{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.97.1","kernel-source-rt":"5.14.21-150400.15.97.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.97.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.97.1","kernel-source-rt":"5.14.21-150400.15.97.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.97.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.97.1","kernel-source-rt":"5.14.21-150400.15.97.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.97.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150400.15.97.1","kernel-source-rt":"5.14.21-150400.15.97.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150400.15.97.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).\n- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)\n- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).\n- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).\n- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).\n- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).\n\nThe following non-security bugs were fixed:\n\n- SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016).\n- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).\n- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).\n- kabi: add __nf_queue_get_refs() for kabi compliance.\n- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).\n- scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958).\n","id":"SUSE-SU-2024:3563-1","modified":"2024-10-09T09:04:25Z","published":"2024-10-09T09:04:25Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243563-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46774"}],"related":["CVE-2022-48911","CVE-2022-48923","CVE-2022-48944","CVE-2022-48945","CVE-2024-42301","CVE-2024-44946","CVE-2024-45021","CVE-2024-46674","CVE-2024-46774"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-48911","CVE-2022-48923","CVE-2022-48944","CVE-2022-48945","CVE-2024-42301","CVE-2024-44946","CVE-2024-45021","CVE-2024-46674","CVE-2024-46774"]}