SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:3564-1)

high Nessus Plugin ID 208667

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3564-1 advisory.

The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).
- CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).
- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).
- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
- CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray (bsc#1229001).
- CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004).
- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-42294: block: fix deadlock between sd_remove & sd_release (bsc#1229371).
- CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).
- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).
- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).
- CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).
- CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio reference (bsc#1229380).
- CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename() (bsc#1229389).
- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).
- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).
- CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).
- CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).
- CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181).
- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).
- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).
- CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (bsc#1230240).
- CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206).
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).
- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).
- CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch (bsc#1230195).
- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).
- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
- CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling (bsc#1230169).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430).
- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).
- CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter (bsc#1230432).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0 (bsc#1230435).
- CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow disk (bsc#1230455).
- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).
- CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457).
- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).
- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).
- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).
- CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk() (bsc#1230518).
- CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section (bsc#1230526).
- CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call (bsc#1230520).
- CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes (bsc#1230521).
- CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers (bsc#1230540).
- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
- CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop (bsc#1230704).
- CVE-2024-46735: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() (bsc#1230727).
- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).
- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).
- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).
- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).
- CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772).
- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).
- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1183045

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1216223

https://bugzilla.suse.com/1216776

https://bugzilla.suse.com/1220382

https://bugzilla.suse.com/1221527

https://bugzilla.suse.com/1221610

https://bugzilla.suse.com/1221650

https://bugzilla.suse.com/1222629

https://bugzilla.suse.com/1223600

https://bugzilla.suse.com/1223848

https://bugzilla.suse.com/1225487

https://bugzilla.suse.com/1225812

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226003

https://bugzilla.suse.com/1226507

https://bugzilla.suse.com/1226606

https://bugzilla.suse.com/1226666

https://bugzilla.suse.com/1226846

https://bugzilla.suse.com/1226860

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227694

https://bugzilla.suse.com/1227726

https://bugzilla.suse.com/1227819

