SUSE SLES12 Security Update : kernel (SUSE-SU-2024:1983-1)

high Nessus Plugin ID 200410

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:1983-1 advisory.

The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948).
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2022-48697: Fix a use-after-free (bsc#1223922).
- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506)
- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708)
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2021-47423: Fix file release memory leak (bsc#1225366).
- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2021-47401: Fix stack information leak (bsc#1225242).
- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2023-52864: Fix opening of char device (bsc#1225132).
- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).
- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).
- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)
- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).
- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).
- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
- CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).
- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bzg#1224663)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).
- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error (bsc#1223752).
- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)
- CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).
- CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931).
- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-27008: Fix out of bounds access (bsc#1223802).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1223384

https://bugzilla.suse.com/1223432

https://bugzilla.suse.com/1223509

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1101816

https://bugzilla.suse.com/1141539

https://bugzilla.suse.com/1181674

https://bugzilla.suse.com/1185902

https://bugzilla.suse.com/1187716

https://bugzilla.suse.com/1188616

https://bugzilla.suse.com/1190317

https://bugzilla.suse.com/1190795

https://bugzilla.suse.com/1191452

https://bugzilla.suse.com/1194591

https://bugzilla.suse.com/1197760

https://bugzilla.suse.com/1197894

https://bugzilla.suse.com/1203935

https://bugzilla.suse.com/1206213

https://bugzilla.suse.com/1206646

https://bugzilla.suse.com/1207186

https://bugzilla.suse.com/1209657

https://bugzilla.suse.com/1210335

https://bugzilla.suse.com/1215702

https://bugzilla.suse.com/1216702

https://bugzilla.suse.com/1217169

https://bugzilla.suse.com/1217519

https://bugzilla.suse.com/1218917

https://bugzilla.suse.com/1220487

https://bugzilla.suse.com/1220513

https://bugzilla.suse.com/1223512

https://bugzilla.suse.com/1223539

https://bugzilla.suse.com/1223540

https://bugzilla.suse.com/1223626

https://bugzilla.suse.com/1223627

https://bugzilla.suse.com/1223633

https://bugzilla.suse.com/1223653

https://bugzilla.suse.com/1223666

https://bugzilla.suse.com/1223671

https://bugzilla.suse.com/1223712

https://bugzilla.suse.com/1223715

https://bugzilla.suse.com/1223738

https://bugzilla.suse.com/1223744

https://bugzilla.suse.com/1223752

https://bugzilla.suse.com/1223802

https://bugzilla.suse.com/1223819

https://bugzilla.suse.com/1223834

https://bugzilla.suse.com/1223922

https://bugzilla.suse.com/1223923

https://bugzilla.suse.com/1223931

https://bugzilla.suse.com/1223932

https://bugzilla.suse.com/1223948

https://bugzilla.suse.com/1223969

https://bugzilla.suse.com/1224096

https://bugzilla.suse.com/1224174

https://bugzilla.suse.com/1224181

https://bugzilla.suse.com/1224347

https://bugzilla.suse.com/1224482

https://bugzilla.suse.com/1224511

https://bugzilla.suse.com/1224525

https://bugzilla.suse.com/1224566

https://bugzilla.suse.com/1224580

https://bugzilla.suse.com/1224592

https://bugzilla.suse.com/1224601

https://bugzilla.suse.com/1224607

https://bugzilla.suse.com/1224621

https://bugzilla.suse.com/1224644

https://bugzilla.suse.com/1224645

https://bugzilla.suse.com/1224648

https://bugzilla.suse.com/1224650

https://bugzilla.suse.com/1224663

https://bugzilla.suse.com/1224671

https://bugzilla.suse.com/1224676

https://bugzilla.suse.com/1224680

https://bugzilla.suse.com/1224682

https://bugzilla.suse.com/1224725

https://www.suse.com/security/cve/CVE-2021-47235

https://www.suse.com/security/cve/CVE-2021-47236

https://www.suse.com/security/cve/CVE-2021-47237

https://www.suse.com/security/cve/CVE-2021-47238

https://www.suse.com/security/cve/CVE-2021-47239

https://www.suse.com/security/cve/CVE-2021-47245

https://www.suse.com/security/cve/CVE-2021-47246

https://www.suse.com/security/cve/CVE-2021-47248

https://www.suse.com/security/cve/CVE-2021-47249

https://www.suse.com/security/cve/CVE-2021-47250

https://www.suse.com/security/cve/CVE-2021-47252

https://www.suse.com/security/cve/CVE-2021-47254

https://www.suse.com/security/cve/CVE-2021-47258

https://www.suse.com/security/cve/CVE-2021-47260

https://www.suse.com/security/cve/CVE-2021-47261

https://www.suse.com/security/cve/CVE-2021-47265

https://www.suse.com/security/cve/CVE-2021-47269

https://www.suse.com/security/cve/CVE-2021-47274

https://www.suse.com/security/cve/CVE-2021-47276

https://www.suse.com/security/cve/CVE-2021-47277

https://www.suse.com/security/cve/CVE-2021-47280

https://www.suse.com/security/cve/CVE-2021-47281

https://www.suse.com/security/cve/CVE-2021-47284

https://www.suse.com/security/cve/CVE-2021-47285

https://www.suse.com/security/cve/CVE-2021-47288

https://www.suse.com/security/cve/CVE-2021-47301

https://www.suse.com/security/cve/CVE-2021-47302

https://www.suse.com/security/cve/CVE-2021-47305

https://www.suse.com/security/cve/CVE-2021-47307

https://www.suse.com/security/cve/CVE-2021-47308

https://www.suse.com/security/cve/CVE-2021-47310

https://www.suse.com/security/cve/CVE-2021-47311

https://www.suse.com/security/cve/CVE-2021-47314

https://www.suse.com/security/cve/CVE-2021-47315

https://www.suse.com/security/cve/CVE-2021-47319

https://www.suse.com/security/cve/CVE-2021-47320

https://www.suse.com/security/cve/CVE-2021-47321

https://www.suse.com/security/cve/CVE-2021-47323

https://www.suse.com/security/cve/CVE-2021-47324

https://www.suse.com/security/cve/CVE-2021-47330

https://www.suse.com/security/cve/CVE-2021-47334

https://www.suse.com/security/cve/CVE-2021-47337

https://www.suse.com/security/cve/CVE-2021-47343

https://www.suse.com/security/cve/CVE-2021-47344

https://www.suse.com/security/cve/CVE-2021-47345

https://www.suse.com/security/cve/CVE-2021-47347

https://www.suse.com/security/cve/CVE-2024-27062

https://www.suse.com/security/cve/CVE-2024-27388

https://www.suse.com/security/cve/CVE-2024-27396

https://bugzilla.suse.com/1220854

https://bugzilla.suse.com/1220928

https://bugzilla.suse.com/1221044

https://bugzilla.suse.com/1221081

https://bugzilla.suse.com/1221086

https://bugzilla.suse.com/1221543

https://bugzilla.suse.com/1221545

https://bugzilla.suse.com/1221816

https://bugzilla.suse.com/1221977

https://bugzilla.suse.com/1221994

https://bugzilla.suse.com/1222559

https://bugzilla.suse.com/1222619

https://bugzilla.suse.com/1222627

https://bugzilla.suse.com/1222667

https://bugzilla.suse.com/1222671

https://bugzilla.suse.com/1222793

https://bugzilla.suse.com/1222893

https://bugzilla.suse.com/1222894

https://bugzilla.suse.com/1223023

https://bugzilla.suse.com/1223046

https://bugzilla.suse.com/1223048

https://bugzilla.suse.com/1223084

https://bugzilla.suse.com/1223119

https://bugzilla.suse.com/1223138

https://bugzilla.suse.com/1223207

https://bugzilla.suse.com/1223360

https://bugzilla.suse.com/1224728

https://bugzilla.suse.com/1224733

https://bugzilla.suse.com/1224738

https://bugzilla.suse.com/1224747

https://bugzilla.suse.com/1224749

https://bugzilla.suse.com/1224759

https://bugzilla.suse.com/1224803

https://bugzilla.suse.com/1224827

https://bugzilla.suse.com/1224830

https://bugzilla.suse.com/1224831

https://bugzilla.suse.com/1224834

https://bugzilla.suse.com/1224838

https://bugzilla.suse.com/1224841

https://bugzilla.suse.com/1224844

https://bugzilla.suse.com/1224846

https://bugzilla.suse.com/1224847

https://bugzilla.suse.com/1224849

https://bugzilla.suse.com/1224854

https://bugzilla.suse.com/1224859

https://bugzilla.suse.com/1224867

https://bugzilla.suse.com/1224880

https://bugzilla.suse.com/1224882

https://bugzilla.suse.com/1224888

https://bugzilla.suse.com/1224889

https://bugzilla.suse.com/1224892

https://bugzilla.suse.com/1224893

https://bugzilla.suse.com/1224899

https://bugzilla.suse.com/1224904

https://bugzilla.suse.com/1224907

https://bugzilla.suse.com/1224916

https://bugzilla.suse.com/1224917

https://bugzilla.suse.com/1224922

https://bugzilla.suse.com/1224926

https://bugzilla.suse.com/1224930

https://bugzilla.suse.com/1224931

https://bugzilla.suse.com/1224942

https://bugzilla.suse.com/1224954

https://bugzilla.suse.com/1224956

https://bugzilla.suse.com/1224957

https://bugzilla.suse.com/1224959

https://bugzilla.suse.com/1224960

https://bugzilla.suse.com/1224961

https://bugzilla.suse.com/1224963

https://bugzilla.suse.com/1224966

https://bugzilla.suse.com/1224968

https://bugzilla.suse.com/1224981

https://bugzilla.suse.com/1224982

https://bugzilla.suse.com/1224983

https://bugzilla.suse.com/1224987

https://bugzilla.suse.com/1224990

https://bugzilla.suse.com/1224996

https://bugzilla.suse.com/1225008

https://bugzilla.suse.com/1225009

https://bugzilla.suse.com/1225010

https://bugzilla.suse.com/1225022

https://bugzilla.suse.com/1225026

https://bugzilla.suse.com/1225030

https://bugzilla.suse.com/1225054

https://bugzilla.suse.com/1225058

https://bugzilla.suse.com/1225059

https://bugzilla.suse.com/1225060

https://bugzilla.suse.com/1225062

https://bugzilla.suse.com/1225082

https://bugzilla.suse.com/1225084

https://bugzilla.suse.com/1225086

https://bugzilla.suse.com/1225092

https://bugzilla.suse.com/1225096

https://bugzilla.suse.com/1225112

https://bugzilla.suse.com/1225124

https://bugzilla.suse.com/1225128

https://bugzilla.suse.com/1225132

https://bugzilla.suse.com/1225141

https://bugzilla.suse.com/1225143

https://bugzilla.suse.com/1225144

https://bugzilla.suse.com/1225151

https://bugzilla.suse.com/1225153

https://bugzilla.suse.com/1225155

https://bugzilla.suse.com/1225157

https://bugzilla.suse.com/1225164

https://bugzilla.suse.com/1225177

https://bugzilla.suse.com/1225189

https://bugzilla.suse.com/1225192

https://bugzilla.suse.com/1225193

https://bugzilla.suse.com/1225198

https://bugzilla.suse.com/1225201

https://bugzilla.suse.com/1225207

https://bugzilla.suse.com/1225208

https://bugzilla.suse.com/1225222

https://bugzilla.suse.com/1225230

https://bugzilla.suse.com/1225242

https://bugzilla.suse.com/1225244

https://bugzilla.suse.com/1225247

https://bugzilla.suse.com/1225251

https://bugzilla.suse.com/1225252

https://bugzilla.suse.com/1225256

https://bugzilla.suse.com/1225303

https://bugzilla.suse.com/1225318

https://bugzilla.suse.com/1225322

https://bugzilla.suse.com/1225329

https://bugzilla.suse.com/1225330

https://bugzilla.suse.com/1225336

https://bugzilla.suse.com/1225347

https://bugzilla.suse.com/1225351

https://bugzilla.suse.com/1225354

https://bugzilla.suse.com/1225355

https://bugzilla.suse.com/1225360

https://bugzilla.suse.com/1225366

https://bugzilla.suse.com/1225367

https://bugzilla.suse.com/1225384

https://bugzilla.suse.com/1225390

https://bugzilla.suse.com/1225404

https://bugzilla.suse.com/1225409

https://bugzilla.suse.com/1225411

https://bugzilla.suse.com/1225438

https://bugzilla.suse.com/1225453

https://bugzilla.suse.com/1225479

https://bugzilla.suse.com/1225482

https://bugzilla.suse.com/1225506

https://bugzilla.suse.com/1225549

https://bugzilla.suse.com/1225560

https://bugzilla.suse.com/1225572

https://bugzilla.suse.com/1225640

https://bugzilla.suse.com/1225708

https://bugzilla.suse.com/1225764

https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html

https://www.suse.com/security/cve/CVE-2021-46933

https://www.suse.com/security/cve/CVE-2021-46955

https://www.suse.com/security/cve/CVE-2021-47074

https://www.suse.com/security/cve/CVE-2021-47113

https://www.suse.com/security/cve/CVE-2021-47131

https://www.suse.com/security/cve/CVE-2021-47162

https://www.suse.com/security/cve/CVE-2021-47171

https://www.suse.com/security/cve/CVE-2021-47188

https://www.suse.com/security/cve/CVE-2021-47206

https://www.suse.com/security/cve/CVE-2021-47220

https://www.suse.com/security/cve/CVE-2021-47229

https://www.suse.com/security/cve/CVE-2021-47231

https://www.suse.com/security/cve/CVE-2021-47352

https://www.suse.com/security/cve/CVE-2021-47353

https://www.suse.com/security/cve/CVE-2021-47355

https://www.suse.com/security/cve/CVE-2021-47356

https://www.suse.com/security/cve/CVE-2021-47357

https://www.suse.com/security/cve/CVE-2021-47361

https://www.suse.com/security/cve/CVE-2021-47362

https://www.suse.com/security/cve/CVE-2021-47369

https://www.suse.com/security/cve/CVE-2021-47375

https://www.suse.com/security/cve/CVE-2021-47378

https://www.suse.com/security/cve/CVE-2021-47382

https://www.suse.com/security/cve/CVE-2021-47383

https://www.suse.com/security/cve/CVE-2021-47391

https://www.suse.com/security/cve/CVE-2021-47397

https://www.suse.com/security/cve/CVE-2021-47400

https://www.suse.com/security/cve/CVE-2021-47401

https://www.suse.com/security/cve/CVE-2021-47404

https://www.suse.com/security/cve/CVE-2021-47409

https://www.suse.com/security/cve/CVE-2021-47416

https://www.suse.com/security/cve/CVE-2021-47423

https://www.suse.com/security/cve/CVE-2021-47424

https://www.suse.com/security/cve/CVE-2021-47431

https://www.suse.com/security/cve/CVE-2021-47435

https://www.suse.com/security/cve/CVE-2021-47436

https://www.suse.com/security/cve/CVE-2021-47456

https://www.suse.com/security/cve/CVE-2021-47458

https://www.suse.com/security/cve/CVE-2021-47460

https://www.suse.com/security/cve/CVE-2021-47469

https://www.suse.com/security/cve/CVE-2021-47472

https://www.suse.com/security/cve/CVE-2021-47473

https://www.suse.com/security/cve/CVE-2021-47478

https://www.suse.com/security/cve/CVE-2021-47480

https://www.suse.com/security/cve/CVE-2021-47483

https://www.suse.com/security/cve/CVE-2024-27398

https://www.suse.com/security/cve/CVE-2024-27401

https://www.suse.com/security/cve/CVE-2024-27419

https://www.suse.com/security/cve/CVE-2024-27436

https://www.suse.com/security/cve/CVE-2024-35789

https://www.suse.com/security/cve/CVE-2024-35791

https://www.suse.com/security/cve/CVE-2024-35809

https://www.suse.com/security/cve/CVE-2024-35811

https://www.suse.com/security/cve/CVE-2024-35830

https://www.suse.com/security/cve/CVE-2024-35849

https://www.suse.com/security/cve/CVE-2024-35877

https://www.suse.com/security/cve/CVE-2024-35878

https://www.suse.com/security/cve/CVE-2024-35887

https://www.suse.com/security/cve/CVE-2024-35895

https://www.suse.com/security/cve/CVE-2024-35914

https://www.suse.com/security/cve/CVE-2024-35932

https://www.suse.com/security/cve/CVE-2024-35935

https://www.suse.com/security/cve/CVE-2024-35936

https://www.suse.com/security/cve/CVE-2024-35944

https://www.suse.com/security/cve/CVE-2024-35955

https://www.suse.com/security/cve/CVE-2024-35969

https://www.suse.com/security/cve/CVE-2024-35982

https://www.suse.com/security/cve/CVE-2024-35984

https://www.suse.com/security/cve/CVE-2024-36015

https://www.suse.com/security/cve/CVE-2024-36029

https://www.suse.com/security/cve/CVE-2024-36954

https://www.suse.com/security/cve/CVE-2021-47485

https://www.suse.com/security/cve/CVE-2021-47495

https://www.suse.com/security/cve/CVE-2021-47496

https://www.suse.com/security/cve/CVE-2021-47497

https://www.suse.com/security/cve/CVE-2021-47500

https://www.suse.com/security/cve/CVE-2021-47506

https://www.suse.com/security/cve/CVE-2021-47509

https://www.suse.com/security/cve/CVE-2021-47511

https://www.suse.com/security/cve/CVE-2021-47523

https://www.suse.com/security/cve/CVE-2021-47541

https://www.suse.com/security/cve/CVE-2021-47548

https://www.suse.com/security/cve/CVE-2021-47565

https://www.suse.com/security/cve/CVE-2022-48636

https://www.suse.com/security/cve/CVE-2022-48650

https://www.suse.com/security/cve/CVE-2022-48672

https://www.suse.com/security/cve/CVE-2022-48686

https://www.suse.com/security/cve/CVE-2022-48697

https://www.suse.com/security/cve/CVE-2022-48702

https://www.suse.com/security/cve/CVE-2022-48704

https://www.suse.com/security/cve/CVE-2022-48708

https://www.suse.com/security/cve/CVE-2022-48710

https://www.suse.com/security/cve/CVE-2023-0160

https://www.suse.com/security/cve/CVE-2023-1829

https://www.suse.com/security/cve/CVE-2023-42755

https://www.suse.com/security/cve/CVE-2023-47233

https://www.suse.com/security/cve/CVE-2023-52527

https://www.suse.com/security/cve/CVE-2023-52586

https://www.suse.com/security/cve/CVE-2023-52591

https://www.suse.com/security/cve/CVE-2023-52646

https://www.suse.com/security/cve/CVE-2023-52653

https://www.suse.com/security/cve/CVE-2023-52655

https://www.suse.com/security/cve/CVE-2023-52664

https://www.suse.com/security/cve/CVE-2023-52685

https://www.suse.com/security/cve/CVE-2023-52686

https://www.suse.com/security/cve/CVE-2023-52691

https://www.suse.com/security/cve/CVE-2023-52696

https://www.suse.com/security/cve/CVE-2023-52698

https://www.suse.com/security/cve/CVE-2023-52703

https://www.suse.com/security/cve/CVE-2023-52730

https://www.suse.com/security/cve/CVE-2023-52732

https://www.suse.com/security/cve/CVE-2023-52741

https://www.suse.com/security/cve/CVE-2023-52742

https://www.suse.com/security/cve/CVE-2023-52747

https://www.suse.com/security/cve/CVE-2023-52759

https://www.suse.com/security/cve/CVE-2023-52774

https://www.suse.com/security/cve/CVE-2023-52781

https://www.suse.com/security/cve/CVE-2023-52796

https://www.suse.com/security/cve/CVE-2023-52803

https://www.suse.com/security/cve/CVE-2023-52821

https://www.suse.com/security/cve/CVE-2023-52864

https://www.suse.com/security/cve/CVE-2023-52865

https://www.suse.com/security/cve/CVE-2023-52867

https://www.suse.com/security/cve/CVE-2023-52875

https://www.suse.com/security/cve/CVE-2023-52880

https://www.suse.com/security/cve/CVE-2024-0639

https://www.suse.com/security/cve/CVE-2024-26625

https://www.suse.com/security/cve/CVE-2024-26739

https://www.suse.com/security/cve/CVE-2024-26752

https://www.suse.com/security/cve/CVE-2024-26775

https://www.suse.com/security/cve/CVE-2024-26791

https://www.suse.com/security/cve/CVE-2024-26828

https://www.suse.com/security/cve/CVE-2024-26846

https://www.suse.com/security/cve/CVE-2024-26874

https://www.suse.com/security/cve/CVE-2024-26876

https://www.suse.com/security/cve/CVE-2024-26900

https://www.suse.com/security/cve/CVE-2024-26915

https://www.suse.com/security/cve/CVE-2024-26920

https://www.suse.com/security/cve/CVE-2024-26921

https://www.suse.com/security/cve/CVE-2024-26929

https://www.suse.com/security/cve/CVE-2024-26930

https://www.suse.com/security/cve/CVE-2024-26931

https://www.suse.com/security/cve/CVE-2024-26934

https://www.suse.com/security/cve/CVE-2024-26957

https://www.suse.com/security/cve/CVE-2024-26958

https://www.suse.com/security/cve/CVE-2024-26984

https://www.suse.com/security/cve/CVE-2024-26996

https://www.suse.com/security/cve/CVE-2024-27008

https://www.suse.com/security/cve/CVE-2024-27054

https://www.suse.com/security/cve/CVE-2024-27059

Plugin Details

Severity: High

ID: 200410

File Name: suse_SU-2024-1983-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 6/12/2024

Updated: 8/28/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-26934

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:dlm-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-rt-devel, p-cpe:/a:novell:suse_linux:kernel-source-rt, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-rt-base, p-cpe:/a:novell:suse_linux:gfs2-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-syms-rt, p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel, p-cpe:/a:novell:suse_linux:kernel-rt_debug, p-cpe:/a:novell:suse_linux:kernel-rt, p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt, p-cpe:/a:novell:suse_linux:kernel-devel-rt

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/11/2024

Vulnerability Publication Date: 1/12/2022

Reference Information

CVE: CVE-2021-46933, CVE-2021-46955, CVE-2021-47074, CVE-2021-47113, CVE-2021-47131, CVE-2021-47162, CVE-2021-47171, CVE-2021-47188, CVE-2021-47206, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47238, CVE-2021-47239, CVE-2021-47245, CVE-2021-47246, CVE-2021-47248, CVE-2021-47249, CVE-2021-47250, CVE-2021-47252, CVE-2021-47254, CVE-2021-47258, CVE-2021-47260, CVE-2021-47261, CVE-2021-47265, CVE-2021-47269, CVE-2021-47274, CVE-2021-47276, CVE-2021-47277, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47310, CVE-2021-47311, CVE-2021-47314, CVE-2021-47315, CVE-2021-47319, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47334, CVE-2021-47337, CVE-2021-47343, CVE-2021-47344, CVE-2021-47345, CVE-2021-47347, CVE-2021-47352, CVE-2021-47353, CVE-2021-47355, CVE-2021-47356, CVE-2021-47357, CVE-2021-47361, CVE-2021-47362, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47382, CVE-2021-47383, CVE-2021-47391, CVE-2021-47397, CVE-2021-47400, CVE-2021-47401, CVE-2021-47404, CVE-2021-47409, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47431, CVE-2021-47435, CVE-2021-47436, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47469, CVE-2021-47472, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47506, CVE-2021-47509, CVE-2021-47511, CVE-2021-47523, CVE-2021-47541, CVE-2021-47548, CVE-2021-47565, CVE-2022-48636, CVE-2022-48650, CVE-2022-48672, CVE-2022-48686, CVE-2022-48697, CVE-2022-48702, CVE-2022-48704, CVE-2022-48708, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52527, CVE-2023-52586, CVE-2023-52591, CVE-2023-52646, CVE-2023-52653, CVE-2023-52655, CVE-2023-52664, CVE-2023-52685, CVE-2023-52686, CVE-2023-52691, CVE-2023-52696, CVE-2023-52698, CVE-2023-52703, CVE-2023-52730, CVE-2023-52732, CVE-2023-52741, CVE-2023-52742, CVE-2023-52747, CVE-2023-52759, CVE-2023-52774, CVE-2023-52781, CVE-2023-52796, CVE-2023-52803, CVE-2023-52821, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52875, CVE-2023-52880, CVE-2024-0639, CVE-2024-26625, CVE-2024-26739, CVE-2024-26752, CVE-2024-26775, CVE-2024-26791, CVE-2024-26828, CVE-2024-26846, CVE-2024-26874, CVE-2024-26876, CVE-2024-26900, CVE-2024-26915, CVE-2024-26920, CVE-2024-26921, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26934, CVE-2024-26957, CVE-2024-26958, CVE-2024-26984, CVE-2024-26996, CVE-2024-27008, CVE-2024-27054, CVE-2024-27059, CVE-2024-27062, CVE-2024-27388, CVE-2024-27396, CVE-2024-27398, CVE-2024-27401, CVE-2024-27419, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35809, CVE-2024-35811, CVE-2024-35830, CVE-2024-35849, CVE-2024-35877, CVE-2024-35878, CVE-2024-35887, CVE-2024-35895, CVE-2024-35914, CVE-2024-35932, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35955, CVE-2024-35969, CVE-2024-35982, CVE-2024-35984, CVE-2024-36015, CVE-2024-36029, CVE-2024-36954

SuSE: SUSE-SU-2024:1983-1