{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.181.2","kernel-source-rt":"5.3.18-150300.181.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.181.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.181.2","kernel-source-rt":"5.3.18-150300.181.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.181.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.181.2","kernel-source-rt":"5.3.18-150300.181.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.181.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.181.2","kernel-source-rt":"5.3.18-150300.181.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.181.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).\n- CVE-2022-48919: Fix double free race when mount fails in cifs_get_root() (bsc#1229657).\n- CVE-2023-52854: Fix refcnt handling in padata_free_shell() (bsc#1225584).\n- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).\n- CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576).\n- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).\n- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).\n- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)\n- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)\n- CVE-2022-48872: Fix use-after-free race condition for maps (bsc#1229510).\n- CVE-2022-48873: Do not remove map on creater_process and device_release (bsc#1229512).\n- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)\n- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)\n- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).\n- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: L2CAP: Fix deadlock (git-fixes).\n- sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799 bsc#1225109).\n","id":"SUSE-SU-2024:3225-1","modified":"2024-09-12T12:12:38Z","published":"2024-09-12T12:12:38Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243225-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195668"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1195957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227997"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228004"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229621"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229624"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-4441"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48843"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44947"}],"related":["CVE-2021-4441","CVE-2022-48775","CVE-2022-48778","CVE-2022-48787","CVE-2022-48788","CVE-2022-48789","CVE-2022-48790","CVE-2022-48798","CVE-2022-48802","CVE-2022-48805","CVE-2022-48811","CVE-2022-48823","CVE-2022-48824","CVE-2022-48827","CVE-2022-48834","CVE-2022-48835","CVE-2022-48836","CVE-2022-48837","CVE-2022-48838","CVE-2022-48839","CVE-2022-48843","CVE-2022-48851","CVE-2022-48853","CVE-2022-48856","CVE-2022-48857","CVE-2022-48858","CVE-2022-48872","CVE-2022-48873","CVE-2022-48901","CVE-2022-48905","CVE-2022-48912","CVE-2022-48917","CVE-2022-48919","CVE-2022-48925","CVE-2022-48926","CVE-2022-48928","CVE-2022-48930","CVE-2022-48933","CVE-2022-48934","CVE-2023-52854","CVE-2024-40910","CVE-2024-41009","CVE-2024-41062","CVE-2024-41087","CVE-2024-42077","CVE-2024-42232","CVE-2024-42271","CVE-2024-43861","CVE-2024-43882","CVE-2024-43883","CVE-2024-44947"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-4441","CVE-2022-48775","CVE-2022-48778","CVE-2022-48787","CVE-2022-48788","CVE-2022-48789","CVE-2022-48790","CVE-2022-48798","CVE-2022-48802","CVE-2022-48805","CVE-2022-48811","CVE-2022-48823","CVE-2022-48824","CVE-2022-48827","CVE-2022-48834","CVE-2022-48835","CVE-2022-48836","CVE-2022-48837","CVE-2022-48838","CVE-2022-48839","CVE-2022-48843","CVE-2022-48851","CVE-2022-48853","CVE-2022-48856","CVE-2022-48857","CVE-2022-48858","CVE-2022-48872","CVE-2022-48873","CVE-2022-48901","CVE-2022-48905","CVE-2022-48912","CVE-2022-48917","CVE-2022-48919","CVE-2022-48925","CVE-2022-48926","CVE-2022-48928","CVE-2022-48930","CVE-2022-48933","CVE-2022-48934","CVE-2023-52854","CVE-2024-40910","CVE-2024-41009","CVE-2024-41062","CVE-2024-41087","CVE-2024-42077","CVE-2024-42232","CVE-2024-42271","CVE-2024-43861","CVE-2024-43882","CVE-2024-43883","CVE-2024-44947"]}