Operating System:

[SUSE]

Published:

28 March 2024

Protect yourself against future threats.

===========================================================================
             AUSCERT External Security Bulletin Redistribution             
                                                                           
                               ESB-2024.1923                               
                   Security update for the Linux Kernel                    
                               28 March 2024                               
                                                                           
===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Linux Kernel                                            
Publisher:         SUSE                                                    
Operating System:  SUSE                                                    
Resolution:        Patch/Upgrade                                           
CVE Names:         CVE-2023-52448 CVE-2023-52478 CVE-2022-20154            
                   CVE-2023-52449 CVE-2023-52482 CVE-2023-52530            
                   CVE-2023-52531 CVE-2024-1151 CVE-2024-23851             
                   CVE-2024-26585 CVE-2024-26586 CVE-2024-26593            
                   CVE-2024-26595 CVE-2024-26602 CVE-2024-26607            
                   CVE-2024-26622 CVE-2020-36777 CVE-2020-36784            
                   CVE-2021-46906 CVE-2021-46915 CVE-2021-46929            
                   CVE-2021-46953 CVE-2021-46974 CVE-2023-28746            
                   CVE-2021-47013 CVE-2021-47054 CVE-2021-47076            
                   CVE-2021-47078 CVE-2023-52502 CVE-2023-52532            
                   CVE-2023-52574 CVE-2021-46904 CVE-2021-46905            
                   CVE-2021-46964 CVE-2021-46966 CVE-2021-46989            
                   CVE-2021-47005 CVE-2021-47012 CVE-2021-47060            
                   CVE-2021-47061 CVE-2021-47069 CVE-2023-52569            
                   CVE-2024-0607 CVE-2022-48627 CVE-2023-51042             
                   CVE-2024-0340 CVE-2023-46343 CVE-2023-52429             
                   CVE-2024-23849 CVE-2023-35827 CVE-2023-52439            
                   CVE-2023-52443 CVE-2023-52463 CVE-2023-52597            
                   CVE-2024-26589 CVE-2019-25162 CVE-2021-46924            
                   CVE-2021-46932 CVE-2021-46934 CVE-2021-47083            
                   CVE-2023-52445 CVE-2023-52340 CVE-2023-52451            
                   CVE-2023-52605 CVE-2023-52475                           

Original Bulletin:
   https://www.suse.com/support/update/announcement/2024/suse-su-20240926-1

Comment: CVSS (Max):  7.8 CVE-2024-26622 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat, NIST, [SUSE]                                
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


- --------------------------BEGIN INCLUDED TEXT--------------------

Security update for the Linux Kernel

Announcement ID:  SUSE-SU-2024:0926-1
     Rating:      important
                    o bsc#1155518
                    o bsc#1184436
                    o bsc#1185988
                    o bsc#1186286
                    o bsc#1200599
                    o bsc#1212514
                    o bsc#1213456
                    o bsc#1218689
                    o bsc#1218915
                    o bsc#1219127
                    o bsc#1219128
                    o bsc#1219146
                    o bsc#1219295
                    o bsc#1219653
                    o bsc#1219827
                    o bsc#1219835
                    o bsc#1220009
                    o bsc#1220140
                    o bsc#1220187
                    o bsc#1220238
                    o bsc#1220240
                    o bsc#1220241
                    o bsc#1220243
                    o bsc#1220250
                    o bsc#1220253
                    o bsc#1220255
                    o bsc#1220328
                    o bsc#1220330
                    o bsc#1220344
                    o bsc#1220398
                    o bsc#1220409
                    o bsc#1220416
                    o bsc#1220418
                    o bsc#1220421
                    o bsc#1220436
   References:      o bsc#1220444
                    o bsc#1220459
                    o bsc#1220469
                    o bsc#1220482
                    o bsc#1220526
                    o bsc#1220538
                    o bsc#1220570
                    o bsc#1220572
                    o bsc#1220599
                    o bsc#1220627
                    o bsc#1220641
                    o bsc#1220649
                    o bsc#1220660
                    o bsc#1220700
                    o bsc#1220735
                    o bsc#1220736
                    o bsc#1220737
                    o bsc#1220742
                    o bsc#1220745
                    o bsc#1220767
                    o bsc#1220796
                    o bsc#1220825
                    o bsc#1220826
                    o bsc#1220831
                    o bsc#1220845
                    o bsc#1220860
                    o bsc#1220863
                    o bsc#1220870
                    o bsc#1220917
                    o bsc#1220918
                    o bsc#1220930
                    o bsc#1220931
                    o bsc#1220932
                    o bsc#1221039
                    o bsc#1221040
                    o bsc#1221287

                    o CVE-2019-25162
                    o CVE-2020-36777
                    o CVE-2020-36784
                    o CVE-2021-46904
                    o CVE-2021-46905
                    o CVE-2021-46906
                    o CVE-2021-46915
                    o CVE-2021-46924
                    o CVE-2021-46929
                    o CVE-2021-46932
                    o CVE-2021-46934
                    o CVE-2021-46953
                    o CVE-2021-46964
                    o CVE-2021-46966
                    o CVE-2021-46974
                    o CVE-2021-46989
                    o CVE-2021-47005
                    o CVE-2021-47012
                    o CVE-2021-47013
                    o CVE-2021-47054
                    o CVE-2021-47060
                    o CVE-2021-47061
                    o CVE-2021-47069
                    o CVE-2021-47076
                    o CVE-2021-47078
                    o CVE-2021-47083
                    o CVE-2022-20154
                    o CVE-2022-48627
                    o CVE-2023-28746
                    o CVE-2023-35827
                    o CVE-2023-46343
                    o CVE-2023-51042
Cross-References:   o CVE-2023-52340
                    o CVE-2023-52429
                    o CVE-2023-52439
                    o CVE-2023-52443
                    o CVE-2023-52445
                    o CVE-2023-52448
                    o CVE-2023-52449
                    o CVE-2023-52451
                    o CVE-2023-52463
                    o CVE-2023-52475
                    o CVE-2023-52478
                    o CVE-2023-52482
                    o CVE-2023-52502
                    o CVE-2023-52530
                    o CVE-2023-52531
                    o CVE-2023-52532
                    o CVE-2023-52569
                    o CVE-2023-52574
                    o CVE-2023-52597
                    o CVE-2023-52605
                    o CVE-2024-0340
                    o CVE-2024-0607
                    o CVE-2024-1151
                    o CVE-2024-23849
                    o CVE-2024-23851
                    o CVE-2024-26585
                    o CVE-2024-26586
                    o CVE-2024-26589
                    o CVE-2024-26593
                    o CVE-2024-26595
                    o CVE-2024-26602
                    o CVE-2024-26607
                    o CVE-2024-26622

                    o CVE-2019-25162 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2020-36777 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:L/I:N/A:N
                    o CVE-2020-36784 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:L/I:N/A:N
                    o CVE-2021-46904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-46905 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:L
                    o CVE-2021-46906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:H/I:N/A:N
                    o CVE-2021-46915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-46924 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N
                      /S:U/C:L/I:N/A:N
                    o CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N
                      /S:U/C:L/I:L/A:L
                    o CVE-2021-46932 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:N/I:N/A:L
                    o CVE-2021-46934 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:L/I:N/A:N
                    o CVE-2021-46953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-46974 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N
                      /S:U/C:N/I:L/A:N
                    o CVE-2021-47005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-47012 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2021-47013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-47054 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:N/I:N/A:L
                    o CVE-2021-47060 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2021-47061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2021-47069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-47076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2021-47078 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:L/I:L/A:L
                    o CVE-2021-47083 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:H/A:L
                    o CVE-2022-20154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2022-20154 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2022-48627 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:L/A:L
                    o CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:C/C:H/I:N/A:N
                    o CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-46343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-46343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-52439 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-52439 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-52443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52443 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-52445 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N
  CVSS scores:        /S:U/C:H/I:H/A:H
                    o CVE-2023-52445 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-52448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52448 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-52449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52449 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2023-52451 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:L/I:N/A:H
                    o CVE-2023-52451 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52475 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-52478 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:L/I:L/A:H
                    o CVE-2023-52482 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:C/C:H/I:N/A:N
                    o CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2023-52530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N
                      /S:U/C:N/I:L/A:H
                    o CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:L/I:N/A:N
                    o CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:N/A:N
                    o CVE-2024-0607 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:H/A:L
                    o CVE-2024-0607 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:L/I:L/A:H
                    o CVE-2024-1151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2024-23849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:H/I:N/A:N
                    o CVE-2024-23849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2024-23851 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2024-23851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/
                      S:U/C:N/I:N/A:H
                    o CVE-2024-26586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:H/A:H
                    o CVE-2024-26586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2024-26589 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
                      /S:U/C:H/I:N/A:N
                    o CVE-2024-26589 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
                      S:U/C:H/I:H/A:H
                    o CVE-2024-26593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:H/I:N/A:N
                    o CVE-2024-26595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:H/I:N/A:N
                    o CVE-2024-26607 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
                      /S:U/C:N/I:N/A:H
                    o CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
                      /S:U/C:H/I:H/A:H

                    o SUSE Linux Enterprise High Availability Extension 15 SP2
                    o SUSE Linux Enterprise High Performance Computing 15 SP2
                    o SUSE Linux Enterprise High Performance Computing 15 SP2
                      LTSS 15-SP2
                    o SUSE Linux Enterprise Live Patching 15-SP2
    Affected        o SUSE Linux Enterprise Server 15 SP2
    Products:       o SUSE Linux Enterprise Server 15 SP2 Business Critical
                      Linux 15-SP2
                    o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
                    o SUSE Linux Enterprise Server for SAP Applications 15 SP2
                    o SUSE Manager Proxy 4.1
                    o SUSE Manager Retail Branch Server 4.1
                    o SUSE Manager Server 4.1

An update that solves 65 vulnerabilities and has six security fixes can now be
installed.

Description:

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  o CVE-2021-47078: Fixed a bug by clearing all QP fields if creation failed
    (bsc#1220863)
  o CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey was
    supplied (bsc#1220860)
  o CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
  o CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
  o CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
    nfc_llcp_sock_get_sn() (bsc#1220831).
  o CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
    insert delayed dir index item (bsc#1220918).
  o CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors
    (bsc#1220735).
  o CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
  o CVE-2022-48627: Fixed a memory overlapping when deleting chars in the
    buffer (bsc#1220845).
  o CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
  o CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc#
    1220469).
  o CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc
    #1212514).
  o CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
  o CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#
    1220930).
  o CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
  o CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc#
    1220917).
  o CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
  o CVE-2024-26589: Fixed out of bounds read due to variable offset alu on
    PTR_TO_FLOW_KEYS (bsc#1220255).
  o CVE-2021-47005: Fixed a NULL pointer dereference for ->get_features() (bsc#
    1220660).
  o CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc
    #1220187).
  o CVE-2023-52340: Fixed ICMPv6 "Packet Too Big" packets force a DoS of the
    Linux kernel by forcing 100% CPU (bsc#1219295).
  o CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#
    1218915).
  o CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones
    if the bus is destroyed (bsc#1220742).
  o CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#
    1220825).
  o CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
  o CVE-2021-46932: Fixed missing work initialization before device
    registration (bsc#1220444)
  o CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
  o CVE-2021-47012: Fixed a use after free in siw_alloc_mr (bsc#1220627).
  o CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl
    notifier (bsc#1220238).
  o CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#
    1220649)
  o CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
  o CVE-2021-46989: Fixed a bug by preventing corruption in shrinking truncate
    in hfsplus (bsc#1220737).
  o CVE-2021-46915: Fixed a bug to avoid possible divide error in
    nft_limit_init (bsc#1220436).
  o CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#
    1220459)
  o CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
  o CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails (bsc#
    1220570).
  o CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister
    failure after sync'ing SRCU (bsc#1220745).
  o CVE-2023-52445: Fixed use after free on context disconnection (bsc#
    1220241).
  o CVE-2023-46343: Fixed a NULL pointer dereference in send_acknowledge()
    (CVE-2023-46343).
  o CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
  o CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#
    1220240).
  o CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
  o CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
  o CVE-2021-47013: Fixed a use after free in emac_mac_tx_buf_send (bsc#
    1220641).
  o CVE-2024-26586: Fixed stack corruption (bsc#1220243).
  o CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
  o CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump
    (bsc#1220253).
  o CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#
    1219835).
  o CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#
    1219127).
  o CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg
    () (bsc#1218689).
  o CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in
    drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).

The following non-security bugs were fixed:

  o EDAC/thunderx: Fix possible out-of-bounds string access (bsc#1220330)
  o KVM: Destroy target device if coalesced MMIO unregistration fails
    (git-fixes).
  o KVM: mmio: Fix use-after-free Read in
    kvm_vm_ioctl_unregister_coalesced_mmio (git-fixes).
  o KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
  o KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH
    (git-fixes).
  o KVM: x86: add support for CPUID leaf 0x80000021 (git-fixes).
  o KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
    (git-fixes).
  o KVM: x86: synthesize CPUID leaf 0x80000021h if useful (git-fixes).
  o KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
  o x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
  o x86/bugs: Add asm helpers for executing VERW (git-fixes).
  o x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key
    (git-fixes).
  o x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (git-fixes).
  o x86/entry_32: Add VERW just before userspace transition (git-fixes).
  o x86/entry_64: Add VERW just before userspace transition (git-fixes).

Special Instructions and Notes:

  o Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Live Patching 15-SP2
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-926=1
  o SUSE Linux Enterprise High Availability Extension 15 SP2
    zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-926=1
  o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-926=1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-926=1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-926=1

Package List:

  o SUSE Linux Enterprise Live Patching 15-SP2 (nosrc)
       kernel-default-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
       kernel-default-livepatch-devel-5.3.18-150200.24.183.1
       kernel-livepatch-SLE15-SP2_Update_46-debugsource-1-150200.5.3.2
       kernel-default-debuginfo-5.3.18-150200.24.183.1
       kernel-default-livepatch-5.3.18-150200.24.183.1
       kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-1-150200.5.3.2
       kernel-livepatch-5_3_18-150200_24_183-default-1-150200.5.3.2
       kernel-default-debugsource-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
    s390x x86_64)
       cluster-md-kmp-default-5.3.18-150200.24.183.1
       gfs2-kmp-default-5.3.18-150200.24.183.1
       ocfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1
       cluster-md-kmp-default-debuginfo-5.3.18-150200.24.183.1
       dlm-kmp-default-debuginfo-5.3.18-150200.24.183.1
       kernel-default-debuginfo-5.3.18-150200.24.183.1
       gfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1
       kernel-default-debugsource-5.3.18-150200.24.183.1
       ocfs2-kmp-default-5.3.18-150200.24.183.1
       dlm-kmp-default-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc)
       kernel-default-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
    (aarch64 nosrc x86_64)
       kernel-preempt-5.3.18-150200.24.183.1
       kernel-default-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
    (aarch64 x86_64)
       kernel-default-devel-5.3.18-150200.24.183.1
       kernel-preempt-devel-5.3.18-150200.24.183.1
       kernel-preempt-debuginfo-5.3.18-150200.24.183.1
       kernel-syms-5.3.18-150200.24.183.1
       kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2
       kernel-obs-build-5.3.18-150200.24.183.1
       kernel-obs-build-debugsource-5.3.18-150200.24.183.1
       kernel-default-debuginfo-5.3.18-150200.24.183.1
       kernel-preempt-debugsource-5.3.18-150200.24.183.1
       kernel-default-devel-debuginfo-5.3.18-150200.24.183.1
       kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1
       kernel-default-debugsource-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
    (noarch)
       kernel-devel-5.3.18-150200.24.183.1
       kernel-macros-5.3.18-150200.24.183.1
       kernel-source-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch
    nosrc)
       kernel-docs-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
    x86_64 nosrc)
       kernel-default-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
    x86_64)
       kernel-default-devel-5.3.18-150200.24.183.1
       reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1
       kernel-syms-5.3.18-150200.24.183.1
       kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2
       kernel-obs-build-5.3.18-150200.24.183.1
       kernel-obs-build-debugsource-5.3.18-150200.24.183.1
       kernel-default-debuginfo-5.3.18-150200.24.183.1
       kernel-default-devel-debuginfo-5.3.18-150200.24.183.1
       reiserfs-kmp-default-5.3.18-150200.24.183.1
       kernel-default-debugsource-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
       kernel-devel-5.3.18-150200.24.183.1
       kernel-macros-5.3.18-150200.24.183.1
       kernel-source-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc)
       kernel-docs-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
       kernel-preempt-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
       kernel-preempt-devel-5.3.18-150200.24.183.1
       kernel-preempt-debugsource-5.3.18-150200.24.183.1
       kernel-preempt-debuginfo-5.3.18-150200.24.183.1
       kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
    x86_64)
       kernel-default-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
       kernel-default-devel-5.3.18-150200.24.183.1
       reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1
       kernel-syms-5.3.18-150200.24.183.1
       kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2
       kernel-obs-build-5.3.18-150200.24.183.1
       kernel-obs-build-debugsource-5.3.18-150200.24.183.1
       kernel-default-debuginfo-5.3.18-150200.24.183.1
       kernel-default-devel-debuginfo-5.3.18-150200.24.183.1
       reiserfs-kmp-default-5.3.18-150200.24.183.1
       kernel-default-debugsource-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
       kernel-devel-5.3.18-150200.24.183.1
       kernel-macros-5.3.18-150200.24.183.1
       kernel-source-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc)
       kernel-docs-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64)
       kernel-preempt-5.3.18-150200.24.183.1
  o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
       kernel-preempt-devel-5.3.18-150200.24.183.1
       kernel-preempt-debugsource-5.3.18-150200.24.183.1
       kernel-preempt-debuginfo-5.3.18-150200.24.183.1
       kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1

References:

  o https://www.suse.com/security/cve/CVE-2019-25162.html
  o https://www.suse.com/security/cve/CVE-2020-36777.html
  o https://www.suse.com/security/cve/CVE-2020-36784.html
  o https://www.suse.com/security/cve/CVE-2021-46904.html
  o https://www.suse.com/security/cve/CVE-2021-46905.html
  o https://www.suse.com/security/cve/CVE-2021-46906.html
  o https://www.suse.com/security/cve/CVE-2021-46915.html
  o https://www.suse.com/security/cve/CVE-2021-46924.html
  o https://www.suse.com/security/cve/CVE-2021-46929.html
  o https://www.suse.com/security/cve/CVE-2021-46932.html
  o https://www.suse.com/security/cve/CVE-2021-46934.html
  o https://www.suse.com/security/cve/CVE-2021-46953.html
  o https://www.suse.com/security/cve/CVE-2021-46964.html
  o https://www.suse.com/security/cve/CVE-2021-46966.html
  o https://www.suse.com/security/cve/CVE-2021-46974.html
  o https://www.suse.com/security/cve/CVE-2021-46989.html
  o https://www.suse.com/security/cve/CVE-2021-47005.html
  o https://www.suse.com/security/cve/CVE-2021-47012.html
  o https://www.suse.com/security/cve/CVE-2021-47013.html
  o https://www.suse.com/security/cve/CVE-2021-47054.html
  o https://www.suse.com/security/cve/CVE-2021-47060.html
  o https://www.suse.com/security/cve/CVE-2021-47061.html
  o https://www.suse.com/security/cve/CVE-2021-47069.html
  o https://www.suse.com/security/cve/CVE-2021-47076.html
  o https://www.suse.com/security/cve/CVE-2021-47078.html
  o https://www.suse.com/security/cve/CVE-2021-47083.html
  o https://www.suse.com/security/cve/CVE-2022-20154.html
  o https://www.suse.com/security/cve/CVE-2022-48627.html
  o https://www.suse.com/security/cve/CVE-2023-28746.html
  o https://www.suse.com/security/cve/CVE-2023-35827.html
  o https://www.suse.com/security/cve/CVE-2023-46343.html
  o https://www.suse.com/security/cve/CVE-2023-51042.html
  o https://www.suse.com/security/cve/CVE-2023-52340.html
  o https://www.suse.com/security/cve/CVE-2023-52429.html
  o https://www.suse.com/security/cve/CVE-2023-52439.html
  o https://www.suse.com/security/cve/CVE-2023-52443.html
  o https://www.suse.com/security/cve/CVE-2023-52445.html
  o https://www.suse.com/security/cve/CVE-2023-52448.html
  o https://www.suse.com/security/cve/CVE-2023-52449.html
  o https://www.suse.com/security/cve/CVE-2023-52451.html
  o https://www.suse.com/security/cve/CVE-2023-52463.html
  o https://www.suse.com/security/cve/CVE-2023-52475.html
  o https://www.suse.com/security/cve/CVE-2023-52478.html
  o https://www.suse.com/security/cve/CVE-2023-52482.html
  o https://www.suse.com/security/cve/CVE-2023-52502.html
  o https://www.suse.com/security/cve/CVE-2023-52530.html
  o https://www.suse.com/security/cve/CVE-2023-52531.html
  o https://www.suse.com/security/cve/CVE-2023-52532.html
  o https://www.suse.com/security/cve/CVE-2023-52569.html
  o https://www.suse.com/security/cve/CVE-2023-52574.html
  o https://www.suse.com/security/cve/CVE-2023-52597.html
  o https://www.suse.com/security/cve/CVE-2023-52605.html
  o https://www.suse.com/security/cve/CVE-2024-0340.html
  o https://www.suse.com/security/cve/CVE-2024-0607.html
  o https://www.suse.com/security/cve/CVE-2024-1151.html
  o https://www.suse.com/security/cve/CVE-2024-23849.html
  o https://www.suse.com/security/cve/CVE-2024-23851.html
  o https://www.suse.com/security/cve/CVE-2024-26585.html
  o https://www.suse.com/security/cve/CVE-2024-26586.html
  o https://www.suse.com/security/cve/CVE-2024-26589.html
  o https://www.suse.com/security/cve/CVE-2024-26593.html
  o https://www.suse.com/security/cve/CVE-2024-26595.html
  o https://www.suse.com/security/cve/CVE-2024-26602.html
  o https://www.suse.com/security/cve/CVE-2024-26607.html
  o https://www.suse.com/security/cve/CVE-2024-26622.html
  o https://bugzilla.suse.com/show_bug.cgi?id=1155518
  o https://bugzilla.suse.com/show_bug.cgi?id=1184436
  o https://bugzilla.suse.com/show_bug.cgi?id=1185988
  o https://bugzilla.suse.com/show_bug.cgi?id=1186286
  o https://bugzilla.suse.com/show_bug.cgi?id=1200599
  o https://bugzilla.suse.com/show_bug.cgi?id=1212514
  o https://bugzilla.suse.com/show_bug.cgi?id=1213456
  o https://bugzilla.suse.com/show_bug.cgi?id=1218689
  o https://bugzilla.suse.com/show_bug.cgi?id=1218915
  o https://bugzilla.suse.com/show_bug.cgi?id=1219127
  o https://bugzilla.suse.com/show_bug.cgi?id=1219128
  o https://bugzilla.suse.com/show_bug.cgi?id=1219146
  o https://bugzilla.suse.com/show_bug.cgi?id=1219295
  o https://bugzilla.suse.com/show_bug.cgi?id=1219653
  o https://bugzilla.suse.com/show_bug.cgi?id=1219827
  o https://bugzilla.suse.com/show_bug.cgi?id=1219835
  o https://bugzilla.suse.com/show_bug.cgi?id=1220009
  o https://bugzilla.suse.com/show_bug.cgi?id=1220140
  o https://bugzilla.suse.com/show_bug.cgi?id=1220187
  o https://bugzilla.suse.com/show_bug.cgi?id=1220238
  o https://bugzilla.suse.com/show_bug.cgi?id=1220240
  o https://bugzilla.suse.com/show_bug.cgi?id=1220241
  o https://bugzilla.suse.com/show_bug.cgi?id=1220243
  o https://bugzilla.suse.com/show_bug.cgi?id=1220250
  o https://bugzilla.suse.com/show_bug.cgi?id=1220253
  o https://bugzilla.suse.com/show_bug.cgi?id=1220255
