{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.194.1","dlm-kmp-rt":"4.12.14-10.194.1","gfs2-kmp-rt":"4.12.14-10.194.1","kernel-devel-rt":"4.12.14-10.194.1","kernel-rt":"4.12.14-10.194.1","kernel-rt-base":"4.12.14-10.194.1","kernel-rt-devel":"4.12.14-10.194.1","kernel-rt_debug":"4.12.14-10.194.1","kernel-rt_debug-devel":"4.12.14-10.194.1","kernel-source-rt":"4.12.14-10.194.1","kernel-syms-rt":"4.12.14-10.194.1","ocfs2-kmp-rt":"4.12.14-10.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.194.1","dlm-kmp-rt":"4.12.14-10.194.1","gfs2-kmp-rt":"4.12.14-10.194.1","kernel-devel-rt":"4.12.14-10.194.1","kernel-rt":"4.12.14-10.194.1","kernel-rt-base":"4.12.14-10.194.1","kernel-rt-devel":"4.12.14-10.194.1","kernel-rt_debug":"4.12.14-10.194.1","kernel-rt_debug-devel":"4.12.14-10.194.1","kernel-source-rt":"4.12.14-10.194.1","kernel-syms-rt":"4.12.14-10.194.1","ocfs2-kmp-rt":"4.12.14-10.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.194.1","dlm-kmp-rt":"4.12.14-10.194.1","gfs2-kmp-rt":"4.12.14-10.194.1","kernel-devel-rt":"4.12.14-10.194.1","kernel-rt":"4.12.14-10.194.1","kernel-rt-base":"4.12.14-10.194.1","kernel-rt-devel":"4.12.14-10.194.1","kernel-rt_debug":"4.12.14-10.194.1","kernel-rt_debug-devel":"4.12.14-10.194.1","kernel-source-rt":"4.12.14-10.194.1","kernel-syms-rt":"4.12.14-10.194.1","ocfs2-kmp-rt":"4.12.14-10.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.194.1","dlm-kmp-rt":"4.12.14-10.194.1","gfs2-kmp-rt":"4.12.14-10.194.1","kernel-devel-rt":"4.12.14-10.194.1","kernel-rt":"4.12.14-10.194.1","kernel-rt-base":"4.12.14-10.194.1","kernel-rt-devel":"4.12.14-10.194.1","kernel-rt_debug":"4.12.14-10.194.1","kernel-rt_debug-devel":"4.12.14-10.194.1","kernel-source-rt":"4.12.14-10.194.1","kernel-syms-rt":"4.12.14-10.194.1","ocfs2-kmp-rt":"4.12.14-10.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.194.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).\n- CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).\n- CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).\n- CVE-2021-47438: net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() (bsc#1225229)\n- CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).\n- CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).\n- CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).\n- CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).\n- CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).\n- CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).\n- CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).\n- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).\n- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).\n- CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).\n- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).\n- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).\n- CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).\n- CVE-2024-35947: dyndbg: fix old BUG_ON in >control parser (bsc#1224647).\n- CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).\n- CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).\n- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).\n- CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).\n- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).\n- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)\n\nThe following non-security bugs were fixed:\n\n- PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).\n- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).\n- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- kgdb: Add kgdb_has_hit_break function (git-fixes).\n- kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).\n- net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).\n- nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).\n- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).\n- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).\n- x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).\n- x86/boot/e820: Fix typo in e820.c comment (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Return proper error codes from user access functions (git-fixes).\n- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).\n- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).\n- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).\n- x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).\n- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).\n- x86: __memcpy_flushcache: fix wrong alignment if size > 2^32 (git-fixes).\n","id":"SUSE-SU-2024:2493-1","modified":"2024-07-16T01:38:11Z","published":"2024-07-16T01:38:11Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20242493-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220833"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223021"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224622"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224683"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225532"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47438"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47520"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47547"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39475"}],"related":["CVE-2021-47145","CVE-2021-47201","CVE-2021-47275","CVE-2021-47438","CVE-2021-47498","CVE-2021-47520","CVE-2021-47547","CVE-2023-4244","CVE-2023-52507","CVE-2023-52683","CVE-2023-52693","CVE-2023-52753","CVE-2023-52817","CVE-2023-52818","CVE-2023-52819","CVE-2024-26635","CVE-2024-26636","CVE-2024-26880","CVE-2024-35805","CVE-2024-35819","CVE-2024-35828","CVE-2024-35947","CVE-2024-36014","CVE-2024-36941","CVE-2024-38598","CVE-2024-38619","CVE-2024-39301","CVE-2024-39475"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47145","CVE-2021-47201","CVE-2021-47275","CVE-2021-47438","CVE-2021-47498","CVE-2021-47520","CVE-2021-47547","CVE-2023-4244","CVE-2023-52507","CVE-2023-52683","CVE-2023-52693","CVE-2023-52753","CVE-2023-52817","CVE-2023-52818","CVE-2023-52819","CVE-2024-26635","CVE-2024-26636","CVE-2024-26880","CVE-2024-35805","CVE-2024-35819","CVE-2024-35828","CVE-2024-35947","CVE-2024-36014","CVE-2024-36941","CVE-2024-38598","CVE-2024-38619","CVE-2024-39301","CVE-2024-39475"]}