{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.138.1","dlm-kmp-rt":"4.12.14-10.138.1","gfs2-kmp-rt":"4.12.14-10.138.1","kernel-devel-rt":"4.12.14-10.138.1","kernel-rt":"4.12.14-10.138.1","kernel-rt-base":"4.12.14-10.138.1","kernel-rt-devel":"4.12.14-10.138.1","kernel-rt_debug":"4.12.14-10.138.1","kernel-rt_debug-devel":"4.12.14-10.138.1","kernel-source-rt":"4.12.14-10.138.1","kernel-syms-rt":"4.12.14-10.138.1","ocfs2-kmp-rt":"4.12.14-10.138.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.138.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.138.1","dlm-kmp-rt":"4.12.14-10.138.1","gfs2-kmp-rt":"4.12.14-10.138.1","kernel-devel-rt":"4.12.14-10.138.1","kernel-rt":"4.12.14-10.138.1","kernel-rt-base":"4.12.14-10.138.1","kernel-rt-devel":"4.12.14-10.138.1","kernel-rt_debug":"4.12.14-10.138.1","kernel-rt_debug-devel":"4.12.14-10.138.1","kernel-source-rt":"4.12.14-10.138.1","kernel-syms-rt":"4.12.14-10.138.1","ocfs2-kmp-rt":"4.12.14-10.138.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.138.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.138.1","dlm-kmp-rt":"4.12.14-10.138.1","gfs2-kmp-rt":"4.12.14-10.138.1","kernel-devel-rt":"4.12.14-10.138.1","kernel-rt":"4.12.14-10.138.1","kernel-rt-base":"4.12.14-10.138.1","kernel-rt-devel":"4.12.14-10.138.1","kernel-rt_debug":"4.12.14-10.138.1","kernel-rt_debug-devel":"4.12.14-10.138.1","kernel-source-rt":"4.12.14-10.138.1","kernel-syms-rt":"4.12.14-10.138.1","ocfs2-kmp-rt":"4.12.14-10.138.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.138.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.138.1","dlm-kmp-rt":"4.12.14-10.138.1","gfs2-kmp-rt":"4.12.14-10.138.1","kernel-devel-rt":"4.12.14-10.138.1","kernel-rt":"4.12.14-10.138.1","kernel-rt-base":"4.12.14-10.138.1","kernel-rt-devel":"4.12.14-10.138.1","kernel-rt_debug":"4.12.14-10.138.1","kernel-rt_debug-devel":"4.12.14-10.138.1","kernel-source-rt":"4.12.14-10.138.1","kernel-syms-rt":"4.12.14-10.138.1","ocfs2-kmp-rt":"4.12.14-10.138.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.138.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).\n\nThe following non-security bugs were fixed:\n\n- fix double fget() in vhost_net_set_backend() (git-fixes).\n- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).\n- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).\n- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).\n- update suse/s390-dasd-fix-no-record-found-for-raw_track_access (git-fixes bsc#1212266 bsc#1207528).\n- update suse/scsi-zfcp-fix-missing-auto-port-scan-and-thus-missing-target-ports (git-fixes bsc#1202670).\n- block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).\n- kabi fix test\n- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')\n- livepatch: check kzalloc return values (git-fixes).\n- media: videodev2.h: fix struct v4l2_input tuner index comment (git-fixes).\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).\n- net: virtio_net_hdr_to_skb: count transport header in ufo (git-fixes).\n- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).\n- powerpc/64: update speculation_store_bypass in /proc/&lt;pid>/status (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/security: fix speculation_store_bypass reporting on power10 (bsc#1188885 ltc#193722 git-fixes).\n- rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.\n- s390/cio: add dev_busid sysfs entry for each subchannel (bsc#1207526).\n- s390/cio: check the subchannel validity for dev_busid (bsc#1207526).\n- s390/cio: introduce io_subchannel_type (bsc#1207526).\n- s390/cpum_sf: adjust sampling interval to avoid hitting sample limits (git-fixes bsc#1213827).\n- s390/maccess: add no dat mode to kernel_write (git-fixes bsc#1213825).\n- s390/numa: move initial setup of node_to_cpumask_map (git-fixes bsc#1213766).\n- scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).\n- scsi: qla2xxx: array index may go out of bound (bsc#1213747).\n- scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).\n- scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).\n- scsi: qla2xxx: correct the index of array (bsc#1213747).\n- scsi: qla2xxx: drop useless list_head (bsc#1213747).\n- scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).\n- scsi: qla2xxx: fix tmf leak through (bsc#1213747).\n- scsi: qla2xxx: fix buffer overrun (bsc#1213747).\n- scsi: qla2xxx: fix command flush during tmf (bsc#1213747).\n- scsi: qla2xxx: fix deletion race condition (bsc#1213747).\n- scsi: qla2xxx: fix end of loop test (bsc#1213747).\n- scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).\n- scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).\n- scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).\n- scsi: qla2xxx: fix session hang in gnl (bsc#1213747).\n- scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).\n- scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).\n- scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).\n- scsi: qla2xxx: silence a static checker warning (bsc#1213747).\n- scsi: qla2xxx: turn off noisy message log (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).\n- scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).\n- scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).\n- svcrdma: prevent page release when nothing was received (git-fixes).\n- vfio-ccw: prevent quiesce function going into an infinite loop (git-fixes bsc#1213819).\n- vfio-ccw: release any channel program when releasing/removing vfio-ccw mdev (git-fixes bsc#1213823).\n- vhost/test: fix build for vhost test (git-fixes).\n- vhost/vsock: use kvmalloc/kvfree for larger packets (git-fixes).\n- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).\n- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).\n- vhost/vsock: fix packet delivery order to monitoring devices (git-fixes).\n- vhost/vsock: split packets to send using multiple buffers (git-fixes).\n- vhost: fix the calculation in vhost_overflow() (git-fixes).\n- vhost_net: disable zerocopy by default (git-fixes).\n- vhost_net: fix oob on sendmsg() failure (git-fixes).\n- virtio-balloon: fix managed page counts when migrating pages between zones (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: keep stop() to follow mirror sequence of open() (git-fixes).\n- virtio-pci: remove wrong address verification in vp_del_vqs() (git-fixes).\n- virtio: improve vq->broken access to avoid any compiler optimization (git-fixes).\n- virtio_net: fix error handling in virtnet_restore() (git-fixes).\n- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio_ring: fix querying of maximum dma mapping size for virtio device (git-fixes).\n- vringh: use wiov->used to check for read/write desc order (git-fixes).\n- vringh: fix __vringh_iov() when riov and wiov are different (git-fixes).\n- vsock/virtio: stop workers during the .remove() (git-fixes).\n- vsock/virtio: use rcu to avoid use-after-free on the_virtio_vsock (git-fixes).\n- xen/blkfront: Only check REQ_FUA for writes (git-fixes).\n","id":"SUSE-SU-2023:3329-1","modified":"2023-08-16T06:51:52Z","published":"2023-08-16T06:51:52Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233329-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202670"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211738"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-40982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0459"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20569"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3567"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3609"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3611"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3776"}],"related":["CVE-2022-40982","CVE-2023-0459","CVE-2023-20569","CVE-2023-3567","CVE-2023-3609","CVE-2023-3611","CVE-2023-3776"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-40982","CVE-2023-0459","CVE-2023-20569","CVE-2023-3567","CVE-2023-3609","CVE-2023-3611","CVE-2023-3776"]}