  o https://bugzilla.suse.com/show_bug.cgi?id=1220328
  o https://bugzilla.suse.com/show_bug.cgi?id=1220330
  o https://bugzilla.suse.com/show_bug.cgi?id=1220344
  o https://bugzilla.suse.com/show_bug.cgi?id=1220398
  o https://bugzilla.suse.com/show_bug.cgi?id=1220409
  o https://bugzilla.suse.com/show_bug.cgi?id=1220416
  o https://bugzilla.suse.com/show_bug.cgi?id=1220418
  o https://bugzilla.suse.com/show_bug.cgi?id=1220421
  o https://bugzilla.suse.com/show_bug.cgi?id=1220436
  o https://bugzilla.suse.com/show_bug.cgi?id=1220444
  o https://bugzilla.suse.com/show_bug.cgi?id=1220459
  o https://bugzilla.suse.com/show_bug.cgi?id=1220469
  o https://bugzilla.suse.com/show_bug.cgi?id=1220482
  o https://bugzilla.suse.com/show_bug.cgi?id=1220526
  o https://bugzilla.suse.com/show_bug.cgi?id=1220538
  o https://bugzilla.suse.com/show_bug.cgi?id=1220570
  o https://bugzilla.suse.com/show_bug.cgi?id=1220572
  o https://bugzilla.suse.com/show_bug.cgi?id=1220599
  o https://bugzilla.suse.com/show_bug.cgi?id=1220627
  o https://bugzilla.suse.com/show_bug.cgi?id=1220641
  o https://bugzilla.suse.com/show_bug.cgi?id=1220649
  o https://bugzilla.suse.com/show_bug.cgi?id=1220660
  o https://bugzilla.suse.com/show_bug.cgi?id=1220700
  o https://bugzilla.suse.com/show_bug.cgi?id=1220735
  o https://bugzilla.suse.com/show_bug.cgi?id=1220736
  o https://bugzilla.suse.com/show_bug.cgi?id=1220737
  o https://bugzilla.suse.com/show_bug.cgi?id=1220742
  o https://bugzilla.suse.com/show_bug.cgi?id=1220745
  o https://bugzilla.suse.com/show_bug.cgi?id=1220767
  o https://bugzilla.suse.com/show_bug.cgi?id=1220796
  o https://bugzilla.suse.com/show_bug.cgi?id=1220825
  o https://bugzilla.suse.com/show_bug.cgi?id=1220826
  o https://bugzilla.suse.com/show_bug.cgi?id=1220831
  o https://bugzilla.suse.com/show_bug.cgi?id=1220845
  o https://bugzilla.suse.com/show_bug.cgi?id=1220860
  o https://bugzilla.suse.com/show_bug.cgi?id=1220863
  o https://bugzilla.suse.com/show_bug.cgi?id=1220870
  o https://bugzilla.suse.com/show_bug.cgi?id=1220917
  o https://bugzilla.suse.com/show_bug.cgi?id=1220918
  o https://bugzilla.suse.com/show_bug.cgi?id=1220930
  o https://bugzilla.suse.com/show_bug.cgi?id=1220931
  o https://bugzilla.suse.com/show_bug.cgi?id=1220932
  o https://bugzilla.suse.com/show_bug.cgi?id=1221039
  o https://bugzilla.suse.com/show_bug.cgi?id=1221040
  o https://bugzilla.suse.com/show_bug.cgi?id=1221287

- --------------------------END INCLUDED TEXT----------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================