SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:1659-1)

high Nessus Plugin ID 197174

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:1659-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink (bsc#1222630).
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp (bsc#1222428).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma (bsc#1222610)
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp (bsc#1222632).
- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).
- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).
- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).
- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).
- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).
- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).
- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1177529

https://bugzilla.suse.com/1192145

https://bugzilla.suse.com/1211592

https://bugzilla.suse.com/1217408

https://bugzilla.suse.com/1218562

https://bugzilla.suse.com/1218917

https://bugzilla.suse.com/1219104

https://bugzilla.suse.com/1219126

https://bugzilla.suse.com/1219169

https://bugzilla.suse.com/1219170

https://bugzilla.suse.com/1219264

https://bugzilla.suse.com/1220342

https://bugzilla.suse.com/1220569

https://bugzilla.suse.com/1220761

https://bugzilla.suse.com/1220901

https://bugzilla.suse.com/1220915

https://bugzilla.suse.com/1220935

https://bugzilla.suse.com/1221042

https://bugzilla.suse.com/1221044

https://bugzilla.suse.com/1221080

https://bugzilla.suse.com/1221084

https://bugzilla.suse.com/1221088

https://bugzilla.suse.com/1221162

https://bugzilla.suse.com/1221299

https://bugzilla.suse.com/1221612

https://bugzilla.suse.com/1221617

https://bugzilla.suse.com/1221645

https://bugzilla.suse.com/1221791

https://bugzilla.suse.com/1221825

https://bugzilla.suse.com/1222011

https://bugzilla.suse.com/1222051

https://bugzilla.suse.com/1222247

https://bugzilla.suse.com/1222266

https://bugzilla.suse.com/1222294

https://bugzilla.suse.com/1222307

https://bugzilla.suse.com/1222357

https://bugzilla.suse.com/1222368

https://bugzilla.suse.com/1222379

https://bugzilla.suse.com/1222416

https://bugzilla.suse.com/1222422

https://bugzilla.suse.com/1222424

https://bugzilla.suse.com/1222427

https://bugzilla.suse.com/1222428

https://bugzilla.suse.com/1222430

https://bugzilla.suse.com/1222630

https://bugzilla.suse.com/1222632

https://bugzilla.suse.com/1222660

https://bugzilla.suse.com/1222662

https://bugzilla.suse.com/1222664

https://bugzilla.suse.com/1222666

https://bugzilla.suse.com/1222669

https://bugzilla.suse.com/1222671

https://bugzilla.suse.com/1222677

https://bugzilla.suse.com/1222678

https://bugzilla.suse.com/1222680

https://bugzilla.suse.com/1222703

https://bugzilla.suse.com/1222704

https://bugzilla.suse.com/1222706

https://bugzilla.suse.com/1222709

https://bugzilla.suse.com/1222710

https://bugzilla.suse.com/1222720

https://bugzilla.suse.com/1222781

https://bugzilla.suse.com/1222784

https://bugzilla.suse.com/1222785

https://bugzilla.suse.com/1222787

https://bugzilla.suse.com/1222790

https://bugzilla.suse.com/1222791

https://bugzilla.suse.com/1222792

https://bugzilla.suse.com/1222796

https://bugzilla.suse.com/1222878

https://bugzilla.suse.com/1222879

https://bugzilla.suse.com/1222881

https://bugzilla.suse.com/1222883

https://bugzilla.suse.com/1222888

https://bugzilla.suse.com/1222894

https://bugzilla.suse.com/1222901

https://bugzilla.suse.com/1222968

