SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:3209-1)

high Nessus Plugin ID 207050

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3209-1 advisory.

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
- CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).
- CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).
- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
- CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768)
- CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
- CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
- CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).
- CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2024-26812: struct virqfd kABI workaround (bsc#1222808).
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
- CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605)
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722).
- CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569).
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
- CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
- CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962)
- CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428).
- CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
- CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510).
- CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
- CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-27016: Validate pppoe header (bsc#1223807).
- CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
- CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877).
- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
- CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297).
- CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
- CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
- CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314)
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number') (bsc#1222387)
- CVE-2024-36009: Blacklist 467324bcfe1a ('ax25: Fix netdev refcount issue') (bsc#1224542)
- CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351).
- CVE-2024-26669: Fix chain template offload (bsc#1222350).
- CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287).
- CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508).
- CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).
- CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).
- CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).
- CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350).
- CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319).
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
- CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
- CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958).
- CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
- CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
- CVE-2024-42139: Fix improper extts handling (bsc#1228503).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
- CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (bsc#1226613).
- CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
- CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1196516

https://bugzilla.suse.com/1193629

https://bugzilla.suse.com/1194111

https://bugzilla.suse.com/1194765

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1198017

https://bugzilla.suse.com/1203360

https://bugzilla.suse.com/1206006

https://bugzilla.suse.com/1206258

https://bugzilla.suse.com/1207158

https://bugzilla.suse.com/1206843

https://bugzilla.suse.com/1210644

https://bugzilla.suse.com/1213632

https://bugzilla.suse.com/1203329

https://bugzilla.suse.com/1203330

https://bugzilla.suse.com/1205462

https://bugzilla.suse.com/1213580

