Protect yourself against future threats.
=========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2024.1923 Security update for the Linux Kernel 28 March 2024 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2023-52448 CVE-2023-52478 CVE-2022-20154 CVE-2023-52449 CVE-2023-52482 CVE-2023-52530 CVE-2023-52531 CVE-2024-1151 CVE-2024-23851 CVE-2024-26585 CVE-2024-26586 CVE-2024-26593 CVE-2024-26595 CVE-2024-26602 CVE-2024-26607 CVE-2024-26622 CVE-2020-36777 CVE-2020-36784 CVE-2021-46906 CVE-2021-46915 CVE-2021-46929 CVE-2021-46953 CVE-2021-46974 CVE-2023-28746 CVE-2021-47013 CVE-2021-47054 CVE-2021-47076 CVE-2021-47078 CVE-2023-52502 CVE-2023-52532 CVE-2023-52574 CVE-2021-46904 CVE-2021-46905 CVE-2021-46964 CVE-2021-46966 CVE-2021-46989 CVE-2021-47005 CVE-2021-47012 CVE-2021-47060 CVE-2021-47061 CVE-2021-47069 CVE-2023-52569 CVE-2024-0607 CVE-2022-48627 CVE-2023-51042 CVE-2024-0340 CVE-2023-46343 CVE-2023-52429 CVE-2024-23849 CVE-2023-35827 CVE-2023-52439 CVE-2023-52443 CVE-2023-52463 CVE-2023-52597 CVE-2024-26589 CVE-2019-25162 CVE-2021-46924 CVE-2021-46932 CVE-2021-46934 CVE-2021-47083 CVE-2023-52445 CVE-2023-52340 CVE-2023-52451 CVE-2023-52605 CVE-2023-52475 Original Bulletin: https://www.suse.com/support/update/announcement/2024/suse-su-20240926-1 Comment: CVSS (Max): 7.8 CVE-2024-26622 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat, NIST, [SUSE] Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0926-1 Rating: important o bsc#1155518 o bsc#1184436 o bsc#1185988 o bsc#1186286 o bsc#1200599 o bsc#1212514 o bsc#1213456 o bsc#1218689 o bsc#1218915 o bsc#1219127 o bsc#1219128 o bsc#1219146 o bsc#1219295 o bsc#1219653 o bsc#1219827 o bsc#1219835 o bsc#1220009 o bsc#1220140 o bsc#1220187 o bsc#1220238 o bsc#1220240 o bsc#1220241 o bsc#1220243 o bsc#1220250 o bsc#1220253 o bsc#1220255 o bsc#1220328 o bsc#1220330 o bsc#1220344 o bsc#1220398 o bsc#1220409 o bsc#1220416 o bsc#1220418 o bsc#1220421 o bsc#1220436 References: o bsc#1220444 o bsc#1220459 o bsc#1220469 o bsc#1220482 o bsc#1220526 o bsc#1220538 o bsc#1220570 o bsc#1220572 o bsc#1220599 o bsc#1220627 o bsc#1220641 o bsc#1220649 o bsc#1220660 o bsc#1220700 o bsc#1220735 o bsc#1220736 o bsc#1220737 o bsc#1220742 o bsc#1220745 o bsc#1220767 o bsc#1220796 o bsc#1220825 o bsc#1220826 o bsc#1220831 o bsc#1220845 o bsc#1220860 o bsc#1220863 o bsc#1220870 o bsc#1220917 o bsc#1220918 o bsc#1220930 o bsc#1220931 o bsc#1220932 o bsc#1221039 o bsc#1221040 o bsc#1221287 o CVE-2019-25162 o CVE-2020-36777 o CVE-2020-36784 o CVE-2021-46904 o CVE-2021-46905 o CVE-2021-46906 o CVE-2021-46915 o CVE-2021-46924 o CVE-2021-46929 o CVE-2021-46932 o CVE-2021-46934 o CVE-2021-46953 o CVE-2021-46964 o CVE-2021-46966 o CVE-2021-46974 o CVE-2021-46989 o CVE-2021-47005 o CVE-2021-47012 o CVE-2021-47013 o CVE-2021-47054 o CVE-2021-47060 o CVE-2021-47061 o CVE-2021-47069 o CVE-2021-47076 o CVE-2021-47078 o CVE-2021-47083 o CVE-2022-20154 o CVE-2022-48627 o CVE-2023-28746 o CVE-2023-35827 o CVE-2023-46343 o CVE-2023-51042 Cross-References: o CVE-2023-52340 o CVE-2023-52429 o CVE-2023-52439 o CVE-2023-52443 o CVE-2023-52445 o CVE-2023-52448 o CVE-2023-52449 o CVE-2023-52451 o CVE-2023-52463 o CVE-2023-52475 o CVE-2023-52478 o CVE-2023-52482 o CVE-2023-52502 o CVE-2023-52530 o CVE-2023-52531 o CVE-2023-52532 o CVE-2023-52569 o CVE-2023-52574 o CVE-2023-52597 o CVE-2023-52605 o CVE-2024-0340 o CVE-2024-0607 o CVE-2024-1151 o CVE-2024-23849 o CVE-2024-23851 o CVE-2024-26585 o CVE-2024-26586 o CVE-2024-26589 o CVE-2024-26593 o CVE-2024-26595 o CVE-2024-26602 o CVE-2024-26607 o CVE-2024-26622 o CVE-2019-25162 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2020-36777 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:L/I:N/A:N o CVE-2020-36784 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:L/I:N/A:N o CVE-2021-46904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2021-46905 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N /S:U/C:N/I:N/A:L o CVE-2021-46906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:H/I:N/A:N o CVE-2021-46915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2021-46924 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N /S:U/C:L/I:N/A:N o CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N /S:U/C:L/I:L/A:L o CVE-2021-46932 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:N/A:L o CVE-2021-46934 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:L/I:N/A:N o CVE-2021-46953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2021-46974 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N /S:U/C:N/I:L/A:N o CVE-2021-47005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:N/I:N/A:H o CVE-2021-47012 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2021-47013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2021-47054 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:N/I:N/A:L o CVE-2021-47060 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2021-47061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2021-47069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2021-47076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2021-47078 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:L/I:L/A:L o CVE-2021-47083 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:H/A:L o CVE-2022-20154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2022-20154 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/ S:U/C:H/I:H/A:H o CVE-2022-48627 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:L/A:L o CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:C/C:H/I:N/A:N o CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2023-46343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N /S:U/C:N/I:N/A:H o CVE-2023-46343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2023-52439 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2023-52439 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2023-52443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52443 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2023-52445 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N CVSS scores: /S:U/C:H/I:H/A:H o CVE-2023-52445 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2023-52448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52448 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2023-52449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52449 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2023-52451 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:L/I:N/A:H o CVE-2023-52451 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52475 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2023-52478 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:L/I:L/A:H o CVE-2023-52482 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:C/C:H/I:N/A:N o CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2023-52530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N /S:U/C:N/I:L/A:H o CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:N/I:N/A:H o CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:L/I:N/A:N o CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:N/A:N o CVE-2024-0607 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:H/A:L o CVE-2024-0607 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:L/I:L/A:H o CVE-2024-1151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2024-23849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:H/I:N/A:N o CVE-2024-23849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2024-23851 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:N/I:N/A:H o CVE-2024-23851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2024-26586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2024-26586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2024-26589 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:H/I:N/A:N o CVE-2024-26589 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2024-26593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:N/A:N o CVE-2024-26595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:N/A:N o CVE-2024-26607 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:H/I:H/A:H o SUSE Linux Enterprise High Availability Extension 15 SP2 o SUSE Linux Enterprise High Performance Computing 15 SP2 o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 o SUSE Linux Enterprise Live Patching 15-SP2 Affected o SUSE Linux Enterprise Server 15 SP2 Products: o SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 o SUSE Manager Proxy 4.1 o SUSE Manager Retail Branch Server 4.1 o SUSE Manager Server 4.1 An update that solves 65 vulnerabilities and has six security fixes can now be installed. Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: o CVE-2021-47078: Fixed a bug by clearing all QP fields if creation failed (bsc#1220863) o CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey was supplied (bsc#1220860) o CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039) o CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456). o CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831). o CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918). o CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors (bsc#1220735). o CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040). o CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845). o CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870). o CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc# 1220469). o CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc #1212514). o CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932). o CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc# 1220930). o CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931). o CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc# 1220917). o CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736). o CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255). o CVE-2021-47005: Fixed a NULL pointer dereference for ->get_features() (bsc# 1220660). o CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc #1220187). o CVE-2023-52340: Fixed ICMPv6 "Packet Too Big" packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295). o CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc# 1218915). o CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1220742). o CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc# 1220825). o CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250). o CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444) o CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328). o CVE-2021-47012: Fixed a use after free in siw_alloc_mr (bsc#1220627). o CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238). o CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc# 1220649) o CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796) o CVE-2021-46989: Fixed a bug by preventing corruption in shrinking truncate in hfsplus (bsc#1220737). o CVE-2021-46915: Fixed a bug to avoid possible divide error in nft_limit_init (bsc#1220436). o CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc# 1220459) o CVE-2019-25162: Fixed a potential use after free (bsc#1220409). o CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails (bsc# 1220570). o CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister failure after sync'ing SRCU (bsc#1220745). o CVE-2023-52445: Fixed use after free on context disconnection (bsc# 1220241). o CVE-2023-46343: Fixed a NULL pointer dereference in send_acknowledge() (CVE-2023-46343). o CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140). o CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc# 1220240). o CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398). o CVE-2024-26593: Fixed block process call transactions (bsc#1220009). o CVE-2021-47013: Fixed a use after free in emac_mac_tx_buf_send (bsc# 1220641). o CVE-2024-26586: Fixed stack corruption (bsc#1220243). o CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344). o CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253). o CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc# 1219835). o CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc# 1219127). o CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg () (bsc#1218689). o CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). The following non-security bugs were fixed: o EDAC/thunderx: Fix possible out-of-bounds string access (bsc#1220330) o KVM: Destroy target device if coalesced MMIO unregistration fails (git-fixes). o KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio (git-fixes). o KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes). o KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes). o KVM: x86: add support for CPUID leaf 0x80000021 (git-fixes). o KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (git-fixes). o KVM: x86: synthesize CPUID leaf 0x80000021h if useful (git-fixes). o KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes). o x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes). o x86/bugs: Add asm helpers for executing VERW (git-fixes). o x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes). o x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (git-fixes). o x86/entry_32: Add VERW just before userspace transition (git-fixes). o x86/entry_64: Add VERW just before userspace transition (git-fixes). Special Instructions and Notes: o Please reboot the system after installing this update. Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-926=1 o SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-926=1 o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-926=1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-926=1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-926=1 Package List: o SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) kernel-default-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) kernel-default-livepatch-devel-5.3.18-150200.24.183.1 kernel-livepatch-SLE15-SP2_Update_46-debugsource-1-150200.5.3.2 kernel-default-debuginfo-5.3.18-150200.24.183.1 kernel-default-livepatch-5.3.18-150200.24.183.1 kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-1-150200.5.3.2 kernel-livepatch-5_3_18-150200_24_183-default-1-150200.5.3.2 kernel-default-debugsource-5.3.18-150200.24.183.1 o SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) cluster-md-kmp-default-5.3.18-150200.24.183.1 gfs2-kmp-default-5.3.18-150200.24.183.1 ocfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1 cluster-md-kmp-default-debuginfo-5.3.18-150200.24.183.1 dlm-kmp-default-debuginfo-5.3.18-150200.24.183.1 kernel-default-debuginfo-5.3.18-150200.24.183.1 gfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1 kernel-default-debugsource-5.3.18-150200.24.183.1 ocfs2-kmp-default-5.3.18-150200.24.183.1 dlm-kmp-default-5.3.18-150200.24.183.1 o SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) kernel-default-5.3.18-150200.24.183.1 o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) kernel-preempt-5.3.18-150200.24.183.1 kernel-default-5.3.18-150200.24.183.1 o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) kernel-default-devel-5.3.18-150200.24.183.1 kernel-preempt-devel-5.3.18-150200.24.183.1 kernel-preempt-debuginfo-5.3.18-150200.24.183.1 kernel-syms-5.3.18-150200.24.183.1 kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2 kernel-obs-build-5.3.18-150200.24.183.1 kernel-obs-build-debugsource-5.3.18-150200.24.183.1 kernel-default-debuginfo-5.3.18-150200.24.183.1 kernel-preempt-debugsource-5.3.18-150200.24.183.1 kernel-default-devel-debuginfo-5.3.18-150200.24.183.1 kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1 kernel-default-debugsource-5.3.18-150200.24.183.1 o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) kernel-devel-5.3.18-150200.24.183.1 kernel-macros-5.3.18-150200.24.183.1 kernel-source-5.3.18-150200.24.183.1 o SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc) kernel-docs-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc) kernel-default-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) kernel-default-devel-5.3.18-150200.24.183.1 reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1 kernel-syms-5.3.18-150200.24.183.1 kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2 kernel-obs-build-5.3.18-150200.24.183.1 kernel-obs-build-debugsource-5.3.18-150200.24.183.1 kernel-default-debuginfo-5.3.18-150200.24.183.1 kernel-default-devel-debuginfo-5.3.18-150200.24.183.1 reiserfs-kmp-default-5.3.18-150200.24.183.1 kernel-default-debugsource-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) kernel-devel-5.3.18-150200.24.183.1 kernel-macros-5.3.18-150200.24.183.1 kernel-source-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc) kernel-docs-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) kernel-preempt-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) kernel-preempt-devel-5.3.18-150200.24.183.1 kernel-preempt-debugsource-5.3.18-150200.24.183.1 kernel-preempt-debuginfo-5.3.18-150200.24.183.1 kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) kernel-default-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) kernel-default-devel-5.3.18-150200.24.183.1 reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1 kernel-syms-5.3.18-150200.24.183.1 kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2 kernel-obs-build-5.3.18-150200.24.183.1 kernel-obs-build-debugsource-5.3.18-150200.24.183.1 kernel-default-debuginfo-5.3.18-150200.24.183.1 kernel-default-devel-debuginfo-5.3.18-150200.24.183.1 reiserfs-kmp-default-5.3.18-150200.24.183.1 kernel-default-debugsource-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) kernel-devel-5.3.18-150200.24.183.1 kernel-macros-5.3.18-150200.24.183.1 kernel-source-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) kernel-docs-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) kernel-preempt-5.3.18-150200.24.183.1 o SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) kernel-preempt-devel-5.3.18-150200.24.183.1 kernel-preempt-debugsource-5.3.18-150200.24.183.1 kernel-preempt-debuginfo-5.3.18-150200.24.183.1 kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1 References: o https://www.suse.com/security/cve/CVE-2019-25162.html o https://www.suse.com/security/cve/CVE-2020-36777.html o https://www.suse.com/security/cve/CVE-2020-36784.html o https://www.suse.com/security/cve/CVE-2021-46904.html o https://www.suse.com/security/cve/CVE-2021-46905.html o https://www.suse.com/security/cve/CVE-2021-46906.html o https://www.suse.com/security/cve/CVE-2021-46915.html o https://www.suse.com/security/cve/CVE-2021-46924.html o https://www.suse.com/security/cve/CVE-2021-46929.html o https://www.suse.com/security/cve/CVE-2021-46932.html o https://www.suse.com/security/cve/CVE-2021-46934.html o https://www.suse.com/security/cve/CVE-2021-46953.html o https://www.suse.com/security/cve/CVE-2021-46964.html o https://www.suse.com/security/cve/CVE-2021-46966.html o https://www.suse.com/security/cve/CVE-2021-46974.html o https://www.suse.com/security/cve/CVE-2021-46989.html o https://www.suse.com/security/cve/CVE-2021-47005.html o https://www.suse.com/security/cve/CVE-2021-47012.html o https://www.suse.com/security/cve/CVE-2021-47013.html o https://www.suse.com/security/cve/CVE-2021-47054.html o https://www.suse.com/security/cve/CVE-2021-47060.html o https://www.suse.com/security/cve/CVE-2021-47061.html o https://www.suse.com/security/cve/CVE-2021-47069.html o https://www.suse.com/security/cve/CVE-2021-47076.html o https://www.suse.com/security/cve/CVE-2021-47078.html o https://www.suse.com/security/cve/CVE-2021-47083.html o https://www.suse.com/security/cve/CVE-2022-20154.html o https://www.suse.com/security/cve/CVE-2022-48627.html o https://www.suse.com/security/cve/CVE-2023-28746.html o https://www.suse.com/security/cve/CVE-2023-35827.html o https://www.suse.com/security/cve/CVE-2023-46343.html o https://www.suse.com/security/cve/CVE-2023-51042.html o https://www.suse.com/security/cve/CVE-2023-52340.html o https://www.suse.com/security/cve/CVE-2023-52429.html o https://www.suse.com/security/cve/CVE-2023-52439.html o https://www.suse.com/security/cve/CVE-2023-52443.html o https://www.suse.com/security/cve/CVE-2023-52445.html o https://www.suse.com/security/cve/CVE-2023-52448.html o https://www.suse.com/security/cve/CVE-2023-52449.html o https://www.suse.com/security/cve/CVE-2023-52451.html o https://www.suse.com/security/cve/CVE-2023-52463.html o https://www.suse.com/security/cve/CVE-2023-52475.html o https://www.suse.com/security/cve/CVE-2023-52478.html o https://www.suse.com/security/cve/CVE-2023-52482.html o https://www.suse.com/security/cve/CVE-2023-52502.html o https://www.suse.com/security/cve/CVE-2023-52530.html o https://www.suse.com/security/cve/CVE-2023-52531.html o https://www.suse.com/security/cve/CVE-2023-52532.html o https://www.suse.com/security/cve/CVE-2023-52569.html o https://www.suse.com/security/cve/CVE-2023-52574.html o https://www.suse.com/security/cve/CVE-2023-52597.html o https://www.suse.com/security/cve/CVE-2023-52605.html o https://www.suse.com/security/cve/CVE-2024-0340.html o https://www.suse.com/security/cve/CVE-2024-0607.html o https://www.suse.com/security/cve/CVE-2024-1151.html o https://www.suse.com/security/cve/CVE-2024-23849.html o https://www.suse.com/security/cve/CVE-2024-23851.html o https://www.suse.com/security/cve/CVE-2024-26585.html o https://www.suse.com/security/cve/CVE-2024-26586.html o https://www.suse.com/security/cve/CVE-2024-26589.html o https://www.suse.com/security/cve/CVE-2024-26593.html o https://www.suse.com/security/cve/CVE-2024-26595.html o https://www.suse.com/security/cve/CVE-2024-26602.html o https://www.suse.com/security/cve/CVE-2024-26607.html o https://www.suse.com/security/cve/CVE-2024-26622.html o https://bugzilla.suse.com/show_bug.cgi?id=1155518 o https://bugzilla.suse.com/show_bug.cgi?id=1184436 o https://bugzilla.suse.com/show_bug.cgi?id=1185988 o https://bugzilla.suse.com/show_bug.cgi?id=1186286 o https://bugzilla.suse.com/show_bug.cgi?id=1200599 o https://bugzilla.suse.com/show_bug.cgi?id=1212514 o https://bugzilla.suse.com/show_bug.cgi?id=1213456 o https://bugzilla.suse.com/show_bug.cgi?id=1218689 o https://bugzilla.suse.com/show_bug.cgi?id=1218915 o https://bugzilla.suse.com/show_bug.cgi?id=1219127 o https://bugzilla.suse.com/show_bug.cgi?id=1219128 o https://bugzilla.suse.com/show_bug.cgi?id=1219146 o https://bugzilla.suse.com/show_bug.cgi?id=1219295 o https://bugzilla.suse.com/show_bug.cgi?id=1219653 o https://bugzilla.suse.com/show_bug.cgi?id=1219827 o https://bugzilla.suse.com/show_bug.cgi?id=1219835 o https://bugzilla.suse.com/show_bug.cgi?id=1220009 o https://bugzilla.suse.com/show_bug.cgi?id=1220140 o https://bugzilla.suse.com/show_bug.cgi?id=1220187 o https://bugzilla.suse.com/show_bug.cgi?id=1220238 o https://bugzilla.suse.com/show_bug.cgi?id=1220240 o https://bugzilla.suse.com/show_bug.cgi?id=1220241 o https://bugzilla.suse.com/show_bug.cgi?id=1220243 o https://bugzilla.suse.com/show_bug.cgi?id=1220250 o https://bugzilla.suse.com/show_bug.cgi?id=1220253 o https://bugzilla.suse.com/show_bug.cgi?id=1220255 o https://bugzilla.suse.com/show_bug.cgi?id=1220328 o https://bugzilla.suse.com/show_bug.cgi?id=1220330 o https://bugzilla.suse.com/show_bug.cgi?id=1220344 o https://bugzilla.suse.com/show_bug.cgi?id=1220398 o https://bugzilla.suse.com/show_bug.cgi?id=1220409 o https://bugzilla.suse.com/show_bug.cgi?id=1220416 o https://bugzilla.suse.com/show_bug.cgi?id=1220418 o https://bugzilla.suse.com/show_bug.cgi?id=1220421 o https://bugzilla.suse.com/show_bug.cgi?id=1220436 o https://bugzilla.suse.com/show_bug.cgi?id=1220444 o https://bugzilla.suse.com/show_bug.cgi?id=1220459 o https://bugzilla.suse.com/show_bug.cgi?id=1220469 o https://bugzilla.suse.com/show_bug.cgi?id=1220482 o https://bugzilla.suse.com/show_bug.cgi?id=1220526 o https://bugzilla.suse.com/show_bug.cgi?id=1220538 o https://bugzilla.suse.com/show_bug.cgi?id=1220570 o https://bugzilla.suse.com/show_bug.cgi?id=1220572 o https://bugzilla.suse.com/show_bug.cgi?id=1220599 o https://bugzilla.suse.com/show_bug.cgi?id=1220627 o https://bugzilla.suse.com/show_bug.cgi?id=1220641 o https://bugzilla.suse.com/show_bug.cgi?id=1220649 o https://bugzilla.suse.com/show_bug.cgi?id=1220660 o https://bugzilla.suse.com/show_bug.cgi?id=1220700 o https://bugzilla.suse.com/show_bug.cgi?id=1220735 o https://bugzilla.suse.com/show_bug.cgi?id=1220736 o https://bugzilla.suse.com/show_bug.cgi?id=1220737 o https://bugzilla.suse.com/show_bug.cgi?id=1220742 o https://bugzilla.suse.com/show_bug.cgi?id=1220745 o https://bugzilla.suse.com/show_bug.cgi?id=1220767 o https://bugzilla.suse.com/show_bug.cgi?id=1220796 o https://bugzilla.suse.com/show_bug.cgi?id=1220825 o https://bugzilla.suse.com/show_bug.cgi?id=1220826 o https://bugzilla.suse.com/show_bug.cgi?id=1220831 o https://bugzilla.suse.com/show_bug.cgi?id=1220845 o https://bugzilla.suse.com/show_bug.cgi?id=1220860 o https://bugzilla.suse.com/show_bug.cgi?id=1220863 o https://bugzilla.suse.com/show_bug.cgi?id=1220870 o https://bugzilla.suse.com/show_bug.cgi?id=1220917 o https://bugzilla.suse.com/show_bug.cgi?id=1220918 o https://bugzilla.suse.com/show_bug.cgi?id=1220930 o https://bugzilla.suse.com/show_bug.cgi?id=1220931 o https://bugzilla.suse.com/show_bug.cgi?id=1220932 o https://bugzilla.suse.com/show_bug.cgi?id=1221039 o https://bugzilla.suse.com/show_bug.cgi?id=1221040 o https://bugzilla.suse.com/show_bug.cgi?id=1221287 - --------------------------END INCLUDED TEXT---------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. ===========================================================================