https://bugzilla.suse.com/1227885

https://bugzilla.suse.com/1227890

https://bugzilla.suse.com/1227962

https://bugzilla.suse.com/1228090

https://bugzilla.suse.com/1228140

https://bugzilla.suse.com/1228244

https://bugzilla.suse.com/1228507

https://bugzilla.suse.com/1228771

https://bugzilla.suse.com/1229001

https://bugzilla.suse.com/1229004

https://bugzilla.suse.com/1229019

https://bugzilla.suse.com/1229086

https://bugzilla.suse.com/1229167

https://bugzilla.suse.com/1229169

https://bugzilla.suse.com/1229289

https://bugzilla.suse.com/1229334

https://bugzilla.suse.com/1229362

https://bugzilla.suse.com/1229363

https://bugzilla.suse.com/1229364

https://bugzilla.suse.com/1229371

https://bugzilla.suse.com/1229380

https://bugzilla.suse.com/1229389

https://bugzilla.suse.com/1229394

https://bugzilla.suse.com/1229429

https://bugzilla.suse.com/1229443

https://bugzilla.suse.com/1229452

https://bugzilla.suse.com/1229455

https://bugzilla.suse.com/1229456

https://bugzilla.suse.com/1229494

https://bugzilla.suse.com/1229585

https://bugzilla.suse.com/1229753

https://bugzilla.suse.com/1229764

https://bugzilla.suse.com/1229768

https://bugzilla.suse.com/1229790

https://bugzilla.suse.com/1229810

https://bugzilla.suse.com/1229899

https://bugzilla.suse.com/1229928

https://bugzilla.suse.com/1230015

https://bugzilla.suse.com/1230119

https://bugzilla.suse.com/1230123

https://bugzilla.suse.com/1230124

https://bugzilla.suse.com/1230125

https://bugzilla.suse.com/1230169

https://bugzilla.suse.com/1230170

https://bugzilla.suse.com/1230171

https://bugzilla.suse.com/1230173

https://bugzilla.suse.com/1230174

https://bugzilla.suse.com/1230175

https://bugzilla.suse.com/1230176

https://bugzilla.suse.com/1230178

https://bugzilla.suse.com/1230180

https://bugzilla.suse.com/1230181

https://bugzilla.suse.com/1230185

https://bugzilla.suse.com/1230191

https://bugzilla.suse.com/1230192

https://bugzilla.suse.com/1230193

https://bugzilla.suse.com/1230194

https://bugzilla.suse.com/1230195

https://bugzilla.suse.com/1230200

https://bugzilla.suse.com/1230204

https://bugzilla.suse.com/1230206

https://bugzilla.suse.com/1230207

https://bugzilla.suse.com/1230209

https://bugzilla.suse.com/1230211

https://bugzilla.suse.com/1230213

https://bugzilla.suse.com/1230217

https://bugzilla.suse.com/1230221

https://bugzilla.suse.com/1230224

https://bugzilla.suse.com/1230230

https://bugzilla.suse.com/1230232

https://bugzilla.suse.com/1230233

https://bugzilla.suse.com/1230240

https://bugzilla.suse.com/1230244

https://bugzilla.suse.com/1230245

https://bugzilla.suse.com/1230247

https://bugzilla.suse.com/1230248

https://bugzilla.suse.com/1230269

https://bugzilla.suse.com/1230270

https://bugzilla.suse.com/1230295

https://bugzilla.suse.com/1230340

https://bugzilla.suse.com/1230426

https://bugzilla.suse.com/1230430

https://bugzilla.suse.com/1230431

https://bugzilla.suse.com/1230432

https://bugzilla.suse.com/1230433

https://bugzilla.suse.com/1230434

https://bugzilla.suse.com/1230435

https://bugzilla.suse.com/1230440

https://bugzilla.suse.com/1230441

https://bugzilla.suse.com/1230442

https://bugzilla.suse.com/1230444

https://bugzilla.suse.com/1230450

https://bugzilla.suse.com/1230451

https://bugzilla.suse.com/1230454

https://bugzilla.suse.com/1230455

https://bugzilla.suse.com/1230457

https://bugzilla.suse.com/1230459

https://bugzilla.suse.com/1230506

https://bugzilla.suse.com/1230507

https://bugzilla.suse.com/1230511

https://bugzilla.suse.com/1230515

https://bugzilla.suse.com/1230517

https://bugzilla.suse.com/1230518

https://bugzilla.suse.com/1230519

https://bugzilla.suse.com/1230520

https://bugzilla.suse.com/1230521

https://bugzilla.suse.com/1230524

https://bugzilla.suse.com/1230526

https://bugzilla.suse.com/1230533

https://bugzilla.suse.com/1230535

https://bugzilla.suse.com/1230539

https://bugzilla.suse.com/1230540

https://bugzilla.suse.com/1230549

https://bugzilla.suse.com/1230556

https://bugzilla.suse.com/1230562

https://bugzilla.suse.com/1230563

https://bugzilla.suse.com/1230564

https://bugzilla.suse.com/1230580

https://bugzilla.suse.com/1230582

https://bugzilla.suse.com/1230589

https://bugzilla.suse.com/1230602

https://bugzilla.suse.com/1230699

https://bugzilla.suse.com/1230700

https://bugzilla.suse.com/1230701

https://bugzilla.suse.com/1230702

https://bugzilla.suse.com/1230703

https://bugzilla.suse.com/1230704

https://bugzilla.suse.com/1230705

https://bugzilla.suse.com/1230706

https://bugzilla.suse.com/1230709

https://bugzilla.suse.com/1230711

https://bugzilla.suse.com/1230712

https://bugzilla.suse.com/1230715

https://bugzilla.suse.com/1230719

https://bugzilla.suse.com/1230722

https://bugzilla.suse.com/1230724

https://bugzilla.suse.com/1230725

https://bugzilla.suse.com/1230726

https://bugzilla.suse.com/1230727

https://bugzilla.suse.com/1230730

https://bugzilla.suse.com/1230731

https://bugzilla.suse.com/1230732

https://bugzilla.suse.com/1230747

https://bugzilla.suse.com/1230748

https://bugzilla.suse.com/1230749

https://bugzilla.suse.com/1230751

https://bugzilla.suse.com/1230752

https://bugzilla.suse.com/1230753

https://bugzilla.suse.com/1230756

https://bugzilla.suse.com/1230761

https://bugzilla.suse.com/1230766

https://bugzilla.suse.com/1230767

https://bugzilla.suse.com/1230768

https://bugzilla.suse.com/1230771

https://bugzilla.suse.com/1230772

https://bugzilla.suse.com/1230775

https://bugzilla.suse.com/1230776

https://bugzilla.suse.com/1230780

https://bugzilla.suse.com/1230783

https://bugzilla.suse.com/1230786

https://bugzilla.suse.com/1230787

https://bugzilla.suse.com/1230791

https://bugzilla.suse.com/1230794

https://bugzilla.suse.com/1230796

https://bugzilla.suse.com/1230802

https://bugzilla.suse.com/1230806

https://bugzilla.suse.com/1230808

https://bugzilla.suse.com/1230809

https://bugzilla.suse.com/1230810

https://bugzilla.suse.com/1230812

https://bugzilla.suse.com/1230813

https://bugzilla.suse.com/1230814

https://bugzilla.suse.com/1230815

https://bugzilla.suse.com/1230821

https://bugzilla.suse.com/1230825

https://bugzilla.suse.com/1230830

https://bugzilla.suse.com/1230831

https://bugzilla.suse.com/1230854

https://bugzilla.suse.com/1230948

https://bugzilla.suse.com/1231008

https://bugzilla.suse.com/1231035

https://bugzilla.suse.com/1231120

https://bugzilla.suse.com/1231146

https://bugzilla.suse.com/1231182

https://bugzilla.suse.com/1231183

https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html

https://www.suse.com/security/cve/CVE-2023-52610

https://www.suse.com/security/cve/CVE-2023-52752

https://www.suse.com/security/cve/CVE-2023-52915

https://www.suse.com/security/cve/CVE-2023-52916

https://www.suse.com/security/cve/CVE-2024-26640

https://www.suse.com/security/cve/CVE-2024-26759

https://www.suse.com/security/cve/CVE-2024-26804

https://www.suse.com/security/cve/CVE-2024-36953

https://www.suse.com/security/cve/CVE-2024-38538

https://www.suse.com/security/cve/CVE-2024-38596

https://www.suse.com/security/cve/CVE-2024-38632

https://www.suse.com/security/cve/CVE-2024-40965

https://www.suse.com/security/cve/CVE-2024-40973

https://www.suse.com/security/cve/CVE-2024-40983

https://www.suse.com/security/cve/CVE-2024-42154

https://www.suse.com/security/cve/CVE-2024-42243

https://www.suse.com/security/cve/CVE-2024-42252

https://www.suse.com/security/cve/CVE-2024-42265

https://www.suse.com/security/cve/CVE-2024-42294

https://www.suse.com/security/cve/CVE-2024-42304

https://www.suse.com/security/cve/CVE-2024-42305

https://www.suse.com/security/cve/CVE-2024-42306

https://www.suse.com/security/cve/CVE-2024-43828

https://www.suse.com/security/cve/CVE-2024-43832

https://www.suse.com/security/cve/CVE-2024-43835

https://www.suse.com/security/cve/CVE-2024-43845

https://www.suse.com/security/cve/CVE-2024-43870

https://www.suse.com/security/cve/CVE-2024-43890

https://www.suse.com/security/cve/CVE-2024-43898

https://www.suse.com/security/cve/CVE-2024-43904

https://www.suse.com/security/cve/CVE-2024-43914

https://www.suse.com/security/cve/CVE-2024-44935

https://www.suse.com/security/cve/CVE-2024-44944

https://www.suse.com/security/cve/CVE-2024-44946

https://www.suse.com/security/cve/CVE-2024-44947

https://www.suse.com/security/cve/CVE-2024-44948

https://www.suse.com/security/cve/CVE-2024-44950

https://www.suse.com/security/cve/CVE-2024-44951

https://www.suse.com/security/cve/CVE-2024-44952

https://www.suse.com/security/cve/CVE-2024-44954

https://www.suse.com/security/cve/CVE-2024-44960

https://www.suse.com/security/cve/CVE-2024-44961

https://www.suse.com/security/cve/CVE-2024-44962

https://www.suse.com/security/cve/CVE-2024-44965