https://bugzilla.suse.com/1223012

https://bugzilla.suse.com/1223014

https://bugzilla.suse.com/1223016

https://bugzilla.suse.com/1223024

https://bugzilla.suse.com/1223030

https://bugzilla.suse.com/1223052

https://bugzilla.suse.com/1223056

https://bugzilla.suse.com/1223057

https://bugzilla.suse.com/1223058

https://bugzilla.suse.com/1223060

https://bugzilla.suse.com/1223061

https://bugzilla.suse.com/1223065

https://bugzilla.suse.com/1223066

https://bugzilla.suse.com/1223067

https://bugzilla.suse.com/1223068

https://bugzilla.suse.com/1223076

https://bugzilla.suse.com/1223078

https://bugzilla.suse.com/1223111

https://bugzilla.suse.com/1223115

https://bugzilla.suse.com/1223118

https://bugzilla.suse.com/1223187

https://bugzilla.suse.com/1223189

https://bugzilla.suse.com/1223190

https://bugzilla.suse.com/1223191

https://bugzilla.suse.com/1223196

https://bugzilla.suse.com/1223197

https://bugzilla.suse.com/1223198

https://bugzilla.suse.com/1223275

https://bugzilla.suse.com/1223323

https://bugzilla.suse.com/1223369

https://bugzilla.suse.com/1223878

https://bugzilla.suse.com/1223879

https://bugzilla.suse.com/1223894

https://bugzilla.suse.com/1223921

https://bugzilla.suse.com/1223922

https://bugzilla.suse.com/1223923

https://bugzilla.suse.com/1223924

https://bugzilla.suse.com/1223929

https://bugzilla.suse.com/1223931

https://bugzilla.suse.com/1223932

https://bugzilla.suse.com/1223934

https://bugzilla.suse.com/1223941

https://bugzilla.suse.com/1223948

https://bugzilla.suse.com/1223949

https://bugzilla.suse.com/1223950

https://bugzilla.suse.com/1223951

https://bugzilla.suse.com/1223952

https://bugzilla.suse.com/1223953

https://bugzilla.suse.com/1223956

https://bugzilla.suse.com/1223957

https://bugzilla.suse.com/1223960

https://bugzilla.suse.com/1223962

https://bugzilla.suse.com/1223963

https://bugzilla.suse.com/1223964

https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html

https://www.suse.com/security/cve/CVE-2021-47047

https://www.suse.com/security/cve/CVE-2021-47181

https://www.suse.com/security/cve/CVE-2021-47182

https://www.suse.com/security/cve/CVE-2021-47183

https://www.suse.com/security/cve/CVE-2021-47184

https://www.suse.com/security/cve/CVE-2021-47185

https://www.suse.com/security/cve/CVE-2021-47187

https://www.suse.com/security/cve/CVE-2021-47188

https://www.suse.com/security/cve/CVE-2021-47189

https://www.suse.com/security/cve/CVE-2021-47191

https://www.suse.com/security/cve/CVE-2021-47192

https://www.suse.com/security/cve/CVE-2021-47193

https://www.suse.com/security/cve/CVE-2021-47194

https://www.suse.com/security/cve/CVE-2022-48655

https://www.suse.com/security/cve/CVE-2022-48656

https://www.suse.com/security/cve/CVE-2022-48657

https://www.suse.com/security/cve/CVE-2022-48658

https://www.suse.com/security/cve/CVE-2022-48659

https://www.suse.com/security/cve/CVE-2022-48660

https://www.suse.com/security/cve/CVE-2022-48662

https://www.suse.com/security/cve/CVE-2022-48663

https://www.suse.com/security/cve/CVE-2022-48667

https://www.suse.com/security/cve/CVE-2022-48668

https://www.suse.com/security/cve/CVE-2022-48671

https://www.suse.com/security/cve/CVE-2022-48672

https://www.suse.com/security/cve/CVE-2022-48673

https://www.suse.com/security/cve/CVE-2022-48675

https://www.suse.com/security/cve/CVE-2022-48686

https://www.suse.com/security/cve/CVE-2022-48687

https://www.suse.com/security/cve/CVE-2022-48688

