<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3403-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-23T13:55:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-23T13:55:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-23T13:55:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-45003: Don't evict inode under the inode lru traversing context. (bsc#1230245) 

The following non-security bugs were fixed:

- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section'. (bsc#1230413)
- Revert 'mm/sparsemem: fix race in accessing memory_section-&gt;usage'. (bsc#1230413)
- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()'. (bsc#1230413)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3403,SUSE-SLE-Micro-5.3-2024-3403,SUSE-SLE-Micro-5.4-2024-3403</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243403-1/</URL>
      <Description>Link for SUSE-SU-2024:3403-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-September/019501.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3403-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230245</URL>
      <Description>SUSE Bug 1230245</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230413</URL>
      <Description>SUSE Bug 1230413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45003/</URL>
      <Description>SUSE CVE CVE-2024-45003 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.3">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3" CPE="cpe:/o:suse:sle-micro:5.3">SUSE Linux Enterprise Micro 5.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.4">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4" CPE="cpe:/o:suse:sle-micro:5.4">SUSE Linux Enterprise Micro 5.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cluster-md-kmp-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="cluster-md-kmp-rt-5.14.21-150400.15.94.1">cluster-md-kmp-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dlm-kmp-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="dlm-kmp-rt-5.14.21-150400.15.94.1">dlm-kmp-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gfs2-kmp-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="gfs2-kmp-rt-5.14.21-150400.15.94.1">gfs2-kmp-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-devel-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-devel-rt-5.14.21-150400.15.94.1">kernel-devel-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt-5.14.21-150400.15.94.1">kernel-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-devel-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt-devel-5.14.21-150400.15.94.1">kernel-rt-devel-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-extra-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt-extra-5.14.21-150400.15.94.1">kernel-rt-extra-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt-livepatch-5.14.21-150400.15.94.1">kernel-rt-livepatch-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-livepatch-devel-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt-livepatch-devel-5.14.21-150400.15.94.1">kernel-rt-livepatch-devel-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt-optional-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt-optional-5.14.21-150400.15.94.1">kernel-rt-optional-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt_debug-5.14.21-150400.15.94.1">kernel-rt_debug-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-devel-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt_debug-devel-5.14.21-150400.15.94.1">kernel-rt_debug-devel-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-rt_debug-livepatch-devel-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-rt_debug-livepatch-devel-5.14.21-150400.15.94.1">kernel-rt_debug-livepatch-devel-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-source-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-source-rt-5.14.21-150400.15.94.1">kernel-source-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-syms-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kernel-syms-rt-5.14.21-150400.15.94.1">kernel-syms-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kselftests-kmp-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="kselftests-kmp-rt-5.14.21-150400.15.94.1">kselftests-kmp-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ocfs2-kmp-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="ocfs2-kmp-rt-5.14.21-150400.15.94.1">ocfs2-kmp-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="reiserfs-kmp-rt-5.14.21-150400.15.94.1">
      <FullProductName ProductID="reiserfs-kmp-rt-5.14.21-150400.15.94.1">reiserfs-kmp-rt-5.14.21-150400.15.94.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-rt-5.14.21-150400.15.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.94.1">kernel-rt-5.14.21-150400.15.94.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150400.15.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.94.1">kernel-source-rt-5.14.21-150400.15.94.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-rt-5.14.21-150400.15.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.94.1">kernel-rt-5.14.21-150400.15.94.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-source-rt-5.14.21-150400.15.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.94.1">kernel-source-rt-5.14.21-150400.15.94.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

vfs: Don't evict inode under the inode lru traversing context

The inode reclaiming process(See function prune_icache_sb) collects all
reclaimable inodes and mark them with I_FREEING flag at first, at that
time, other processes will be stuck if they try getting these inodes
(See function find_inode_fast), then the reclaiming process destroy the
inodes by function dispose_list(). Some filesystems(eg. ext4 with
ea_inode feature, ubifs with xattr) may do inode lookup in the inode
evicting callback function, if the inode lookup is operated under the
inode lru traversing context, deadlock problems may happen.