https://www.suse.com/security/cve/CVE-2024-44967

https://www.suse.com/security/cve/CVE-2024-44969

https://www.suse.com/security/cve/CVE-2024-44970

https://www.suse.com/security/cve/CVE-2024-44971

https://www.suse.com/security/cve/CVE-2024-44977

https://www.suse.com/security/cve/CVE-2024-44982

https://www.suse.com/security/cve/CVE-2024-44984

https://www.suse.com/security/cve/CVE-2024-44985

https://www.suse.com/security/cve/CVE-2024-44986

https://www.suse.com/security/cve/CVE-2024-44987

https://www.suse.com/security/cve/CVE-2024-44988

https://www.suse.com/security/cve/CVE-2024-44989

https://www.suse.com/security/cve/CVE-2024-44990

https://www.suse.com/security/cve/CVE-2024-44991

https://www.suse.com/security/cve/CVE-2024-44997

https://www.suse.com/security/cve/CVE-2024-44998

https://www.suse.com/security/cve/CVE-2024-44999

https://www.suse.com/security/cve/CVE-2024-45000

https://www.suse.com/security/cve/CVE-2024-45001

https://www.suse.com/security/cve/CVE-2024-45002

https://www.suse.com/security/cve/CVE-2024-45003

https://www.suse.com/security/cve/CVE-2024-45005

https://www.suse.com/security/cve/CVE-2024-45006

https://www.suse.com/security/cve/CVE-2024-45007

https://www.suse.com/security/cve/CVE-2024-45008

https://www.suse.com/security/cve/CVE-2024-45011

https://www.suse.com/security/cve/CVE-2024-45012

https://www.suse.com/security/cve/CVE-2024-45013

https://www.suse.com/security/cve/CVE-2024-45015

https://www.suse.com/security/cve/CVE-2024-45017

https://www.suse.com/security/cve/CVE-2024-45018

https://www.suse.com/security/cve/CVE-2024-45019

https://www.suse.com/security/cve/CVE-2024-45020

https://www.suse.com/security/cve/CVE-2024-45021

https://www.suse.com/security/cve/CVE-2024-45022

https://www.suse.com/security/cve/CVE-2024-45023

https://www.suse.com/security/cve/CVE-2024-45026

https://www.suse.com/security/cve/CVE-2024-45028

https://www.suse.com/security/cve/CVE-2024-45029

https://www.suse.com/security/cve/CVE-2024-45030

https://www.suse.com/security/cve/CVE-2024-46672

https://www.suse.com/security/cve/CVE-2024-46673

https://www.suse.com/security/cve/CVE-2024-46674

https://www.suse.com/security/cve/CVE-2024-46675

https://www.suse.com/security/cve/CVE-2024-46676

https://www.suse.com/security/cve/CVE-2024-46677

https://www.suse.com/security/cve/CVE-2024-46679

https://www.suse.com/security/cve/CVE-2024-46685

https://www.suse.com/security/cve/CVE-2024-46686

https://www.suse.com/security/cve/CVE-2024-46687

https://www.suse.com/security/cve/CVE-2024-46689

https://www.suse.com/security/cve/CVE-2024-46691

https://www.suse.com/security/cve/CVE-2024-46692

https://www.suse.com/security/cve/CVE-2024-46693

https://www.suse.com/security/cve/CVE-2024-46694

https://www.suse.com/security/cve/CVE-2024-46695

https://www.suse.com/security/cve/CVE-2024-46702

https://www.suse.com/security/cve/CVE-2024-46706

https://www.suse.com/security/cve/CVE-2024-46707

https://www.suse.com/security/cve/CVE-2024-46709

https://www.suse.com/security/cve/CVE-2024-46710

https://www.suse.com/security/cve/CVE-2024-46714

https://www.suse.com/security/cve/CVE-2024-46715

https://www.suse.com/security/cve/CVE-2024-46716

https://www.suse.com/security/cve/CVE-2024-46717

https://www.suse.com/security/cve/CVE-2024-46719

https://www.suse.com/security/cve/CVE-2024-46720

https://www.suse.com/security/cve/CVE-2024-46722

https://www.suse.com/security/cve/CVE-2024-46723

https://www.suse.com/security/cve/CVE-2024-46724

https://www.suse.com/security/cve/CVE-2024-46725

https://www.suse.com/security/cve/CVE-2024-46726

https://www.suse.com/security/cve/CVE-2024-46728

https://www.suse.com/security/cve/CVE-2024-46729

https://www.suse.com/security/cve/CVE-2024-46730

https://www.suse.com/security/cve/CVE-2024-46731

https://www.suse.com/security/cve/CVE-2024-46732

https://www.suse.com/security/cve/CVE-2024-46734

https://www.suse.com/security/cve/CVE-2024-46735

https://www.suse.com/security/cve/CVE-2024-46737

https://www.suse.com/security/cve/CVE-2024-46738

https://www.suse.com/security/cve/CVE-2024-46739

https://www.suse.com/security/cve/CVE-2024-46741

https://www.suse.com/security/cve/CVE-2024-46743

https://www.suse.com/security/cve/CVE-2024-46744

https://www.suse.com/security/cve/CVE-2024-46745

https://www.suse.com/security/cve/CVE-2024-46746

https://www.suse.com/security/cve/CVE-2024-46747

https://www.suse.com/security/cve/CVE-2024-46749

https://www.suse.com/security/cve/CVE-2024-46750

https://www.suse.com/security/cve/CVE-2024-46751

https://www.suse.com/security/cve/CVE-2024-46752

https://www.suse.com/security/cve/CVE-2024-46753

https://www.suse.com/security/cve/CVE-2024-46755

https://www.suse.com/security/cve/CVE-2024-46756

https://www.suse.com/security/cve/CVE-2024-46757

https://www.suse.com/security/cve/CVE-2024-46758

https://www.suse.com/security/cve/CVE-2024-46759

https://www.suse.com/security/cve/CVE-2024-46760

https://www.suse.com/security/cve/CVE-2024-46761

https://www.suse.com/security/cve/CVE-2024-46767

https://www.suse.com/security/cve/CVE-2024-46771

https://www.suse.com/security/cve/CVE-2024-46772

https://www.suse.com/security/cve/CVE-2024-46773

https://www.suse.com/security/cve/CVE-2024-46774

https://www.suse.com/security/cve/CVE-2024-46776

https://www.suse.com/security/cve/CVE-2024-46778

https://www.suse.com/security/cve/CVE-2024-46780

https://www.suse.com/security/cve/CVE-2024-46781

https://www.suse.com/security/cve/CVE-2024-46783

https://www.suse.com/security/cve/CVE-2024-46784

https://www.suse.com/security/cve/CVE-2024-46786

https://www.suse.com/security/cve/CVE-2024-46787

https://www.suse.com/security/cve/CVE-2024-46791

https://www.suse.com/security/cve/CVE-2024-46794

https://www.suse.com/security/cve/CVE-2024-46797

https://www.suse.com/security/cve/CVE-2024-46798

https://www.suse.com/security/cve/CVE-2024-46822

Plugin Details

Severity: High

ID: 208667

File Name: suse_SU-2024-3564-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/10/2024

Updated: 10/10/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-46798

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_10_14-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/9/2024

Vulnerability Publication Date: 2/15/2024

Reference Information

CVE: CVE-2023-52610, CVE-2023-52752, CVE-2023-52915, CVE-2023-52916, CVE-2024-26640, CVE-2024-26759, CVE-2024-26804, CVE-2024-36953, CVE-2024-38538, CVE-2024-38596, CVE-2024-38632, CVE-2024-40965, CVE-2024-40973, CVE-2024-40983, CVE-2024-42154, CVE-2024-42243, CVE-2024-42252, CVE-2024-42265, CVE-2024-42294, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-43828, CVE-2024-43832, CVE-2024-43835, CVE-2024-43845, CVE-2024-43870, CVE-2024-43890, CVE-2024-43898, CVE-2024-43904, CVE-2024-43914, CVE-2024-44935, CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948, CVE-2024-44950, CVE-2024-44951, CVE-2024-44952, CVE-2024-44954, CVE-2024-44960, CVE-2024-44961, CVE-2024-44962, CVE-2024-44965, CVE-2024-44967, CVE-2024-44969, CVE-2024-44970, CVE-2024-44971, CVE-2024-44977, CVE-2024-44982, CVE-2024-44984, CVE-2024-44985, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44991, CVE-2024-44997, CVE-2024-44998, CVE-2024-44999, CVE-2024-45000, CVE-2024-45001, CVE-2024-45002, CVE-2024-45003, CVE-2024-45005, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45011, CVE-2024-45012, CVE-2024-45013, CVE-2024-45015, CVE-2024-45017, CVE-2024-45018, CVE-2024-45019, CVE-2024-45020, CVE-2024-45021, CVE-2024-45022, CVE-2024-45023, CVE-2024-45026, CVE-2024-45028, CVE-2024-45029, CVE-2024-45030, CVE-2024-46672, CVE-2024-46673, CVE-2024-46674, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46686, CVE-2024-46687, CVE-2024-46689, CVE-2024-46691, CVE-2024-46692, CVE-2024-46693, CVE-2024-46694, CVE-2024-46695, CVE-2024-46702, CVE-2024-46706, CVE-2024-46707, CVE-2024-46709, CVE-2024-46710, CVE-2024-46714, CVE-2024-46715, CVE-2024-46716, CVE-2024-46717, CVE-2024-46719, CVE-2024-46720, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46726, CVE-2024-46728, CVE-2024-46729, CVE-2024-46730, CVE-2024-46731, CVE-2024-46732, CVE-2024-46734, CVE-2024-46735, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46741, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46749, CVE-2024-46750, CVE-2024-46751, CVE-2024-46752, CVE-2024-46753, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46760, CVE-2024-46761, CVE-2024-46767, CVE-2024-46771, CVE-2024-46772, CVE-2024-46773, CVE-2024-46774, CVE-2024-46776, CVE-2024-46778, CVE-2024-46780, CVE-2024-46781, CVE-2024-46783, CVE-2024-46784, CVE-2024-46786, CVE-2024-46787, CVE-2024-46791, CVE-2024-46794, CVE-2024-46797, CVE-2024-46798, CVE-2024-46822

SuSE: SUSE-SU-2024:3564-1