https://bugzilla.suse.com/1214285

https://www.suse.com/security/cve/CVE-2022-38457

https://www.suse.com/security/cve/CVE-2022-40133

https://www.suse.com/security/cve/CVE-2023-3610

https://bugzilla.suse.com/1221645

https://bugzilla.suse.com/1223191

https://bugzilla.suse.com/1220428

https://bugzilla.suse.com/1224542

https://bugzilla.suse.com/1224578

https://bugzilla.suse.com/1224639

https://bugzilla.suse.com/1225578

https://bugzilla.suse.com/1225773

https://www.suse.com/security/cve/CVE-2023-52458

https://www.suse.com/security/cve/CVE-2024-35945

https://www.suse.com/security/cve/CVE-2024-35971

https://www.suse.com/security/cve/CVE-2024-36009

https://www.suse.com/security/cve/CVE-2024-36013

https://www.suse.com/security/cve/CVE-2024-36936

https://bugzilla.suse.com/1220877

https://www.suse.com/security/cve/CVE-2023-52581

https://bugzilla.suse.com/1225827

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226613

https://bugzilla.suse.com/1226742

https://www.suse.com/security/cve/CVE-2024-36962

https://www.suse.com/security/cve/CVE-2024-38554

https://www.suse.com/security/cve/CVE-2024-38602

https://bugzilla.suse.com/1223807

https://www.suse.com/security/cve/CVE-2024-27016

https://www.suse.com/security/cve/CVE-2024-41011

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1222372

https://bugzilla.suse.com/1227830

https://bugzilla.suse.com/1227929

https://bugzilla.suse.com/1228410

https://bugzilla.suse.com/1228567

https://bugzilla.suse.com/1228584

https://bugzilla.suse.com/1228588

https://bugzilla.suse.com/1228658

https://bugzilla.suse.com/1228662

https://bugzilla.suse.com/1228726

https://bugzilla.suse.com/1228850

https://www.suse.com/security/cve/CVE-2024-26735

https://www.suse.com/security/cve/CVE-2024-40978

https://www.suse.com/security/cve/CVE-2024-40995

https://www.suse.com/security/cve/CVE-2024-41016

https://www.suse.com/security/cve/CVE-2024-41060

https://www.suse.com/security/cve/CVE-2024-41089

https://www.suse.com/security/cve/CVE-2024-41095

https://www.suse.com/security/cve/CVE-2024-42119

https://www.suse.com/security/cve/CVE-2024-42120

https://www.suse.com/security/cve/CVE-2024-42223

https://bugzilla.suse.com/1208783

https://bugzilla.suse.com/1228020

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228801

https://bugzilla.suse.com/1228857

https://www.suse.com/security/cve/CVE-2021-47546

https://www.suse.com/security/cve/CVE-2024-41009

https://www.suse.com/security/cve/CVE-2024-41087

https://www.suse.com/security/cve/CVE-2024-42230

https://bugzilla.suse.com/1226168

https://bugzilla.suse.com/1222335

https://bugzilla.suse.com/1222387

https://bugzilla.suse.com/1222808

https://bugzilla.suse.com/1223074

https://bugzilla.suse.com/1223803

https://bugzilla.suse.com/1226798

https://bugzilla.suse.com/1226801

https://bugzilla.suse.com/1226885

https://bugzilla.suse.com/1227623

https://bugzilla.suse.com/1228065

https://bugzilla.suse.com/1228427

https://bugzilla.suse.com/1228449

https://bugzilla.suse.com/1228466

https://bugzilla.suse.com/1228467

https://bugzilla.suse.com/1228482

https://bugzilla.suse.com/1228485

https://bugzilla.suse.com/1228487

https://bugzilla.suse.com/1228493

https://bugzilla.suse.com/1228495

https://bugzilla.suse.com/1228501

https://bugzilla.suse.com/1228513

https://bugzilla.suse.com/1228516

https://bugzilla.suse.com/1228576

https://bugzilla.suse.com/1228579

https://bugzilla.suse.com/1228667

https://bugzilla.suse.com/1228706

https://bugzilla.suse.com/1228720

https://bugzilla.suse.com/1228727

https://bugzilla.suse.com/1228733

https://bugzilla.suse.com/1228959

https://bugzilla.suse.com/1228964

https://bugzilla.suse.com/1228966

https://bugzilla.suse.com/1228967

https://bugzilla.suse.com/1228989

https://bugzilla.suse.com/1229154

https://bugzilla.suse.com/1229290

https://bugzilla.suse.com/1229292

https://bugzilla.suse.com/1229301

https://bugzilla.suse.com/1229309

https://bugzilla.suse.com/1229327

https://bugzilla.suse.com/1229345

https://bugzilla.suse.com/1229346

https://bugzilla.suse.com/1229347

https://bugzilla.suse.com/1229357

https://bugzilla.suse.com/1229358

https://bugzilla.suse.com/1229359

https://bugzilla.suse.com/1229381

https://bugzilla.suse.com/1229382

https://bugzilla.suse.com/1229386

https://bugzilla.suse.com/1229388

https://bugzilla.suse.com/1229392

https://bugzilla.suse.com/1229395

https://bugzilla.suse.com/1229398

https://bugzilla.suse.com/1229399

https://bugzilla.suse.com/1229400

https://bugzilla.suse.com/1229407

https://bugzilla.suse.com/1229482

https://bugzilla.suse.com/1229489

https://bugzilla.suse.com/1229490

https://bugzilla.suse.com/1229495

https://bugzilla.suse.com/1229497

https://bugzilla.suse.com/1229500

https://bugzilla.suse.com/1229503

https://bugzilla.suse.com/1229516

https://bugzilla.suse.com/1229526

https://bugzilla.suse.com/1229531

https://bugzilla.suse.com/1229535

https://bugzilla.suse.com/1229536

https://bugzilla.suse.com/1229540

https://bugzilla.suse.com/1229604

https://bugzilla.suse.com/1229623

https://bugzilla.suse.com/1229624

https://bugzilla.suse.com/1229630

https://bugzilla.suse.com/1229632

https://bugzilla.suse.com/1229657

https://bugzilla.suse.com/1229658

https://bugzilla.suse.com/1229664

https://bugzilla.suse.com/1229707

https://bugzilla.suse.com/1229756

https://bugzilla.suse.com/1229759

https://bugzilla.suse.com/1229761

https://bugzilla.suse.com/1229767

https://bugzilla.suse.com/1229784

https://bugzilla.suse.com/1229787

https://www.suse.com/security/cve/CVE-2022-48865

https://www.suse.com/security/cve/CVE-2022-48875

https://www.suse.com/security/cve/CVE-2022-48896

https://www.suse.com/security/cve/CVE-2022-48899

https://www.suse.com/security/cve/CVE-2022-48905

https://www.suse.com/security/cve/CVE-2022-48910

https://www.suse.com/security/cve/CVE-2022-48919

https://www.suse.com/security/cve/CVE-2022-48920

https://www.suse.com/security/cve/CVE-2022-48925

https://www.suse.com/security/cve/CVE-2022-48930

https://www.suse.com/security/cve/CVE-2022-48931

https://www.suse.com/security/cve/CVE-2022-48938

https://www.suse.com/security/cve/CVE-2023-52893

https://www.suse.com/security/cve/CVE-2023-52901

https://www.suse.com/security/cve/CVE-2023-52907

https://www.suse.com/security/cve/CVE-2024-26668

https://www.suse.com/security/cve/CVE-2024-26677

https://www.suse.com/security/cve/CVE-2024-26812

https://www.suse.com/security/cve/CVE-2024-26851

https://www.suse.com/security/cve/CVE-2024-27011

https://www.suse.com/security/cve/CVE-2024-36270

https://www.suse.com/security/cve/CVE-2024-36286

https://www.suse.com/security/cve/CVE-2024-38662

https://www.suse.com/security/cve/CVE-2024-39489

https://www.suse.com/security/cve/CVE-2024-41020

https://www.suse.com/security/cve/CVE-2024-41035

https://www.suse.com/security/cve/CVE-2024-41062

https://www.suse.com/security/cve/CVE-2024-41068

https://www.suse.com/security/cve/CVE-2024-41097

https://www.suse.com/security/cve/CVE-2024-41098

https://www.suse.com/security/cve/CVE-2024-42077

https://www.suse.com/security/cve/CVE-2024-42082

https://www.suse.com/security/cve/CVE-2024-42090

https://www.suse.com/security/cve/CVE-2024-42101

https://www.suse.com/security/cve/CVE-2024-42106

https://www.suse.com/security/cve/CVE-2024-42110

https://www.suse.com/security/cve/CVE-2024-42148

https://www.suse.com/security/cve/CVE-2024-42155

https://www.suse.com/security/cve/CVE-2024-42157

https://www.suse.com/security/cve/CVE-2024-42158

https://www.suse.com/security/cve/CVE-2024-42162

https://www.suse.com/security/cve/CVE-2024-42228

https://www.suse.com/security/cve/CVE-2024-42232

https://www.suse.com/security/cve/CVE-2024-42236

https://www.suse.com/security/cve/CVE-2024-42240

https://www.suse.com/security/cve/CVE-2024-42244

https://www.suse.com/security/cve/CVE-2024-42246

https://www.suse.com/security/cve/CVE-2024-42271

https://www.suse.com/security/cve/CVE-2024-42280

https://www.suse.com/security/cve/CVE-2024-42281

https://www.suse.com/security/cve/CVE-2024-42284

https://www.suse.com/security/cve/CVE-2024-42285

https://www.suse.com/security/cve/CVE-2024-42286

https://www.suse.com/security/cve/CVE-2024-42287

https://www.suse.com/security/cve/CVE-2024-42288

https://www.suse.com/security/cve/CVE-2024-42289

https://www.suse.com/security/cve/CVE-2024-42301

https://www.suse.com/security/cve/CVE-2024-42309

https://www.suse.com/security/cve/CVE-2024-42310

https://www.suse.com/security/cve/CVE-2024-42312

https://www.suse.com/security/cve/CVE-2024-42322

https://www.suse.com/security/cve/CVE-2024-43819

https://www.suse.com/security/cve/CVE-2024-43831

https://www.suse.com/security/cve/CVE-2024-43839

https://www.suse.com/security/cve/CVE-2024-43853

https://www.suse.com/security/cve/CVE-2024-43854

https://www.suse.com/security/cve/CVE-2024-43856

https://www.suse.com/security/cve/CVE-2024-43861

https://www.suse.com/security/cve/CVE-2024-43863

https://www.suse.com/security/cve/CVE-2024-43866

https://www.suse.com/security/cve/CVE-2024-43871

https://www.suse.com/security/cve/CVE-2024-43872

https://www.suse.com/security/cve/CVE-2024-43879

https://www.suse.com/security/cve/CVE-2024-43882

https://www.suse.com/security/cve/CVE-2024-43883

https://www.suse.com/security/cve/CVE-2024-43892

https://www.suse.com/security/cve/CVE-2024-43893

https://www.suse.com/security/cve/CVE-2024-43900

https://www.suse.com/security/cve/CVE-2024-43902

https://www.suse.com/security/cve/CVE-2024-43905

https://www.suse.com/security/cve/CVE-2024-43907

https://bugzilla.suse.com/1196261

https://bugzilla.suse.com/1196894

https://bugzilla.suse.com/1220962

https://bugzilla.suse.com/1221269

https://bugzilla.suse.com/1221326

https://bugzilla.suse.com/1221630

https://bugzilla.suse.com/1222350

https://bugzilla.suse.com/1222634

https://bugzilla.suse.com/1222967

https://bugzilla.suse.com/1223508

https://bugzilla.suse.com/1223720

https://bugzilla.suse.com/1223742

https://bugzilla.suse.com/1223777

https://bugzilla.suse.com/1224105

https://bugzilla.suse.com/1224415

https://bugzilla.suse.com/1224496

https://bugzilla.suse.com/1224510

https://bugzilla.suse.com/1225162

https://bugzilla.suse.com/1225352

https://bugzilla.suse.com/1225428

https://bugzilla.suse.com/1225524

https://bugzilla.suse.com/1225582

https://bugzilla.suse.com/1225814

https://bugzilla.suse.com/1225832

https://bugzilla.suse.com/1226530

https://bugzilla.suse.com/1226765

https://bugzilla.suse.com/1226874

https://bugzilla.suse.com/1227079

https://bugzilla.suse.com/1227761

https://bugzilla.suse.com/1227863

https://bugzilla.suse.com/1227867

https://bugzilla.suse.com/1227937

https://bugzilla.suse.com/1227958

https://bugzilla.suse.com/1228426

https://bugzilla.suse.com/1228429

https://bugzilla.suse.com/1228446

https://bugzilla.suse.com/1228447

https://bugzilla.suse.com/1228450

https://bugzilla.suse.com/1228452

https://bugzilla.suse.com/1228456

https://bugzilla.suse.com/1228463

https://bugzilla.suse.com/1228469

https://bugzilla.suse.com/1228480

https://bugzilla.suse.com/1228481

https://bugzilla.suse.com/1228483

https://bugzilla.suse.com/1228484

https://bugzilla.suse.com/1228489

https://bugzilla.suse.com/1228491

https://bugzilla.suse.com/1228494

https://bugzilla.suse.com/1228496

https://bugzilla.suse.com/1228503

https://bugzilla.suse.com/1228509

https://bugzilla.suse.com/1228515

https://bugzilla.suse.com/1228526

https://bugzilla.suse.com/1228531

https://bugzilla.suse.com/1228563

https://bugzilla.suse.com/1228564

https://bugzilla.suse.com/1228590

https://bugzilla.suse.com/1228615

https://bugzilla.suse.com/1228616

https://bugzilla.suse.com/1228635

https://bugzilla.suse.com/1228636

https://bugzilla.suse.com/1228654

https://bugzilla.suse.com/1228656

https://bugzilla.suse.com/1228660

https://bugzilla.suse.com/1228673

https://bugzilla.suse.com/1228677

https://bugzilla.suse.com/1228687

https://bugzilla.suse.com/1228708

https://bugzilla.suse.com/1228710

https://bugzilla.suse.com/1228718

https://bugzilla.suse.com/1228721

https://bugzilla.suse.com/1228722

https://bugzilla.suse.com/1228724

https://bugzilla.suse.com/1228748

https://bugzilla.suse.com/1228766

https://bugzilla.suse.com/1228779

https://bugzilla.suse.com/1228979

https://bugzilla.suse.com/1228988

https://bugzilla.suse.com/1228991

https://bugzilla.suse.com/1228992

https://bugzilla.suse.com/1229042

https://bugzilla.suse.com/1229054

https://bugzilla.suse.com/1229086

https://bugzilla.suse.com/1229136

https://bugzilla.suse.com/1229187

https://bugzilla.suse.com/1229188

https://bugzilla.suse.com/1229190

https://bugzilla.suse.com/1229287

https://bugzilla.suse.com/1229296

https://bugzilla.suse.com/1229297

https://bugzilla.suse.com/1229303

https://bugzilla.suse.com/1229304

https://bugzilla.suse.com/1229305

https://bugzilla.suse.com/1229307

https://bugzilla.suse.com/1229312

https://bugzilla.suse.com/1229314

https://bugzilla.suse.com/1229315

https://bugzilla.suse.com/1229317

https://bugzilla.suse.com/1229318

https://bugzilla.suse.com/1229319

https://bugzilla.suse.com/1229341

https://bugzilla.suse.com/1229349

https://bugzilla.suse.com/1229350

https://bugzilla.suse.com/1229351

https://bugzilla.suse.com/1229354

https://bugzilla.suse.com/1229356

https://bugzilla.suse.com/1229360

https://bugzilla.suse.com/1229366

https://bugzilla.suse.com/1229370

https://bugzilla.suse.com/1229373

https://bugzilla.suse.com/1229374

https://bugzilla.suse.com/1229383

https://bugzilla.suse.com/1229391

https://bugzilla.suse.com/1229409

https://bugzilla.suse.com/1229410

https://bugzilla.suse.com/1229411

https://bugzilla.suse.com/1229413

https://bugzilla.suse.com/1229414

https://bugzilla.suse.com/1229417

https://bugzilla.suse.com/1229418

https://bugzilla.suse.com/1229444

https://bugzilla.suse.com/1229453

https://bugzilla.suse.com/1229454

https://bugzilla.suse.com/1229481

https://bugzilla.suse.com/1229488

https://bugzilla.suse.com/1229493

https://bugzilla.suse.com/1229506

https://bugzilla.suse.com/1229507

https://bugzilla.suse.com/1229508

https://bugzilla.suse.com/1229509

https://bugzilla.suse.com/1229510

https://bugzilla.suse.com/1229512

https://bugzilla.suse.com/1229521

https://bugzilla.suse.com/1229522

https://bugzilla.suse.com/1229523

https://bugzilla.suse.com/1229524

https://bugzilla.suse.com/1229525

https://bugzilla.suse.com/1229527

https://bugzilla.suse.com/1229528

https://bugzilla.suse.com/1229529

https://bugzilla.suse.com/1229533

https://bugzilla.suse.com/1229537

https://bugzilla.suse.com/1229544

https://bugzilla.suse.com/1229545

https://bugzilla.suse.com/1229546

https://bugzilla.suse.com/1229547

https://bugzilla.suse.com/1229548

https://bugzilla.suse.com/1229554

https://bugzilla.suse.com/1229557

https://bugzilla.suse.com/1229558

https://bugzilla.suse.com/1229559

https://bugzilla.suse.com/1229560

https://bugzilla.suse.com/1229562

https://bugzilla.suse.com/1229564

https://bugzilla.suse.com/1229565

https://bugzilla.suse.com/1229566

https://bugzilla.suse.com/1229568

https://bugzilla.suse.com/1229569

https://bugzilla.suse.com/1229572

https://bugzilla.suse.com/1229573

https://bugzilla.suse.com/1229576

https://bugzilla.suse.com/1229581

https://bugzilla.suse.com/1229588

https://bugzilla.suse.com/1229598

https://bugzilla.suse.com/1229603

https://bugzilla.suse.com/1229605

https://bugzilla.suse.com/1229608

https://bugzilla.suse.com/1229611

https://bugzilla.suse.com/1229612

https://bugzilla.suse.com/1229613

https://bugzilla.suse.com/1229614

https://bugzilla.suse.com/1229615

https://bugzilla.suse.com/1229616

https://bugzilla.suse.com/1229617

https://bugzilla.suse.com/1229620

https://bugzilla.suse.com/1229622

https://bugzilla.suse.com/1229625

https://bugzilla.suse.com/1229626

https://bugzilla.suse.com/1229628

https://bugzilla.suse.com/1229629

https://bugzilla.suse.com/1229631

https://bugzilla.suse.com/1229635

https://bugzilla.suse.com/1229636

https://bugzilla.suse.com/1229637

https://bugzilla.suse.com/1229638

https://bugzilla.suse.com/1229639

https://bugzilla.suse.com/1229641

https://bugzilla.suse.com/1229642

https://bugzilla.suse.com/1229643

https://bugzilla.suse.com/1229645

https://bugzilla.suse.com/1229662

https://bugzilla.suse.com/1229739

https://bugzilla.suse.com/1229743

https://bugzilla.suse.com/1229746

https://bugzilla.suse.com/1229754

https://bugzilla.suse.com/1229755

https://bugzilla.suse.com/1229768

https://bugzilla.suse.com/1229781

https://bugzilla.suse.com/1229788

https://bugzilla.suse.com/1229789

https://bugzilla.suse.com/1229792

https://bugzilla.suse.com/1229820

https://www.suse.com/security/cve/CVE-2021-4441

https://www.suse.com/security/cve/CVE-2021-47106

https://www.suse.com/security/cve/CVE-2021-47517

https://www.suse.com/security/cve/CVE-2022-48645

https://www.suse.com/security/cve/CVE-2022-48706

https://www.suse.com/security/cve/CVE-2022-48808

https://www.suse.com/security/cve/CVE-2022-48868

https://www.suse.com/security/cve/CVE-2022-48869

https://www.suse.com/security/cve/CVE-2022-48870

https://www.suse.com/security/cve/CVE-2022-48871

https://www.suse.com/security/cve/CVE-2022-48872

https://www.suse.com/security/cve/CVE-2022-48873

https://www.suse.com/security/cve/CVE-2022-48878

https://www.suse.com/security/cve/CVE-2022-48880

https://www.suse.com/security/cve/CVE-2022-48881

https://www.suse.com/security/cve/CVE-2022-48882

https://www.suse.com/security/cve/CVE-2022-48883

https://www.suse.com/security/cve/CVE-2022-48884

https://www.suse.com/security/cve/CVE-2022-48885

https://www.suse.com/security/cve/CVE-2022-48886

https://www.suse.com/security/cve/CVE-2022-48887

https://www.suse.com/security/cve/CVE-2022-48888

https://www.suse.com/security/cve/CVE-2022-48889

https://www.suse.com/security/cve/CVE-2022-48890

https://www.suse.com/security/cve/CVE-2022-48891

https://www.suse.com/security/cve/CVE-2022-48893

https://www.suse.com/security/cve/CVE-2022-48898

https://www.suse.com/security/cve/CVE-2022-48903

https://www.suse.com/security/cve/CVE-2022-48904

https://www.suse.com/security/cve/CVE-2022-48906

https://www.suse.com/security/cve/CVE-2022-48907

https://www.suse.com/security/cve/CVE-2022-48909

https://www.suse.com/security/cve/CVE-2022-48912

https://www.suse.com/security/cve/CVE-2022-48913

https://www.suse.com/security/cve/CVE-2022-48914

https://www.suse.com/security/cve/CVE-2022-48915

https://www.suse.com/security/cve/CVE-2022-48916

https://www.suse.com/security/cve/CVE-2022-48917

https://www.suse.com/security/cve/CVE-2022-48918

https://www.suse.com/security/cve/CVE-2022-48921

https://www.suse.com/security/cve/CVE-2022-48923

https://www.suse.com/security/cve/CVE-2022-48924

https://www.suse.com/security/cve/CVE-2022-48926

https://www.suse.com/security/cve/CVE-2022-48927

https://www.suse.com/security/cve/CVE-2022-48928

https://www.suse.com/security/cve/CVE-2022-48929

https://www.suse.com/security/cve/CVE-2022-48932

https://www.suse.com/security/cve/CVE-2022-48934

https://www.suse.com/security/cve/CVE-2022-48937

https://www.suse.com/security/cve/CVE-2022-48939

https://www.suse.com/security/cve/CVE-2022-48940

https://www.suse.com/security/cve/CVE-2022-48941

https://www.suse.com/security/cve/CVE-2022-48942

https://www.suse.com/security/cve/CVE-2022-48943

https://www.suse.com/security/cve/CVE-2023-52489

https://www.suse.com/security/cve/CVE-2023-52498

https://www.suse.com/security/cve/CVE-2023-52859

https://www.suse.com/security/cve/CVE-2023-52887

https://www.suse.com/security/cve/CVE-2023-52889

https://www.suse.com/security/cve/CVE-2023-52894

https://www.suse.com/security/cve/CVE-2023-52896

https://www.suse.com/security/cve/CVE-2023-52898

https://www.suse.com/security/cve/CVE-2023-52899

https://www.suse.com/security/cve/CVE-2023-52900

https://www.suse.com/security/cve/CVE-2023-52904

https://www.suse.com/security/cve/CVE-2023-52905

https://www.suse.com/security/cve/CVE-2023-52906

https://www.suse.com/security/cve/CVE-2023-52908

https://www.suse.com/security/cve/CVE-2023-52909

https://www.suse.com/security/cve/CVE-2023-52910

https://www.suse.com/security/cve/CVE-2023-52911

https://www.suse.com/security/cve/CVE-2023-52912

https://www.suse.com/security/cve/CVE-2023-52913

https://www.suse.com/security/cve/CVE-2024-26631

https://www.suse.com/security/cve/CVE-2024-26669

https://www.suse.com/security/cve/CVE-2024-26808

https://www.suse.com/security/cve/CVE-2024-26835

https://www.suse.com/security/cve/CVE-2024-27010

https://www.suse.com/security/cve/CVE-2024-27024

https://www.suse.com/security/cve/CVE-2024-27079

https://www.suse.com/security/cve/CVE-2024-27403

https://www.suse.com/security/cve/CVE-2024-31076

https://www.suse.com/security/cve/CVE-2024-35897

https://www.suse.com/security/cve/CVE-2024-35902

https://www.suse.com/security/cve/CVE-2024-36489

https://www.suse.com/security/cve/CVE-2024-36929

https://www.suse.com/security/cve/CVE-2024-36933

https://www.suse.com/security/cve/CVE-2024-40905

https://www.suse.com/security/cve/CVE-2024-40980

https://www.suse.com/security/cve/CVE-2024-41000

https://www.suse.com/security/cve/CVE-2024-41007

https://www.suse.com/security/cve/CVE-2024-41022

https://www.suse.com/security/cve/CVE-2024-41036

https://www.suse.com/security/cve/CVE-2024-41038

https://www.suse.com/security/cve/CVE-2024-41039

https://www.suse.com/security/cve/CVE-2024-41042

https://www.suse.com/security/cve/CVE-2024-41045

https://www.suse.com/security/cve/CVE-2024-41056

https://www.suse.com/security/cve/CVE-2024-41065

https://www.suse.com/security/cve/CVE-2024-41073

https://www.suse.com/security/cve/CVE-2024-41079

https://www.suse.com/security/cve/CVE-2024-41080

https://www.suse.com/security/cve/CVE-2024-41088

https://www.suse.com/security/cve/CVE-2024-41092

https://www.suse.com/security/cve/CVE-2024-41093

https://www.suse.com/security/cve/CVE-2024-42069

https://www.suse.com/security/cve/CVE-2024-42074

https://www.suse.com/security/cve/CVE-2024-42076

https://www.suse.com/security/cve/CVE-2024-42080

https://www.suse.com/security/cve/CVE-2024-42085

https://www.suse.com/security/cve/CVE-2024-42086

https://www.suse.com/security/cve/CVE-2024-42087

https://www.suse.com/security/cve/CVE-2024-42089

https://www.suse.com/security/cve/CVE-2024-42092

https://www.suse.com/security/cve/CVE-2024-42095

https://www.suse.com/security/cve/CVE-2024-42097

https://www.suse.com/security/cve/CVE-2024-42098

https://www.suse.com/security/cve/CVE-2024-42104

https://www.suse.com/security/cve/CVE-2024-42107

https://www.suse.com/security/cve/CVE-2024-42114

https://www.suse.com/security/cve/CVE-2024-42115

https://www.suse.com/security/cve/CVE-2024-42121

https://www.suse.com/security/cve/CVE-2024-42126

https://www.suse.com/security/cve/CVE-2024-42127

https://www.suse.com/security/cve/CVE-2024-42130

https://www.suse.com/security/cve/CVE-2024-42137

https://www.suse.com/security/cve/CVE-2024-42139

https://www.suse.com/security/cve/CVE-2024-42142

https://www.suse.com/security/cve/CVE-2024-42143

https://www.suse.com/security/cve/CVE-2024-42152

https://www.suse.com/security/cve/CVE-2024-42156

https://www.suse.com/security/cve/CVE-2024-42225

https://www.suse.com/security/cve/CVE-2024-42229

https://www.suse.com/security/cve/CVE-2024-42237

https://www.suse.com/security/cve/CVE-2024-42238

https://www.suse.com/security/cve/CVE-2024-42239

https://www.suse.com/security/cve/CVE-2024-42247

https://www.suse.com/security/cve/CVE-2024-42268

https://www.suse.com/security/cve/CVE-2024-42274

https://www.suse.com/security/cve/CVE-2024-42276

https://www.suse.com/security/cve/CVE-2024-42277

https://www.suse.com/security/cve/CVE-2024-42283

https://www.suse.com/security/cve/CVE-2024-42291

https://www.suse.com/security/cve/CVE-2024-42292

https://www.suse.com/security/cve/CVE-2024-42295

https://www.suse.com/security/cve/CVE-2024-42302

https://www.suse.com/security/cve/CVE-2024-42308

https://www.suse.com/security/cve/CVE-2024-42311

https://www.suse.com/security/cve/CVE-2024-42313

https://www.suse.com/security/cve/CVE-2024-42315

https://www.suse.com/security/cve/CVE-2024-42318

https://www.suse.com/security/cve/CVE-2024-42319

https://www.suse.com/security/cve/CVE-2024-42320

https://www.suse.com/security/cve/CVE-2024-43816

https://www.suse.com/security/cve/CVE-2024-43818

https://www.suse.com/security/cve/CVE-2024-43821

https://www.suse.com/security/cve/CVE-2024-43823

https://www.suse.com/security/cve/CVE-2024-43829

https://www.suse.com/security/cve/CVE-2024-43830

https://www.suse.com/security/cve/CVE-2024-43834

https://www.suse.com/security/cve/CVE-2024-43837

https://www.suse.com/security/cve/CVE-2024-43841

https://www.suse.com/security/cve/CVE-2024-43842

https://www.suse.com/security/cve/CVE-2024-43846

https://www.suse.com/security/cve/CVE-2024-43849

https://www.suse.com/security/cve/CVE-2024-43858

https://www.suse.com/security/cve/CVE-2024-43860

https://www.suse.com/security/cve/CVE-2024-43867

https://www.suse.com/security/cve/CVE-2024-43873

https://www.suse.com/security/cve/CVE-2024-43880

https://www.suse.com/security/cve/CVE-2024-43884

https://www.suse.com/security/cve/CVE-2024-43889

https://www.suse.com/security/cve/CVE-2024-43894

https://www.suse.com/security/cve/CVE-2024-43895

https://www.suse.com/security/cve/CVE-2024-43899

https://www.suse.com/security/cve/CVE-2024-43903

https://www.suse.com/security/cve/CVE-2024-43904

https://www.suse.com/security/cve/CVE-2024-43908

https://www.suse.com/security/cve/CVE-2024-43909

https://www.suse.com/security/cve/CVE-2024-44938

https://www.suse.com/security/cve/CVE-2024-44939

https://www.suse.com/security/cve/CVE-2024-44947

http://www.nessus.org/u?e0455c94

Plugin Details

Severity: High

ID: 207050

File Name: suse_SU-2024-3209-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/12/2024

Updated: 9/12/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-43900

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_13_67-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/11/2024

Vulnerability Publication Date: 9/6/2022

Reference Information

CVE: CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-38457, CVE-2022-40133, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947

SuSE: SUSE-SU-2024:3209-1