https://www.suse.com/security/cve/CVE-2022-48690

https://www.suse.com/security/cve/CVE-2022-48692

https://www.suse.com/security/cve/CVE-2022-48693

https://www.suse.com/security/cve/CVE-2022-48694

https://www.suse.com/security/cve/CVE-2022-48695

https://www.suse.com/security/cve/CVE-2022-48697

https://www.suse.com/security/cve/CVE-2022-48698

https://www.suse.com/security/cve/CVE-2022-48700

https://www.suse.com/security/cve/CVE-2022-48701

https://www.suse.com/security/cve/CVE-2022-48702

https://www.suse.com/security/cve/CVE-2022-48703

https://www.suse.com/security/cve/CVE-2022-48704

https://www.suse.com/security/cve/CVE-2023-2860

https://www.suse.com/security/cve/CVE-2023-52488

https://www.suse.com/security/cve/CVE-2023-52503

https://www.suse.com/security/cve/CVE-2023-52561

https://www.suse.com/security/cve/CVE-2023-52585

https://www.suse.com/security/cve/CVE-2023-52589

https://www.suse.com/security/cve/CVE-2023-52590

https://www.suse.com/security/cve/CVE-2023-52591

https://www.suse.com/security/cve/CVE-2023-52593

https://www.suse.com/security/cve/CVE-2023-52614

https://www.suse.com/security/cve/CVE-2023-52616

https://www.suse.com/security/cve/CVE-2023-52620

https://www.suse.com/security/cve/CVE-2023-52627

https://www.suse.com/security/cve/CVE-2023-52635

https://www.suse.com/security/cve/CVE-2023-52636

https://www.suse.com/security/cve/CVE-2023-52645

https://www.suse.com/security/cve/CVE-2023-52652

https://www.suse.com/security/cve/CVE-2023-6270

https://www.suse.com/security/cve/CVE-2024-0639

https://www.suse.com/security/cve/CVE-2024-0841

https://www.suse.com/security/cve/CVE-2024-22099

https://www.suse.com/security/cve/CVE-2024-23307

https://www.suse.com/security/cve/CVE-2024-23848

https://www.suse.com/security/cve/CVE-2024-23850

https://www.suse.com/security/cve/CVE-2024-26601

https://www.suse.com/security/cve/CVE-2024-26610

https://www.suse.com/security/cve/CVE-2024-26656

https://www.suse.com/security/cve/CVE-2024-26660

https://www.suse.com/security/cve/CVE-2024-26671

https://www.suse.com/security/cve/CVE-2024-26673

https://www.suse.com/security/cve/CVE-2024-26675

https://www.suse.com/security/cve/CVE-2024-26680

https://bugzilla.suse.com/1222431

https://bugzilla.suse.com/1222435

https://bugzilla.suse.com/1222437

https://bugzilla.suse.com/1222445

https://bugzilla.suse.com/1222449

https://bugzilla.suse.com/1222482

https://bugzilla.suse.com/1222503

https://bugzilla.suse.com/1222520

https://bugzilla.suse.com/1222536

https://bugzilla.suse.com/1222549

https://bugzilla.suse.com/1222550

https://bugzilla.suse.com/1222557

https://bugzilla.suse.com/1222559

https://bugzilla.suse.com/1222585

https://bugzilla.suse.com/1222586

https://bugzilla.suse.com/1222596

https://bugzilla.suse.com/1222609

https://bugzilla.suse.com/1222610

https://bugzilla.suse.com/1222613

https://bugzilla.suse.com/1222615

https://bugzilla.suse.com/1222618

https://bugzilla.suse.com/1222624

https://bugzilla.suse.com/1222721

https://bugzilla.suse.com/1222724

https://bugzilla.suse.com/1222726

https://bugzilla.suse.com/1222727

https://bugzilla.suse.com/1222764

https://bugzilla.suse.com/1222772

https://bugzilla.suse.com/1222773

https://bugzilla.suse.com/1222776

https://bugzilla.suse.com/1222798

https://bugzilla.suse.com/1222801

https://bugzilla.suse.com/1222812

https://bugzilla.suse.com/1222824

https://bugzilla.suse.com/1222829

https://bugzilla.suse.com/1222832

https://bugzilla.suse.com/1222836

https://bugzilla.suse.com/1222838

https://bugzilla.suse.com/1222866

https://bugzilla.suse.com/1222867

https://bugzilla.suse.com/1222869

https://bugzilla.suse.com/1222876

https://bugzilla.suse.com/1223033

https://bugzilla.suse.com/1223034

https://bugzilla.suse.com/1223035

https://bugzilla.suse.com/1223036

https://bugzilla.suse.com/1223037

https://bugzilla.suse.com/1223041

https://bugzilla.suse.com/1223042

https://bugzilla.suse.com/1223051

https://bugzilla.suse.com/1223380

https://bugzilla.suse.com/1223473

https://bugzilla.suse.com/1223474

https://bugzilla.suse.com/1223475

https://bugzilla.suse.com/1223477

https://bugzilla.suse.com/1223478

https://bugzilla.suse.com/1223479

https://bugzilla.suse.com/1223481

https://bugzilla.suse.com/1223482

https://bugzilla.suse.com/1223484

https://bugzilla.suse.com/1223487

https://bugzilla.suse.com/1223490

https://bugzilla.suse.com/1223496

https://bugzilla.suse.com/1223498

https://bugzilla.suse.com/1223499

https://bugzilla.suse.com/1223501

https://bugzilla.suse.com/1223502

https://bugzilla.suse.com/1223503

https://bugzilla.suse.com/1223505

https://bugzilla.suse.com/1223509

https://bugzilla.suse.com/1223511

https://bugzilla.suse.com/1223512

https://bugzilla.suse.com/1223513

https://bugzilla.suse.com/1223516

https://bugzilla.suse.com/1223517

https://bugzilla.suse.com/1223518

https://bugzilla.suse.com/1223519

https://bugzilla.suse.com/1223520

https://bugzilla.suse.com/1223522

https://bugzilla.suse.com/1223523

https://bugzilla.suse.com/1223525

https://bugzilla.suse.com/1223539

https://bugzilla.suse.com/1223574

https://bugzilla.suse.com/1223595

https://bugzilla.suse.com/1223598

https://bugzilla.suse.com/1223634

https://bugzilla.suse.com/1223643

https://bugzilla.suse.com/1223644

https://bugzilla.suse.com/1223645

https://bugzilla.suse.com/1223646

https://bugzilla.suse.com/1223648

https://bugzilla.suse.com/1223655

https://bugzilla.suse.com/1223657

https://bugzilla.suse.com/1223660

https://bugzilla.suse.com/1223661

https://bugzilla.suse.com/1223663

https://bugzilla.suse.com/1223664

https://bugzilla.suse.com/1223668

https://bugzilla.suse.com/1223686

https://bugzilla.suse.com/1223693

https://bugzilla.suse.com/1223705

https://bugzilla.suse.com/1223714

https://bugzilla.suse.com/1223735

https://bugzilla.suse.com/1223745

https://bugzilla.suse.com/1223784

https://bugzilla.suse.com/1223785

https://bugzilla.suse.com/1223790

https://bugzilla.suse.com/1223816

https://bugzilla.suse.com/1223821

https://bugzilla.suse.com/1223822

https://bugzilla.suse.com/1223824

https://bugzilla.suse.com/1223827

https://bugzilla.suse.com/1223834

https://bugzilla.suse.com/1223875

https://bugzilla.suse.com/1223876

https://bugzilla.suse.com/1223877

https://www.suse.com/security/cve/CVE-2021-47195

https://www.suse.com/security/cve/CVE-2021-47196

https://www.suse.com/security/cve/CVE-2021-47197

https://www.suse.com/security/cve/CVE-2021-47198

https://www.suse.com/security/cve/CVE-2021-47199

https://www.suse.com/security/cve/CVE-2021-47200

https://www.suse.com/security/cve/CVE-2021-47201

https://www.suse.com/security/cve/CVE-2021-47202

https://www.suse.com/security/cve/CVE-2021-47203

https://www.suse.com/security/cve/CVE-2021-47204

https://www.suse.com/security/cve/CVE-2021-47205

https://www.suse.com/security/cve/CVE-2021-47206

https://www.suse.com/security/cve/CVE-2021-47207

https://www.suse.com/security/cve/CVE-2021-47209

https://www.suse.com/security/cve/CVE-2021-47210

https://www.suse.com/security/cve/CVE-2021-47211

https://www.suse.com/security/cve/CVE-2021-47212

https://www.suse.com/security/cve/CVE-2021-47214

https://www.suse.com/security/cve/CVE-2021-47215

https://www.suse.com/security/cve/CVE-2021-47216

https://www.suse.com/security/cve/CVE-2021-47217

https://www.suse.com/security/cve/CVE-2021-47218

https://www.suse.com/security/cve/CVE-2021-47219

https://www.suse.com/security/cve/CVE-2022-48631

https://www.suse.com/security/cve/CVE-2022-48632

https://www.suse.com/security/cve/CVE-2022-48634

https://www.suse.com/security/cve/CVE-2022-48636

https://www.suse.com/security/cve/CVE-2022-48637

https://www.suse.com/security/cve/CVE-2022-48638

https://www.suse.com/security/cve/CVE-2022-48639

https://www.suse.com/security/cve/CVE-2022-48640

https://www.suse.com/security/cve/CVE-2022-48642

https://www.suse.com/security/cve/CVE-2022-48644

https://www.suse.com/security/cve/CVE-2022-48646

https://www.suse.com/security/cve/CVE-2022-48647

https://www.suse.com/security/cve/CVE-2022-48648

https://www.suse.com/security/cve/CVE-2022-48650

https://www.suse.com/security/cve/CVE-2022-48651

https://www.suse.com/security/cve/CVE-2022-48652

https://www.suse.com/security/cve/CVE-2022-48653

https://www.suse.com/security/cve/CVE-2022-48654

https://www.suse.com/security/cve/CVE-2024-26688

https://www.suse.com/security/cve/CVE-2024-26689

https://www.suse.com/security/cve/CVE-2024-26696

https://www.suse.com/security/cve/CVE-2024-26697

https://www.suse.com/security/cve/CVE-2024-26702

https://www.suse.com/security/cve/CVE-2024-26704

https://www.suse.com/security/cve/CVE-2024-26718

https://www.suse.com/security/cve/CVE-2024-26722

https://www.suse.com/security/cve/CVE-2024-26727

https://www.suse.com/security/cve/CVE-2024-26733

https://www.suse.com/security/cve/CVE-2024-26736

https://www.suse.com/security/cve/CVE-2024-26737

https://www.suse.com/security/cve/CVE-2024-26739

https://www.suse.com/security/cve/CVE-2024-26743

https://www.suse.com/security/cve/CVE-2024-26744

https://www.suse.com/security/cve/CVE-2024-26745

https://www.suse.com/security/cve/CVE-2024-26747

https://www.suse.com/security/cve/CVE-2024-26749

https://www.suse.com/security/cve/CVE-2024-26751

https://www.suse.com/security/cve/CVE-2024-26754

https://www.suse.com/security/cve/CVE-2024-26760

https://www.suse.com/security/cve/CVE-2024-26763

https://www.suse.com/security/cve/CVE-2024-26764

https://www.suse.com/security/cve/CVE-2024-26766

https://www.suse.com/security/cve/CVE-2024-26769

https://www.suse.com/security/cve/CVE-2024-26771

https://www.suse.com/security/cve/CVE-2024-26772

https://www.suse.com/security/cve/CVE-2024-26773

https://www.suse.com/security/cve/CVE-2024-26776

https://www.suse.com/security/cve/CVE-2024-26779

https://www.suse.com/security/cve/CVE-2024-26783

https://www.suse.com/security/cve/CVE-2024-26787

https://www.suse.com/security/cve/CVE-2024-26790

https://www.suse.com/security/cve/CVE-2024-26681

https://www.suse.com/security/cve/CVE-2024-26684

https://www.suse.com/security/cve/CVE-2024-26685

https://www.suse.com/security/cve/CVE-2024-26687

https://www.suse.com/security/cve/CVE-2024-26792

https://www.suse.com/security/cve/CVE-2024-26793

https://www.suse.com/security/cve/CVE-2024-26798

https://www.suse.com/security/cve/CVE-2024-26805

https://www.suse.com/security/cve/CVE-2024-26807

https://www.suse.com/security/cve/CVE-2024-26816

https://www.suse.com/security/cve/CVE-2024-26817

https://www.suse.com/security/cve/CVE-2024-26820

https://www.suse.com/security/cve/CVE-2024-26825

https://www.suse.com/security/cve/CVE-2024-26830

https://www.suse.com/security/cve/CVE-2024-26833

https://www.suse.com/security/cve/CVE-2024-26836

https://www.suse.com/security/cve/CVE-2024-26843

https://www.suse.com/security/cve/CVE-2024-26848

https://www.suse.com/security/cve/CVE-2024-26852

https://www.suse.com/security/cve/CVE-2024-26853

https://www.suse.com/security/cve/CVE-2024-26855

https://www.suse.com/security/cve/CVE-2024-26856

https://www.suse.com/security/cve/CVE-2024-26857

https://www.suse.com/security/cve/CVE-2024-26861

https://www.suse.com/security/cve/CVE-2024-26862

https://www.suse.com/security/cve/CVE-2024-26866

https://www.suse.com/security/cve/CVE-2024-26872

https://www.suse.com/security/cve/CVE-2024-26875

https://www.suse.com/security/cve/CVE-2024-26878

https://www.suse.com/security/cve/CVE-2024-26879

https://www.suse.com/security/cve/CVE-2024-26881

https://www.suse.com/security/cve/CVE-2024-26882

https://www.suse.com/security/cve/CVE-2024-26883

https://www.suse.com/security/cve/CVE-2024-26884

https://www.suse.com/security/cve/CVE-2024-26885

https://www.suse.com/security/cve/CVE-2024-26891

https://www.suse.com/security/cve/CVE-2024-26893

https://www.suse.com/security/cve/CVE-2024-26895

https://www.suse.com/security/cve/CVE-2024-26896

https://www.suse.com/security/cve/CVE-2024-26897

https://www.suse.com/security/cve/CVE-2024-26898

https://www.suse.com/security/cve/CVE-2024-26901

https://www.suse.com/security/cve/CVE-2024-26903

https://www.suse.com/security/cve/CVE-2024-26917

https://www.suse.com/security/cve/CVE-2024-26927

https://www.suse.com/security/cve/CVE-2024-26948

https://www.suse.com/security/cve/CVE-2024-26950

https://www.suse.com/security/cve/CVE-2024-26951

https://www.suse.com/security/cve/CVE-2024-26955

https://www.suse.com/security/cve/CVE-2024-26956

https://www.suse.com/security/cve/CVE-2024-26960

https://www.suse.com/security/cve/CVE-2024-26965

https://www.suse.com/security/cve/CVE-2024-26966

https://www.suse.com/security/cve/CVE-2024-26969

https://www.suse.com/security/cve/CVE-2024-26970

https://www.suse.com/security/cve/CVE-2024-26972

https://www.suse.com/security/cve/CVE-2024-26981

https://www.suse.com/security/cve/CVE-2024-26982

https://www.suse.com/security/cve/CVE-2024-26993

https://www.suse.com/security/cve/CVE-2024-27013

https://www.suse.com/security/cve/CVE-2024-27014

https://www.suse.com/security/cve/CVE-2024-27030

https://www.suse.com/security/cve/CVE-2024-27038

https://www.suse.com/security/cve/CVE-2024-27039

https://www.suse.com/security/cve/CVE-2024-27041

https://www.suse.com/security/cve/CVE-2024-27043

https://www.suse.com/security/cve/CVE-2024-27046

https://www.suse.com/security/cve/CVE-2024-27056

https://www.suse.com/security/cve/CVE-2024-27062

https://www.suse.com/security/cve/CVE-2024-27389

Plugin Details

Severity: High

ID: 197174

File Name: suse_SU-2024-1659-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 5/16/2024

Updated: 8/28/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-26898

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_62-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/15/2024

Vulnerability Publication Date: 9/30/2022

Reference Information

CVE: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389

SuSE: SUSE-SU-2024:1659-1