SUSE-SU-2024:4367-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20244367-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:4367-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2024:4367-1
Related
Published
2024-12-17T17:59:47Z
Modified
2024-12-17T17:59:47Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-48853: swiotlb: fix info leak with DMAFROMDEVICE (bsc#1228015).
  • CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hcierrorreset (bsc#1222413).
  • CVE-2024-26852: Fixed use-after-free in ip6routempath_notify() (bsc#1223057).
  • CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
  • CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for cpufreqcpuget's return value (bsc#1223769).
  • CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
  • CVE-2024-36905: tcp: defer shutdown(SENDSHUTDOWN) for TCPSYN_RECV sockets (bsc#1225742).
  • CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
  • CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
  • CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
  • CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
  • CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered (bsc#1230766).
  • CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
  • CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
  • CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
  • CVE-2024-47679: vfs: fix race between eviceinodes() and findinode()&iput() (bsc#1231930).
  • CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).
  • CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
  • CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
  • CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
  • CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
  • CVE-2024-49938: wifi: ath9khtc: Use _skbsetlength() for resetting urb before resubmit (bsc#1232552).
  • CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
  • CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
  • CVE-2024-49952: netfilter: nftables: prevent nfskb_duplicated corruption (bsc#1232157).
  • CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in rfcommskstate_change (bsc#1231904).
  • CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
  • CVE-2024-50073: tty: ngsm: Fix use-after-free in gsmcleanup_mux (bsc#1232520).
  • CVE-2024-50074: parport: Proper fix for array out-of-bounds access (bsc#1232507).
  • CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent (bsc#1232873).
  • CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
  • CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method (bsc#1232897).
  • CVE-2024-50125: Bluetooth: SCO: Fix UAF on scosocktimeout (bsc#1232928).
  • CVE-2024-50135: nvme-pci: fix race condition between reset and nvmedevdisable() (bsc#1232888).
  • CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister (bsc#1233063).
  • CVE-2024-50150: usb: typec: altmode should keep reference to parent (bsc#1233051).
  • CVE-2024-50154: tcp/dccp: Do not use timerpending() in reqskqueue_unlink() (bsc#1233070).
  • CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
  • CVE-2024-50171: net: systemport: fix potential memory leak in bcmsysportxmit() (bsc#1233057).
  • CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1233130).
  • CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed (bsc#1233108).
  • CVE-2024-50195: posix-clock: Fix missing timespec64 check in pcclocksettime() (bsc#1233103).
  • CVE-2024-50218: ocfs2: pass u64 to ocfs2truncateinline maybe overflow (bsc#1233191).
  • CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming device (bsc#1233211).
  • CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx (bsc#1233212).
  • CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (bsc#1233216).
  • CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
  • CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2xaremove() (bsc#1233454).
  • CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
  • CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
  • CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
  • CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
  • CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
  • CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
  • CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).
  • CVE-2024-50301: security/keys: fix slab-out-of-bounds in keytaskpermission (bsc#1233490).
  • CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
  • CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
  • CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
  • CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
  • CVE-2024-53066: nfs: Fix KMSAN warning in decodegetfattrattrs() (bsc#1233560).
  • CVE-2024-53085: tpm: Lock TPM chip in tpmpmsuspend() first (bsc#1082555 bsc#1233577).
  • CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
  • CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVCVSUNDEFINED in uvcparseformat (bsc#1234025).
  • CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).

The following non-security bugs were fixed:

  • drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108).
  • initramfs: avoid filename buffer overrun (bsc#1232436).
  • kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644).
  • lpfc: size cpu map by last cpu id set (bsc#1157160).
  • net: relax socket state check at accept time (git-fixes).
  • ocfs2: uncache inode which has failed entering the group (bsc#1234087).
References

Affected packages

SUSE:Linux Enterprise High Availability Extension 12 SP5 / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.237.1",
            "gfs2-kmp-default": "4.12.14-122.237.1",
            "ocfs2-kmp-default": "4.12.14-122.237.1",
            "cluster-md-kmp-default": "4.12.14-122.237.1"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 SP5 / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-kgraft": "4.12.14-122.237.1",
            "kernel-default-kgraft-devel": "4.12.14-122.237.1",
            "kgraft-patch-4_12_14-122_237-default": "1-8.3.1"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 SP5 / kgraft-patch-SLE12-SP5_Update_63

Package

Name
kgraft-patch-SLE12-SP5_Update_63
Purl
pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_63&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1-8.3.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-kgraft": "4.12.14-122.237.1",
            "kernel-default-kgraft-devel": "4.12.14-122.237.1",
            "kgraft-patch-4_12_14-122_237-default": "1-8.3.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5-LTSS / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-122.237.1",
            "kernel-devel": "4.12.14-122.237.1",
            "kernel-default-base": "4.12.14-122.237.1",
            "kernel-default-man": "4.12.14-122.237.1",
            "kernel-default": "4.12.14-122.237.1",
            "kernel-source": "4.12.14-122.237.1",
            "kernel-syms": "4.12.14-122.237.1",
            "kernel-default-devel": "4.12.14-122.237.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5-LTSS / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-122.237.1",
            "kernel-devel": "4.12.14-122.237.1",
            "kernel-default-base": "4.12.14-122.237.1",
            "kernel-default-man": "4.12.14-122.237.1",
            "kernel-default": "4.12.14-122.237.1",
            "kernel-source": "4.12.14-122.237.1",
            "kernel-syms": "4.12.14-122.237.1",
            "kernel-default-devel": "4.12.14-122.237.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5-LTSS / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-122.237.1",
            "kernel-devel": "4.12.14-122.237.1",
            "kernel-default-base": "4.12.14-122.237.1",
            "kernel-default-man": "4.12.14-122.237.1",
            "kernel-default": "4.12.14-122.237.1",
            "kernel-source": "4.12.14-122.237.1",
            "kernel-syms": "4.12.14-122.237.1",
            "kernel-default-devel": "4.12.14-122.237.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-122.237.1",
            "kernel-devel": "4.12.14-122.237.1",
            "kernel-default-base": "4.12.14-122.237.1",
            "kernel-default": "4.12.14-122.237.1",
            "kernel-source": "4.12.14-122.237.1",
            "kernel-syms": "4.12.14-122.237.1",
            "kernel-default-devel": "4.12.14-122.237.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-122.237.1",
            "kernel-devel": "4.12.14-122.237.1",
            "kernel-default-base": "4.12.14-122.237.1",
            "kernel-default": "4.12.14-122.237.1",
            "kernel-source": "4.12.14-122.237.1",
            "kernel-syms": "4.12.14-122.237.1",
            "kernel-default-devel": "4.12.14-122.237.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.237.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-macros": "4.12.14-122.237.1",
            "kernel-devel": "4.12.14-122.237.1",
            "kernel-default-base": "4.12.14-122.237.1",
            "kernel-default": "4.12.14-122.237.1",
            "kernel-source": "4.12.14-122.237.1",
            "kernel-syms": "4.12.14-122.237.1",
            "kernel-default-devel": "4.12.14-122.237.1"
        }
    ]
}