SUSE-SU-2024:2893-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20242893-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:2893-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:2893-1
Related
Published
2024-08-13T14:06:26Z
Modified
2025-05-02T04:32:08.145429Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
  • CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
  • CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
  • CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
  • CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irqprocesswork_list (bsc#1227810).
  • CVE-2023-52885: SUNRPC: Fix UAF in svctcplistendataready() (bsc#1227750).
  • CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
  • CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
  • CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6nhflush_exceptions (bsc#1224918).
  • CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6nhflush_exceptions (bsc#1221539).
  • CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
  • CVE-2021-47598: schcake: do not call cakedestroy() from cake_init() (bsc#1226574).
  • CVE-2021-47580: scsi: scsidebug: Fix type in mint to avoid stack OOB (bsc#1226550).
  • CVE-2021-47219: scsi: scsidebug: Fix out-of-bound read in respreport_tgtpgs() (bsc#1222824).
  • CVE-2024-40937: gve: Clear napi->skb before devkfreeskb_any() (bsc#1227836).
  • CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).
  • CVE-2021-47520: can: pchcan: pchcanrxnormal: fix use after free (bsc#1225431).
  • CVE-2024-36974: net/sched: taprio: always validate TCATAPRIOATTR_PRIOMAP (bsc#1226519).

The following non-security bugs were fixed:

  • Fix spurious WARNING caused by a qxl driver patch (bsc#1227213)
  • NFS: Clean up directory array handling (bsc#1226662).
  • NFS: Clean up nfsreaddirpage_filler() (bsc#1226662).
  • NFS: Clean up readdir struct nfscachearray (bsc#1226662).
  • NFS: Do not discard readdir results (bsc#1226662).
  • NFS: Do not overfill uncached readdir pages (bsc#1226662).
  • NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
  • NFS: Ensure contents of struct nfsopendir_context are consistent (bsc#1226662).
  • NFS: Fix up directory verifier races (bsc#1226662).
  • NFS: Further optimisations for 'ls -l' (bsc#1226662).
  • NFS: More readdir cleanups (bsc#1226662).
  • NFS: Reduce number of RPC calls when doing uncached readdir (bsc#1226662).
  • NFS: Reduce use of uncached readdir (bsc#1226662).
  • NFS: Support larger readdir buffers (bsc#1226662).
  • NFS: Use the 64-bit server readdir cookies when possible (bsc#1226662).
  • NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362)
  • X.509: Fix the parser of extended key usage for length (bsc#1218820 bsc#1226666).
  • nfs: optimise readdir cache page invalidation (bsc#1226662).
  • ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
  • powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
  • powerpc/rtas: clean up includes (bsc#1227487).
References

Affected packages

SUSE:Linux Enterprise Micro 5.1 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.178.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.178.1",
            "kernel-rt": "5.3.18-150300.178.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.1 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.178.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.178.1",
            "kernel-rt": "5.3.18-150300.178.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.178.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.178.1",
            "kernel-rt": "5.3.18-150300.178.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.178.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.178.1",
            "kernel-rt": "5.3.18-150300.178.1"
        }
    ]
}