[SUSE-SU-2024:2948-1] Security update for the Linux Kernel
Severity
Important
CVEs
29
Security update for the Linux Kernel
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
- CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions (bsc#1221539).
- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).
- CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1224918).
- CVE-2021-47506: nfsd: fix use-after-free due to delegation race (bsc#1225404).
- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).
- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).
- CVE-2022-48821: misc: fastrpc: avoid double fput() on failed usercopy (bsc#1227976).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
- CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227750).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
The following non-security bugs were fixed:
- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213)
- nfs: Clean up directory array handling (bsc#1226662).
- nfs: Clean up nfs_readdir_page_filler() (bsc#1226662).
- nfs: Clean up XXXXXXX struct nfs_cache_array (bsc#1226662).
- nfs: Do not discard XXXXXXX results (bsc#1226662).
- nfs: Do not overfill uncached XXXXXXX pages (bsc#1226662).
- nfs: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- nfs: Ensure contents of struct nfs_open_dir_context are consistent (bsc#1226662).
- nfs: Fix up directory verifier races (bsc#1226662).
- nfs: Further optimisations for 'ls -l' (bsc#1226662).
- nfs: More XXXXXXX cleanups (bsc#1226662).
- nfs: Reduce number of RPC calls when doing uncached XXXXXXX (bsc#1226662).
- nfs: Reduce use of uncached XXXXXXX (bsc#1226662).
- nfs: Support larger XXXXXXX buffers (bsc#1226662).
- nfs: Use the 64-bit server XXXXXXX cookies when possible (bsc#1226662).
- nfs: optimise XXXXXXX cache page invalidation (bsc#1226662).
- nfsv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362)
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- powerpc/rtas: clean up includes (bsc#1227487).
- x.509: Fix the parser of extended key usage for length (bsc#1218820, bsc#1226666).
- ID
- SUSE-SU-2024:2948-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20242948-1/
- Published
-
2024-08-16T13:48:15
(4 weeks ago) - Modified
-
2024-08-16T13:48:15
(4 weeks ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS2-2021-1685
- ALAS2-2022-1749
- ALSA-2021:4356
- ALSA-2024:4211
- ASB-A-174886838
- DSA-4951-1
- DSA-5658-1
- DSA-5730-1
- DSA-5731-1
- DSA-5747-1
- ELSA-2021-4356
- ELSA-2021-4432
- ELSA-2022-9088
- ELSA-2024-12546
- ELSA-2024-12547
- ELSA-2024-12548
- ELSA-2024-12549
- ELSA-2024-12551
- ELSA-2024-12552
- ELSA-2024-12570
- ELSA-2024-12571
- ELSA-2024-12581
- ELSA-2024-12582
- ELSA-2024-12583
- ELSA-2024-12584
- ELSA-2024-12585
- ELSA-2024-12610
- ELSA-2024-12611
- ELSA-2024-12612
- ELSA-2024-2394
- ELSA-2024-4211
- ELSA-2024-5928
- FEDORA-2021-a35b44fd9f
- FEDORA-2024-71f0f16533
- FEDORA-2024-d16d94b00d
- GLSA-202209-16
- MS:CVE-2020-26558
- openSUSE-SU-2021:2184-1
- openSUSE-SU-2021:2202-1
- openSUSE-SU-2021:2291-1
- openSUSE-SU-2021:2427-1
- RHSA-2021:4140
- RHSA-2021:4356
- RHSA-2021:4432
- RHSA-2024:4211
- RHSA-2024:4352
- RHSA-2024:6242
- RLSA-2021:4356
- RLSA-2024:4211
- SSA:2021-202-01
- SUSE-SU-2021:2184-1
- SUSE-SU-2021:2202-1
- SUSE-SU-2021:2291-1
- SUSE-SU-2021:2303-1
- SUSE-SU-2021:2321-1
- SUSE-SU-2021:2324-1
- SUSE-SU-2021:2325-1
- SUSE-SU-2021:2349-1
- SUSE-SU-2021:2406-1
- SUSE-SU-2021:2421-1
- SUSE-SU-2021:2422-1
- SUSE-SU-2021:2426-1
- SUSE-SU-2021:2427-1
- SUSE-SU-2021:2451-1
- SUSE-SU-2022:3687-1
- SUSE-SU-2022:3691-1
- SUSE-SU-2024:0855-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:0976-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:1641-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1647-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1679-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1682-1
- SUSE-SU-2024:1685-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1692-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1705-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1707-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1711-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1713-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1740-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1746-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1749-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:1759-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2011-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2092-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2162-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2207-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2360-1
- SUSE-SU-2024:2362-1
- SUSE-SU-2024:2365-1
- SUSE-SU-2024:2372-1
- SUSE-SU-2024:2381-1
- SUSE-SU-2024:2384-1
- SUSE-SU-2024:2385-1
- SUSE-SU-2024:2394-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2493-1
- SUSE-SU-2024:2495-1
- SUSE-SU-2024:2561-1
- SUSE-SU-2024:2571-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2802-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2892-1
- SUSE-SU-2024:2893-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2895-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2901-1
- SUSE-SU-2024:2902-1
- SUSE-SU-2024:2923-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2939-1
- SUSE-SU-2024:2940-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3189-1
- SUSE-SU-2024:3190-1
- SUSE-SU-2024:3194-1
- SUSE-SU-2024:3195-1
- SUSE-SU-2024:3209-1
- USN-4989-1
- USN-4989-2
- USN-5017-1
- USN-5018-1
- USN-5046-1
- USN-5050-1
- USN-5299-1
- USN-5343-1
- USN-6765-1
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6820-1
- USN-6820-2
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6828-1
- USN-6871-1
- USN-6892-1
- USN-6919-1
- USN-6924-1
- USN-6924-2
- USN-6949-1
- USN-6949-2
- USN-6951-1
- USN-6951-2
- USN-6951-3
- USN-6951-4
- USN-6952-1
- USN-6952-2
- USN-6953-1
- USN-6955-1
- USN-6979-1
- USN-6999-1
- USN-7003-1
- USN-7003-2
- USN-7003-3
- USN-7004-1
- USN-7005-1
- USN-7005-2
- USN-7006-1
- USN-7007-1
- USN-7008-1
- USN-7009-1
- VU:799380
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |