SUSE SLES15 Security Update : kernel (SUSE-SU-2024:3553-1)

high Nessus Plugin ID 208425

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3553-1 advisory.

The SUSE Linux Enterprise 15 SP6 CoCo kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).
- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).
- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).
- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
- CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004).
- CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380).
- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).
- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).
- CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240).
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).
- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).
- CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195).
- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
- CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430).
- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).
- CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435).
- CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455).
- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).
- CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457).
- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).
- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).
- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).
- CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518).
- CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526).
- CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520).
- CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521).
- CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540).
- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
- CVE-2024-46727: Fixed NULL pointer dereference in resource_log_pipe_topology_update (bsc#1230707).
- CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704).
- CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727).
- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).
- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).
- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).
- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).
- CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772).
- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).
- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1216223

https://bugzilla.suse.com/1220382

https://bugzilla.suse.com/1222629

https://bugzilla.suse.com/1223600

https://bugzilla.suse.com/1223848

https://bugzilla.suse.com/1225487

https://bugzilla.suse.com/1225812

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226003

https://bugzilla.suse.com/1226507

https://bugzilla.suse.com/1226606

https://bugzilla.suse.com/1226666

https://bugzilla.suse.com/1226860

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227694

https://bugzilla.suse.com/1227819

https://bugzilla.suse.com/1227885

https://bugzilla.suse.com/1227890

https://bugzilla.suse.com/1227962

https://bugzilla.suse.com/1230732

https://bugzilla.suse.com/1230747

https://bugzilla.suse.com/1230748

https://bugzilla.suse.com/1230749

https://bugzilla.suse.com/1230751

https://bugzilla.suse.com/1230752

https://bugzilla.suse.com/1230753

https://bugzilla.suse.com/1230756

https://bugzilla.suse.com/1230761

https://bugzilla.suse.com/1230766

https://bugzilla.suse.com/1230767

https://bugzilla.suse.com/1230768

https://bugzilla.suse.com/1230771

https://bugzilla.suse.com/1230772

https://bugzilla.suse.com/1230775

https://bugzilla.suse.com/1230776

https://bugzilla.suse.com/1230780

https://bugzilla.suse.com/1230783

https://bugzilla.suse.com/1230786

https://bugzilla.suse.com/1230787

https://bugzilla.suse.com/1230791

https://bugzilla.suse.com/1230794

https://bugzilla.suse.com/1230796

https://bugzilla.suse.com/1230802

https://bugzilla.suse.com/1230806

https://bugzilla.suse.com/1230808

https://bugzilla.suse.com/1230809

https://bugzilla.suse.com/1230810

https://bugzilla.suse.com/1230812

https://bugzilla.suse.com/1230813

https://bugzilla.suse.com/1230814

https://bugzilla.suse.com/1230815

https://bugzilla.suse.com/1230821

https://bugzilla.suse.com/1230825

https://bugzilla.suse.com/1230830

https://bugzilla.suse.com/1230831

https://bugzilla.suse.com/1230854

https://bugzilla.suse.com/1230948

https://bugzilla.suse.com/1231008

https://bugzilla.suse.com/1231035

https://bugzilla.suse.com/1231120

https://bugzilla.suse.com/1231146

https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html

https://www.suse.com/security/cve/CVE-2023-52752

https://www.suse.com/security/cve/CVE-2023-52915

https://www.suse.com/security/cve/CVE-2023-52916

https://www.suse.com/security/cve/CVE-2024-26759

https://www.suse.com/security/cve/CVE-2024-26804

https://www.suse.com/security/cve/CVE-2024-36953

https://www.suse.com/security/cve/CVE-2024-38538

https://www.suse.com/security/cve/CVE-2024-38632

https://www.suse.com/security/cve/CVE-2024-40965

https://www.suse.com/security/cve/CVE-2024-40973

https://www.suse.com/security/cve/CVE-2024-40983

https://www.suse.com/security/cve/CVE-2024-42154

https://www.suse.com/security/cve/CVE-2024-42252

https://www.suse.com/security/cve/CVE-2024-43832

https://www.suse.com/security/cve/CVE-2024-43835

https://www.suse.com/security/cve/CVE-2024-43870

https://www.suse.com/security/cve/CVE-2024-43886

https://www.suse.com/security/cve/CVE-2024-43890

https://www.suse.com/security/cve/CVE-2024-43904

https://www.suse.com/security/cve/CVE-2024-43914

https://www.suse.com/security/cve/CVE-2024-44946

https://www.suse.com/security/cve/CVE-2024-44947

https://www.suse.com/security/cve/CVE-2024-44948

https://www.suse.com/security/cve/CVE-2024-44952

https://www.suse.com/security/cve/CVE-2024-44954

https://www.suse.com/security/cve/CVE-2024-44960

https://www.suse.com/security/cve/CVE-2024-44961

https://www.suse.com/security/cve/CVE-2024-44962

https://www.suse.com/security/cve/CVE-2024-44965

https://www.suse.com/security/cve/CVE-2024-44967

https://www.suse.com/security/cve/CVE-2024-44969

https://www.suse.com/security/cve/CVE-2024-44970

https://www.suse.com/security/cve/CVE-2024-44971

https://www.suse.com/security/cve/CVE-2024-44972

https://www.suse.com/security/cve/CVE-2024-44977

https://www.suse.com/security/cve/CVE-2024-44982

https://www.suse.com/security/cve/CVE-2024-44984

https://www.suse.com/security/cve/CVE-2024-44986

https://www.suse.com/security/cve/CVE-2024-44987

https://www.suse.com/security/cve/CVE-2024-44988

https://www.suse.com/security/cve/CVE-2024-44989

https://www.suse.com/security/cve/CVE-2024-44990

https://www.suse.com/security/cve/CVE-2024-44991

https://www.suse.com/security/cve/CVE-2024-44997

https://www.suse.com/security/cve/CVE-2024-44999

https://www.suse.com/security/cve/CVE-2024-45000

https://www.suse.com/security/cve/CVE-2024-45001

https://www.suse.com/security/cve/CVE-2024-45002

https://www.suse.com/security/cve/CVE-2024-45005

https://www.suse.com/security/cve/CVE-2024-45006

https://www.suse.com/security/cve/CVE-2024-45007

https://www.suse.com/security/cve/CVE-2024-45008

https://www.suse.com/security/cve/CVE-2024-45011

https://www.suse.com/security/cve/CVE-2024-45012

https://www.suse.com/security/cve/CVE-2024-45013

https://www.suse.com/security/cve/CVE-2024-45015

https://www.suse.com/security/cve/CVE-2024-45017

https://www.suse.com/security/cve/CVE-2024-45018

https://www.suse.com/security/cve/CVE-2024-45019

https://www.suse.com/security/cve/CVE-2024-45020

https://www.suse.com/security/cve/CVE-2024-45021

https://www.suse.com/security/cve/CVE-2024-45022

https://www.suse.com/security/cve/CVE-2024-45023

https://www.suse.com/security/cve/CVE-2024-45026

https://www.suse.com/security/cve/CVE-2024-45028

https://www.suse.com/security/cve/CVE-2024-45029

https://bugzilla.suse.com/1228090

https://bugzilla.suse.com/1228140

https://bugzilla.suse.com/1228244

https://bugzilla.suse.com/1228507

https://bugzilla.suse.com/1228771

https://bugzilla.suse.com/1229004

https://bugzilla.suse.com/1229019

https://bugzilla.suse.com/1229086

https://bugzilla.suse.com/1229167

https://bugzilla.suse.com/1229169

https://bugzilla.suse.com/1229289

https://bugzilla.suse.com/1229380

https://bugzilla.suse.com/1229429

https://bugzilla.suse.com/1229443

https://bugzilla.suse.com/1229452

https://bugzilla.suse.com/1229455

https://bugzilla.suse.com/1229456

https://bugzilla.suse.com/1229494

https://bugzilla.suse.com/1229585

https://bugzilla.suse.com/1229748

https://bugzilla.suse.com/1229764

https://bugzilla.suse.com/1229768

https://bugzilla.suse.com/1229790

https://bugzilla.suse.com/1229928

https://bugzilla.suse.com/1230015

https://bugzilla.suse.com/1230119

https://bugzilla.suse.com/1230169

https://bugzilla.suse.com/1230170

https://bugzilla.suse.com/1230173

https://bugzilla.suse.com/1230174

https://bugzilla.suse.com/1230175

https://bugzilla.suse.com/1230176

https://bugzilla.suse.com/1230178

https://bugzilla.suse.com/1230185

https://bugzilla.suse.com/1230191

https://bugzilla.suse.com/1230192

https://bugzilla.suse.com/1230193

https://bugzilla.suse.com/1230194

https://bugzilla.suse.com/1230195

https://bugzilla.suse.com/1230200

https://bugzilla.suse.com/1230204

https://bugzilla.suse.com/1230206

https://bugzilla.suse.com/1230207

https://bugzilla.suse.com/1230209

https://bugzilla.suse.com/1230211

https://bugzilla.suse.com/1230212

https://bugzilla.suse.com/1230213

https://bugzilla.suse.com/1230217

https://bugzilla.suse.com/1230221

https://bugzilla.suse.com/1230224

https://bugzilla.suse.com/1230230

https://bugzilla.suse.com/1230232

https://bugzilla.suse.com/1230233

https://bugzilla.suse.com/1230240

https://bugzilla.suse.com/1230244

https://bugzilla.suse.com/1230247

https://bugzilla.suse.com/1230248

https://bugzilla.suse.com/1230269

https://bugzilla.suse.com/1230270

https://bugzilla.suse.com/1230295

https://bugzilla.suse.com/1230340

https://bugzilla.suse.com/1230350

https://bugzilla.suse.com/1230413

https://bugzilla.suse.com/1230426

https://bugzilla.suse.com/1230430

https://bugzilla.suse.com/1230431

https://bugzilla.suse.com/1230432

https://bugzilla.suse.com/1230433

https://bugzilla.suse.com/1230434

https://bugzilla.suse.com/1230435

https://bugzilla.suse.com/1230440

https://bugzilla.suse.com/1230441

https://bugzilla.suse.com/1230442

https://bugzilla.suse.com/1230444

https://bugzilla.suse.com/1230450

https://bugzilla.suse.com/1230451

https://bugzilla.suse.com/1230454

https://bugzilla.suse.com/1230455

https://bugzilla.suse.com/1230457

https://bugzilla.suse.com/1230459

https://bugzilla.suse.com/1230506

https://bugzilla.suse.com/1230507

https://bugzilla.suse.com/1230511

https://bugzilla.suse.com/1230515

https://bugzilla.suse.com/1230517

https://bugzilla.suse.com/1230518

https://bugzilla.suse.com/1230519

https://bugzilla.suse.com/1230520

https://bugzilla.suse.com/1230521

https://bugzilla.suse.com/1230524

https://bugzilla.suse.com/1230526

https://bugzilla.suse.com/1230533

https://bugzilla.suse.com/1230535

https://bugzilla.suse.com/1230539

https://bugzilla.suse.com/1230540

https://bugzilla.suse.com/1230542

https://bugzilla.suse.com/1230549

https://bugzilla.suse.com/1230556

https://bugzilla.suse.com/1230562

https://bugzilla.suse.com/1230563

https://bugzilla.suse.com/1230564

https://bugzilla.suse.com/1230580

https://bugzilla.suse.com/1230582

https://bugzilla.suse.com/1230589

https://bugzilla.suse.com/1230602

https://bugzilla.suse.com/1230699

https://bugzilla.suse.com/1230700

https://bugzilla.suse.com/1230701

https://bugzilla.suse.com/1230702

https://bugzilla.suse.com/1230703

https://bugzilla.suse.com/1230704

https://bugzilla.suse.com/1230705

https://bugzilla.suse.com/1230706

https://bugzilla.suse.com/1230707

https://bugzilla.suse.com/1230709

https://bugzilla.suse.com/1230711

https://bugzilla.suse.com/1230712

https://bugzilla.suse.com/1230715

https://bugzilla.suse.com/1230719

https://bugzilla.suse.com/1230722

https://bugzilla.suse.com/1230724

https://bugzilla.suse.com/1230725

https://bugzilla.suse.com/1230726

https://bugzilla.suse.com/1230727

https://bugzilla.suse.com/1230730

https://bugzilla.suse.com/1230731

https://www.suse.com/security/cve/CVE-2024-46686

https://www.suse.com/security/cve/CVE-2024-46687

https://www.suse.com/security/cve/CVE-2024-46689

https://www.suse.com/security/cve/CVE-2024-46691

https://www.suse.com/security/cve/CVE-2024-46692

https://www.suse.com/security/cve/CVE-2024-46693

https://www.suse.com/security/cve/CVE-2024-46694

https://www.suse.com/security/cve/CVE-2024-46695

https://www.suse.com/security/cve/CVE-2024-46702

https://www.suse.com/security/cve/CVE-2024-46706

https://www.suse.com/security/cve/CVE-2024-46707

https://www.suse.com/security/cve/CVE-2024-46709

https://www.suse.com/security/cve/CVE-2024-46710

https://www.suse.com/security/cve/CVE-2024-46711

https://www.suse.com/security/cve/CVE-2024-46714

https://www.suse.com/security/cve/CVE-2024-46715

https://www.suse.com/security/cve/CVE-2024-46716

https://www.suse.com/security/cve/CVE-2024-46717

https://www.suse.com/security/cve/CVE-2024-46719

https://www.suse.com/security/cve/CVE-2024-46720

https://www.suse.com/security/cve/CVE-2024-46722

https://www.suse.com/security/cve/CVE-2024-46723

https://www.suse.com/security/cve/CVE-2024-46724

https://www.suse.com/security/cve/CVE-2024-46725

https://www.suse.com/security/cve/CVE-2024-46726

https://www.suse.com/security/cve/CVE-2024-46727

https://www.suse.com/security/cve/CVE-2024-46728

https://www.suse.com/security/cve/CVE-2024-46729

https://www.suse.com/security/cve/CVE-2024-46730

https://www.suse.com/security/cve/CVE-2024-46731

https://www.suse.com/security/cve/CVE-2024-46732

https://www.suse.com/security/cve/CVE-2024-46734

https://www.suse.com/security/cve/CVE-2024-46735

https://www.suse.com/security/cve/CVE-2024-46737

https://www.suse.com/security/cve/CVE-2024-46738

https://www.suse.com/security/cve/CVE-2024-46739

https://www.suse.com/security/cve/CVE-2024-46741

https://www.suse.com/security/cve/CVE-2024-46743

https://www.suse.com/security/cve/CVE-2024-46744

https://www.suse.com/security/cve/CVE-2024-46745

https://www.suse.com/security/cve/CVE-2024-46746

https://www.suse.com/security/cve/CVE-2024-45030

https://www.suse.com/security/cve/CVE-2024-46672

https://www.suse.com/security/cve/CVE-2024-46673

https://www.suse.com/security/cve/CVE-2024-46674

https://www.suse.com/security/cve/CVE-2024-46675

https://www.suse.com/security/cve/CVE-2024-46676

https://www.suse.com/security/cve/CVE-2024-46677

https://www.suse.com/security/cve/CVE-2024-46679

https://www.suse.com/security/cve/CVE-2024-46685

https://www.suse.com/security/cve/CVE-2024-46747

https://www.suse.com/security/cve/CVE-2024-46749

https://www.suse.com/security/cve/CVE-2024-46750

https://www.suse.com/security/cve/CVE-2024-46751

https://www.suse.com/security/cve/CVE-2024-46752

https://www.suse.com/security/cve/CVE-2024-46753

https://www.suse.com/security/cve/CVE-2024-46755

https://www.suse.com/security/cve/CVE-2024-46756

https://www.suse.com/security/cve/CVE-2024-46757

https://www.suse.com/security/cve/CVE-2024-46758

https://www.suse.com/security/cve/CVE-2024-46759

https://www.suse.com/security/cve/CVE-2024-46760

https://www.suse.com/security/cve/CVE-2024-46761

https://www.suse.com/security/cve/CVE-2024-46767

https://www.suse.com/security/cve/CVE-2024-46771

https://www.suse.com/security/cve/CVE-2024-46772

https://www.suse.com/security/cve/CVE-2024-46773

https://www.suse.com/security/cve/CVE-2024-46774

https://www.suse.com/security/cve/CVE-2024-46776

https://www.suse.com/security/cve/CVE-2024-46778

https://www.suse.com/security/cve/CVE-2024-46780

https://www.suse.com/security/cve/CVE-2024-46781

https://www.suse.com/security/cve/CVE-2024-46783

https://www.suse.com/security/cve/CVE-2024-46784

https://www.suse.com/security/cve/CVE-2024-46786

https://www.suse.com/security/cve/CVE-2024-46787

https://www.suse.com/security/cve/CVE-2024-46791

https://www.suse.com/security/cve/CVE-2024-46794

https://www.suse.com/security/cve/CVE-2024-46797

https://www.suse.com/security/cve/CVE-2024-46798

https://www.suse.com/security/cve/CVE-2024-46822

Plugin Details

Severity: High

ID: 208425

File Name: suse_SU-2024-3553-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/9/2024

Updated: 10/9/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-46798

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-coco_debug, p-cpe:/a:novell:suse_linux:kernel-syms-coco, p-cpe:/a:novell:suse_linux:kernel-coco, p-cpe:/a:novell:suse_linux:kernel-source-coco, p-cpe:/a:novell:suse_linux:kernel-coco_debug-devel, p-cpe:/a:novell:suse_linux:kernel-devel-coco, p-cpe:/a:novell:suse_linux:reiserfs-kmp-coco, p-cpe:/a:novell:suse_linux:kernel-coco-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/8/2024

Vulnerability Publication Date: 4/3/2024

Reference Information

CVE: CVE-2023-52752, CVE-2023-52915, CVE-2023-52916, CVE-2024-26759, CVE-2024-26804, CVE-2024-36953, CVE-2024-38538, CVE-2024-38632, CVE-2024-40965, CVE-2024-40973, CVE-2024-40983, CVE-2024-42154, CVE-2024-42252, CVE-2024-43832, CVE-2024-43835, CVE-2024-43870, CVE-2024-43886, CVE-2024-43890, CVE-2024-43904, CVE-2024-43914, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948, CVE-2024-44952, CVE-2024-44954, CVE-2024-44960, CVE-2024-44961, CVE-2024-44962, CVE-2024-44965, CVE-2024-44967, CVE-2024-44969, CVE-2024-44970, CVE-2024-44971, CVE-2024-44972, CVE-2024-44977, CVE-2024-44982, CVE-2024-44984, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44991, CVE-2024-44997, CVE-2024-44999, CVE-2024-45000, CVE-2024-45001, CVE-2024-45002, CVE-2024-45005, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45011, CVE-2024-45012, CVE-2024-45013, CVE-2024-45015, CVE-2024-45017, CVE-2024-45018, CVE-2024-45019, CVE-2024-45020, CVE-2024-45021, CVE-2024-45022, CVE-2024-45023, CVE-2024-45026, CVE-2024-45028, CVE-2024-45029, CVE-2024-45030, CVE-2024-46672, CVE-2024-46673, CVE-2024-46674, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46686, CVE-2024-46687, CVE-2024-46689, CVE-2024-46691, CVE-2024-46692, CVE-2024-46693, CVE-2024-46694, CVE-2024-46695, CVE-2024-46702, CVE-2024-46706, CVE-2024-46707, CVE-2024-46709, CVE-2024-46710, CVE-2024-46711, CVE-2024-46714, CVE-2024-46715, CVE-2024-46716, CVE-2024-46717, CVE-2024-46719, CVE-2024-46720, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46726, CVE-2024-46727, CVE-2024-46728, CVE-2024-46729, CVE-2024-46730, CVE-2024-46731, CVE-2024-46732, CVE-2024-46734, CVE-2024-46735, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46741, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46749, CVE-2024-46750, CVE-2024-46751, CVE-2024-46752, CVE-2024-46753, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46760, CVE-2024-46761, CVE-2024-46767, CVE-2024-46771, CVE-2024-46772, CVE-2024-46773, CVE-2024-46774, CVE-2024-46776, CVE-2024-46778, CVE-2024-46780, CVE-2024-46781, CVE-2024-46783, CVE-2024-46784, CVE-2024-46786, CVE-2024-46787, CVE-2024-46791, CVE-2024-46794, CVE-2024-46797, CVE-2024-46798, CVE-2024-46822

SuSE: SUSE-SU-2024:3553-1