Case 1: In function ext4_evict_inode(), the ea inode lookup could happen
        if ea_inode feature is enabled, the lookup process will be stuck
	under the evicting context like this:

 1. File A has inode i_reg and an ea inode i_ea
 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru-&gt;i_ea
 3. Then, following three processes running like this:

    PA                              PB
 echo 2 &gt; /proc/sys/vm/drop_caches
  shrink_slab
   prune_dcache_sb
   // i_reg is added into lru, lru-&gt;i_ea-&gt;i_reg
   prune_icache_sb
    list_lru_walk_one
     inode_lru_isolate
      i_ea-&gt;i_state |= I_FREEING // set inode state
     inode_lru_isolate
      __iget(i_reg)
      spin_unlock(&amp;i_reg-&gt;i_lock)
      spin_unlock(lru_lock)
                                     rm file A
                                      i_reg-&gt;nlink = 0
      iput(i_reg) // i_reg-&gt;nlink is 0, do evict
       ext4_evict_inode
        ext4_xattr_delete_inode
         ext4_xattr_inode_dec_ref_all
          ext4_xattr_inode_iget
           ext4_iget(i_ea-&gt;i_ino)
            iget_locked
             find_inode_fast
              __wait_on_freeing_inode(i_ea) ----→ AA deadlock
    dispose_list // cannot be executed by prune_icache_sb
     wake_up_bit(&amp;i_ea-&gt;i_state)

Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file
        deleting process holds BASEHD's wbuf-&gt;io_mutex while getting the
	xattr inode, which could race with inode reclaiming process(The
        reclaiming process could try locking BASEHD's wbuf-&gt;io_mutex in
	inode evicting function), then an ABBA deadlock problem would
	happen as following:

 1. File A has inode ia and a xattr(with inode ixa), regular file B has
    inode ib and a xattr.
 2. getfattr(A, xattr_buf) // ixa is added into lru // lru-&gt;ixa
 3. Then, following three processes running like this:

        PA                PB                        PC
                echo 2 &gt; /proc/sys/vm/drop_caches
                 shrink_slab
                  prune_dcache_sb
                  // ib and ia are added into lru, lru-&gt;ixa-&gt;ib-&gt;ia
                  prune_icache_sb
                   list_lru_walk_one
                    inode_lru_isolate
                     ixa-&gt;i_state |= I_FREEING // set inode state
                    inode_lru_isolate
                     __iget(ib)
                     spin_unlock(&amp;ib-&gt;i_lock)
                     spin_unlock(lru_lock)
                                                   rm file B
                                                    ib-&gt;nlink = 0
 rm file A
  iput(ia)
   ubifs_evict_inode(ia)
    ubifs_jnl_delete_inode(ia)
     ubifs_jnl_write_inode(ia)
      make_reservation(BASEHD) // Lock wbuf-&gt;io_mutex
      ubifs_iget(ixa-&gt;i_ino)
       iget_locked
        find_inode_fast
         __wait_on_freeing_inode(ixa)
          |          iput(ib) // ib-&gt;nlink is 0, do evict
          |           ubifs_evict_inode
          |            ubifs_jnl_delete_inode(ib)
          ↓             ubifs_jnl_write_inode
     ABBA deadlock ←-----make_reservation(BASEHD)
                   dispose_list // cannot be executed by prune_icache_sb
                    wake_up_bit(&amp;ixa-&gt;i_state)

Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING
to pin the inode in memory while inode_lru_isolate(
---truncated---</Note>
    </Notes>
    <CVE>CVE-2024-45003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Micro 5.3:kernel-rt-5.14.21-150400.15.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:kernel-source-rt-5.14.21-150400.15.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:kernel-rt-5.14.21-150400.15.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:kernel-source-rt-5.14.21-150400.15.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243403-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45003.html</URL>
        <Description>CVE-2024-45003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230245</URL>
        <Description>SUSE Bug 1230245</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
