{"affected":[{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.149.1","dlm-kmp-rt":"4.12.14-10.149.1","gfs2-kmp-rt":"4.12.14-10.149.1","kernel-devel-rt":"4.12.14-10.149.1","kernel-rt":"4.12.14-10.149.1","kernel-rt-base":"4.12.14-10.149.1","kernel-rt-devel":"4.12.14-10.149.1","kernel-rt_debug":"4.12.14-10.149.1","kernel-rt_debug-devel":"4.12.14-10.149.1","kernel-source-rt":"4.12.14-10.149.1","kernel-syms-rt":"4.12.14-10.149.1","ocfs2-kmp-rt":"4.12.14-10.149.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.149.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.149.1","dlm-kmp-rt":"4.12.14-10.149.1","gfs2-kmp-rt":"4.12.14-10.149.1","kernel-devel-rt":"4.12.14-10.149.1","kernel-rt":"4.12.14-10.149.1","kernel-rt-base":"4.12.14-10.149.1","kernel-rt-devel":"4.12.14-10.149.1","kernel-rt_debug":"4.12.14-10.149.1","kernel-rt_debug-devel":"4.12.14-10.149.1","kernel-source-rt":"4.12.14-10.149.1","kernel-syms-rt":"4.12.14-10.149.1","ocfs2-kmp-rt":"4.12.14-10.149.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.149.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.149.1","dlm-kmp-rt":"4.12.14-10.149.1","gfs2-kmp-rt":"4.12.14-10.149.1","kernel-devel-rt":"4.12.14-10.149.1","kernel-rt":"4.12.14-10.149.1","kernel-rt-base":"4.12.14-10.149.1","kernel-rt-devel":"4.12.14-10.149.1","kernel-rt_debug":"4.12.14-10.149.1","kernel-rt_debug-devel":"4.12.14-10.149.1","kernel-source-rt":"4.12.14-10.149.1","kernel-syms-rt":"4.12.14-10.149.1","ocfs2-kmp-rt":"4.12.14-10.149.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.149.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"4.12.14-10.149.1","dlm-kmp-rt":"4.12.14-10.149.1","gfs2-kmp-rt":"4.12.14-10.149.1","kernel-devel-rt":"4.12.14-10.149.1","kernel-rt":"4.12.14-10.149.1","kernel-rt-base":"4.12.14-10.149.1","kernel-rt-devel":"4.12.14-10.149.1","kernel-rt_debug":"4.12.14-10.149.1","kernel-rt_debug-devel":"4.12.14-10.149.1","kernel-source-rt":"4.12.14-10.149.1","kernel-syms-rt":"4.12.14-10.149.1","ocfs2-kmp-rt":"4.12.14-10.149.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Real Time 12 SP5","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-10.149.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)\n- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)\n- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).\n- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)\n\nThe following non-security bugs were fixed:\n\n- 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).\n- audit: fix potential double free on error path from fsnotify_add_inode_mark (git-fixes).\n- crypto: virtio: Fix use-after-free in virtio_crypto_skcipher_finalize_req() (git-fixes).\n- iommu/amd: Fix IOMMU interrupt generation in X2APIC mode (bsc#1206010).\n- iommu/amd: Remove useless irq affinity notifier (bsc#1206010).\n- iommu/amd: Set iommu->int_enabled consistently when interrupts are set up (bsc#1206010).\n- kabi: iommu/amd: Fix IOMMU interrupt generation in X2APIC mode (bsc#1206010).\n- KVM: s390: fix sthyi error handling (git-fixes bsc#1216107).\n- memcg: drop kmem.limit_in_bytes (bsc#1208788)\n- mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).\n- net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).\n- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).\n- ratelimit: Fix data-races in ___ratelimit() (git-fixes).\n- ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).\n- s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216513).\n- s390/ptrace: fix setting syscall number (git-fixes bsc#1216340).\n- s390/vdso: add missing FORCE to build targets (git-fixes bsc#1216140).\n- s390/zcrypt: change reply buffer size offering (LTC#203322 bsc#1213950).\n- s390/zcrypt: fix reply buffer calculations for CCA replies (LTC#203322 bsc#1213950).\n- scsi: zfcp: Defer fc_rport blocking until after ADISC response (LTC#203327 bsc#1213977 git-fixes).\n- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1216514).\n- tools/thermal: Fix possible path truncations (git-fixes).\n- tracing: Fix cpu buffers unavailable due to 'record_disabled' missed (git-fixes).\n- tracing: Fix memleak due to race between current_tracer and trace (git-fixes).\n- tracing: Fix race issue between cpu buffer write and swap (git-fixes).\n- uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).\n- usb: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).\n- usb: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).\n- usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes).\n- vhost-scsi: unbreak any layout for response (git-fixes).\n- virtio_balloon: fix deadlock on OOM (git-fixes).\n- virtio_balloon: fix increment of vb->num_pfns in fill_balloon() (git-fixes).\n- virtio_net: Fix error unwinding of XDP initialization (git-fixes).\n- virtio: Protect vqs list access (git-fixes).\n- vsock/virtio: add transport parameter to the virtio_transport_reset_no_sock() (git-fixes).\n- xen-netback: use default TX queue size for vifs (git-fixes).\n- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1215743).\n- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1215743).\n","id":"SUSE-SU-2023:4359-1","modified":"2023-11-03T12:47:09Z","published":"2023-11-03T12:47:09Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234359-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216340"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216514"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-31085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45862"}],"related":["CVE-2023-31085","CVE-2023-34324","CVE-2023-39189","CVE-2023-45862"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-31085","CVE-2023-34324","CVE-2023-39189","CVE-2023-45862"]}