show_bug.cgi?id=1232436
- https://bugzilla.suse.com/show_bug.cgi?id=1232507
- https://bugzilla.suse.com/show_bug.cgi?id=1232520
- https://bugzilla.suse.com/show_bug.cgi?id=1232552
- https://bugzilla.suse.com/show_bug.cgi?id=1232873
- https://bugzilla.suse.com/show_bug.cgi?id=1232887
- https://bugzilla.suse.com/show_bug.cgi?id=1232888
- https://bugzilla.suse.com/show_bug.cgi?id=1232897
- https://bugzilla.suse.com/show_bug.cgi?id=1232919
- https://bugzilla.suse.com/show_bug.cgi?id=1232928
- https://bugzilla.suse.com/show_bug.cgi?id=1233049
- https://bugzilla.suse.com/show_bug.cgi?id=1233051
- https://bugzilla.suse.com/show_bug.cgi?id=1233057
- https://bugzilla.suse.com/show_bug.cgi?id=1233063
- https://bugzilla.suse.com/show_bug.cgi?id=1233070
- https://bugzilla.suse.com/show_bug.cgi?id=1233097
- https://bugzilla.suse.com/show_bug.cgi?id=1233103
- https://bugzilla.suse.com/show_bug.cgi?id=1233108
- https://bugzilla.suse.com/show_bug.cgi?id=1233111
- https://bugzilla.suse.com/show_bug.cgi?id=1233123
- https://bugzilla.suse.com/show_bug.cgi?id=1233130
- https://bugzilla.suse.com/show_bug.cgi?id=1233191
- https://bugzilla.suse.com/show_bug.cgi?id=1233211
- https://bugzilla.suse.com/show_bug.cgi?id=1233212
- https://bugzilla.suse.com/show_bug.cgi?id=1233216
- https://bugzilla.suse.com/show_bug.cgi?id=1233453
- https://bugzilla.suse.com/show_bug.cgi?id=1233454
- https://bugzilla.suse.com/show_bug.cgi?id=1233456
- https://bugzilla.suse.com/show_bug.cgi?id=1233462
- https://bugzilla.suse.com/show_bug.cgi?id=1233467
- https://bugzilla.suse.com/show_bug.cgi?id=1233468
- https://bugzilla.suse.com/show_bug.cgi?id=1233478
- https://bugzilla.suse.com/show_bug.cgi?id=1233479
- https://bugzilla.suse.com/show_bug.cgi?id=1233485
- https://bugzilla.suse.com/show_bug.cgi?id=1233490
- https://bugzilla.suse.com/show_bug.cgi?id=1233491
- https://bugzilla.suse.com/show_bug.cgi?id=1233552
- https://bugzilla.suse.com/show_bug.cgi?id=1233555
- https://bugzilla.suse.com/show_bug.cgi?id=1233557
- https://bugzilla.suse.com/show_bug.cgi?id=1233560
- https://bugzilla.suse.com/show_bug.cgi?id=1233577
- https://bugzilla.suse.com/show_bug.cgi?id=1233580
- https://bugzilla.suse.com/show_bug.cgi?id=1234025
- https://bugzilla.suse.com/show_bug.cgi?id=1234072
- https://bugzilla.suse.com/show_bug.cgi?id=1234087