[SUSE-SU-2024:0110-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
1
CVEs
7
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237).
- CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
The following non-security bugs were fixed:
- Reviewed and added more information to README.SUSE (jsc#PED-5021).
- Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184).
- clocksource: Avoid accidental unstable marking of clocksources (bsc#1218105).
- clocksource: Suspend the watchdog temporarily when high read latency detected (bsc#1218105).
- efi/mokvar: Reserve the table only if it is in boot services data (bsc#1215375).
Package | Affected Version |
---|---|
pkg:rpm/suse/kernel-rt?arch=x86_64&distro=slem-5 | < 5.3.18-150300.155.1 |
- ID
- SUSE-SU-2024:0110-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20240110-1/
- Published
-
2024-01-16T12:28:22
(8 months ago) - Modified
-
2024-01-16T12:28:22
(8 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2024-1899
- ALAS-2024-1906
- ALAS-2024-1912
- ALAS2-2024-2391
- ALAS2-2024-2418
- ALAS2-2024-2443
- ALSA-2024:0897
- ALSA-2024:1607
- ALSA-2024:3138
- ALSA-2024:4211
- ASB-A-174626251
- DSA-5593-1
- DSA-5594-1
- ELSA-2024-0897
- ELSA-2024-12110
- ELSA-2024-12159
- ELSA-2024-12169
- ELSA-2024-1248
- ELSA-2024-1607
- ELSA-2024-2394
- ELSA-2024-3138
- ELSA-2024-4211
- FEDORA-2021-a35b44fd9f
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1607
- RHSA-2024:1614
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:4211
- RHSA-2024:4352
- RLSA-2024:1607
- RLSA-2024:3138
- RLSA-2024:4211
- SSA:2023-359-01
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0113-1
- SUSE-SU-2024:0115-1
- SUSE-SU-2024:0117-1
- SUSE-SU-2024:0118-1
- SUSE-SU-2024:0120-1
- SUSE-SU-2024:0129-1
- SUSE-SU-2024:0141-1
- SUSE-SU-2024:0153-1
- SUSE-SU-2024:0154-1
- SUSE-SU-2024:0156-1
- SUSE-SU-2024:0160-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0339-1
- SUSE-SU-2024:0344-1
- SUSE-SU-2024:0347-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0351-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0358-1
- SUSE-SU-2024:0362-1
- SUSE-SU-2024:0373-1
- SUSE-SU-2024:0376-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0380-1
- SUSE-SU-2024:0389-1
- SUSE-SU-2024:0393-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0409-1
- SUSE-SU-2024:0411-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0418-1
- SUSE-SU-2024:0421-1
- SUSE-SU-2024:0428-1
- SUSE-SU-2024:0429-1
- SUSE-SU-2024:0484-1
- SUSE-SU-2024:0986-1
- SUSE-SU-2024:0989-1
- SUSE-SU-2024:0991-1
- SUSE-SU-2024:0995-1
- SUSE-SU-2024:1017-1
- SUSE-SU-2024:1023-1
- SUSE-SU-2024:1025-1
- SUSE-SU-2024:1028-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1040-1
- SUSE-SU-2024:1045-1
- SUSE-SU-2024:1047-1
- SUSE-SU-2024:1053-1
- SUSE-SU-2024:1063-1
- SUSE-SU-2024:1072-1
- SUSE-SU-2024:1097-1
- SUSE-SU-2024:1153-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:2099-1
- SUSE-SU-2024:2115-1
- SUSE-SU-2024:2145-1
- SUSE-SU-2024:2166-1
- SUSE-SU-2024:2202-1
- SUSE-SU-2024:2205-1
- USN-5343-1
- USN-6601-1
- USN-6602-1
- USN-6603-1
- USN-6604-1
- USN-6604-2
- USN-6605-1
- USN-6605-2
- USN-6606-1
- USN-6607-1
- USN-6608-1
- USN-6608-2
- USN-6609-1
- USN-6609-2
- USN-6609-3
- USN-6628-1
- USN-6628-2
- USN-6635-1
- USN-6639-1
- USN-6680-1
- USN-6680-2
- USN-6680-3
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6686-1
- USN-6686-2
- USN-6686-3
- USN-6686-4
- USN-6686-5
- USN-6688-1
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6705-1
- USN-6716-1
- USN-6724-1
- USN-6724-2
- USN-6739-1
- USN-6740-1
- VU:799380
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-rt?arch=x86_64&distro=slem-5 | suse | kernel-rt | < 5.3.18-150300.155.1 | slem-5 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |