SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2024:3569-1)

high Nessus Plugin ID 208671

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3569-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48901: btrfs: do not start relocation until in progress drops are done (bsc#1229607).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).
- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).
- CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
- CVE-2024-26767: drm/amd/display: fixed integer types and null check locations (bsc#1230339).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).
- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082).
- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)
- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).
- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).
- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).
- CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).
- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).
- CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830)
- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).
- CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).
- CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).
- CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178).
- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).
- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).
- CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230)
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).
- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).
- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).
- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
- CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175).
- CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444)
- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).
- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507).
- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).
- CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515)
- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).
- CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524)
- CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589)
- CVE-2024-46707: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 (bsc#1230582).
- CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700).
- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
- CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703)
- CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701)
- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).
- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).
- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).
- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).
- CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772).
- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).
- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).
- CVE-2024-46830: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (bsc#1231116).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1199769

https://bugzilla.suse.com/1216223

https://bugzilla.suse.com/1220382

https://bugzilla.suse.com/1221610

https://bugzilla.suse.com/1221650

https://bugzilla.suse.com/1222629

https://bugzilla.suse.com/1222973

https://bugzilla.suse.com/1223600

https://bugzilla.suse.com/1223848

https://bugzilla.suse.com/1224085

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226003

https://bugzilla.suse.com/1226606

https://bugzilla.suse.com/1226662

https://bugzilla.suse.com/1226666

https://bugzilla.suse.com/1226846

https://bugzilla.suse.com/1226860

https://bugzilla.suse.com/1226875

https://bugzilla.suse.com/1226915

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227726

https://bugzilla.suse.com/1227819

https://bugzilla.suse.com/1227832

https://bugzilla.suse.com/1227890

https://bugzilla.suse.com/1228507

https://bugzilla.suse.com/1228576

https://bugzilla.suse.com/1228620

https://bugzilla.suse.com/1228771

https://bugzilla.suse.com/1229031

https://bugzilla.suse.com/1229034

https://bugzilla.suse.com/1229086

https://bugzilla.suse.com/1229156

https://bugzilla.suse.com/1229289

https://bugzilla.suse.com/1229334

https://bugzilla.suse.com/1229362

https://bugzilla.suse.com/1229363

https://bugzilla.suse.com/1229364

https://bugzilla.suse.com/1229394

https://bugzilla.suse.com/1229429

https://bugzilla.suse.com/1229453

https://bugzilla.suse.com/1229572

https://bugzilla.suse.com/1229573

https://bugzilla.suse.com/1229585

https://bugzilla.suse.com/1229607

https://bugzilla.suse.com/1229619

https://bugzilla.suse.com/1229633

https://bugzilla.suse.com/1229662

https://bugzilla.suse.com/1229753

https://bugzilla.suse.com/1229764

https://bugzilla.suse.com/1229790

https://bugzilla.suse.com/1229810

https://bugzilla.suse.com/1229830

https://bugzilla.suse.com/1229899

https://bugzilla.suse.com/1229928

https://www.suse.com/security/cve/CVE-2024-46758

https://www.suse.com/security/cve/CVE-2024-46759

https://www.suse.com/security/cve/CVE-2024-46761

https://www.suse.com/security/cve/CVE-2024-46771

https://www.suse.com/security/cve/CVE-2024-46772

https://www.suse.com/security/cve/CVE-2024-46773

https://www.suse.com/security/cve/CVE-2024-46774

https://www.suse.com/security/cve/CVE-2024-46778

https://www.suse.com/security/cve/CVE-2024-46780

https://www.suse.com/security/cve/CVE-2024-46781

https://www.suse.com/security/cve/CVE-2024-46783

https://www.suse.com/security/cve/CVE-2024-46784

https://www.suse.com/security/cve/CVE-2024-46786

https://www.suse.com/security/cve/CVE-2024-46787

https://www.suse.com/security/cve/CVE-2024-46791

https://www.suse.com/security/cve/CVE-2024-46794

https://www.suse.com/security/cve/CVE-2024-46798

https://www.suse.com/security/cve/CVE-2024-46822

https://www.suse.com/security/cve/CVE-2024-46830

https://bugzilla.suse.com/1229947

https://bugzilla.suse.com/1230015

https://bugzilla.suse.com/1230129

https://bugzilla.suse.com/1230130

https://bugzilla.suse.com/1230170

https://bugzilla.suse.com/1230171

https://bugzilla.suse.com/1230174

https://bugzilla.suse.com/1230175

https://bugzilla.suse.com/1230176

https://bugzilla.suse.com/1230178

https://bugzilla.suse.com/1230180

https://bugzilla.suse.com/1230185

https://bugzilla.suse.com/1230192

https://bugzilla.suse.com/1230193

https://bugzilla.suse.com/1230194

https://bugzilla.suse.com/1230200

https://bugzilla.suse.com/1230204

https://bugzilla.suse.com/1230209

https://bugzilla.suse.com/1230211

https://bugzilla.suse.com/1230212

https://bugzilla.suse.com/1230217

https://bugzilla.suse.com/1230224

https://bugzilla.suse.com/1230230

https://bugzilla.suse.com/1230233

https://bugzilla.suse.com/1230244

https://bugzilla.suse.com/1230245

https://bugzilla.suse.com/1230247

https://bugzilla.suse.com/1230248

https://bugzilla.suse.com/1230269

https://bugzilla.suse.com/1230339

https://bugzilla.suse.com/1230340

https://bugzilla.suse.com/1230392

https://bugzilla.suse.com/1230398

https://bugzilla.suse.com/1230431

https://bugzilla.suse.com/1230433

https://bugzilla.suse.com/1230434

https://bugzilla.suse.com/1230440

https://bugzilla.suse.com/1230442

https://bugzilla.suse.com/1230444

https://bugzilla.suse.com/1230450

https://bugzilla.suse.com/1230451

https://bugzilla.suse.com/1230454

https://bugzilla.suse.com/1230506

https://bugzilla.suse.com/1230507

https://bugzilla.suse.com/1230511

https://bugzilla.suse.com/1230515

https://bugzilla.suse.com/1230517

https://bugzilla.suse.com/1230524

https://bugzilla.suse.com/1230533

https://bugzilla.suse.com/1230535

https://bugzilla.suse.com/1230549

https://bugzilla.suse.com/1230556

https://bugzilla.suse.com/1230582

https://bugzilla.suse.com/1230589

https://bugzilla.suse.com/1230591

https://bugzilla.suse.com/1230592

https://bugzilla.suse.com/1230699

https://bugzilla.suse.com/1230700

https://bugzilla.suse.com/1230701

https://bugzilla.suse.com/1230702

https://bugzilla.suse.com/1230703

https://bugzilla.suse.com/1230705

https://bugzilla.suse.com/1230706

https://bugzilla.suse.com/1230707

https://bugzilla.suse.com/1230709

https://bugzilla.suse.com/1230710

https://bugzilla.suse.com/1230711

https://bugzilla.suse.com/1230712

https://bugzilla.suse.com/1230719

https://bugzilla.suse.com/1230724

https://bugzilla.suse.com/1230725

https://bugzilla.suse.com/1230730

https://bugzilla.suse.com/1230731

https://bugzilla.suse.com/1230732

https://bugzilla.suse.com/1230733

https://bugzilla.suse.com/1230747

https://bugzilla.suse.com/1230748

https://bugzilla.suse.com/1230751

https://bugzilla.suse.com/1230752

https://bugzilla.suse.com/1230756

https://bugzilla.suse.com/1230761

https://bugzilla.suse.com/1230766

https://bugzilla.suse.com/1230767

https://bugzilla.suse.com/1230768

https://bugzilla.suse.com/1230771

https://bugzilla.suse.com/1230772

https://bugzilla.suse.com/1230776

https://bugzilla.suse.com/1230783

https://bugzilla.suse.com/1230786

https://bugzilla.suse.com/1230791

https://bugzilla.suse.com/1230794

https://bugzilla.suse.com/1230796

https://bugzilla.suse.com/1230802

https://bugzilla.suse.com/1230806

https://bugzilla.suse.com/1230808

https://bugzilla.suse.com/1230810

https://bugzilla.suse.com/1230812

https://bugzilla.suse.com/1230813

https://bugzilla.suse.com/1230814

https://bugzilla.suse.com/1230815

https://bugzilla.suse.com/1230821

https://bugzilla.suse.com/1230825

https://bugzilla.suse.com/1230830

https://bugzilla.suse.com/1231013

https://bugzilla.suse.com/1231017

https://bugzilla.suse.com/1231116

https://bugzilla.suse.com/1231120

https://bugzilla.suse.com/1231146

https://bugzilla.suse.com/1231180

https://bugzilla.suse.com/1231181

http://www.nessus.org/u?9240762c

https://www.suse.com/security/cve/CVE-2022-48901

https://www.suse.com/security/cve/CVE-2022-48911

https://www.suse.com/security/cve/CVE-2022-48923

https://www.suse.com/security/cve/CVE-2022-48935

https://www.suse.com/security/cve/CVE-2022-48944

https://www.suse.com/security/cve/CVE-2022-48945

https://www.suse.com/security/cve/CVE-2023-52610

https://www.suse.com/security/cve/CVE-2023-52916

https://www.suse.com/security/cve/CVE-2024-26640

https://www.suse.com/security/cve/CVE-2024-26759

https://www.suse.com/security/cve/CVE-2024-26767

https://www.suse.com/security/cve/CVE-2024-26804

https://www.suse.com/security/cve/CVE-2024-26837

https://www.suse.com/security/cve/CVE-2024-37353

https://www.suse.com/security/cve/CVE-2024-38538

https://www.suse.com/security/cve/CVE-2024-38596

https://www.suse.com/security/cve/CVE-2024-38632

https://www.suse.com/security/cve/CVE-2024-40910

https://www.suse.com/security/cve/CVE-2024-40973

https://www.suse.com/security/cve/CVE-2024-40983

https://www.suse.com/security/cve/CVE-2024-41062

https://www.suse.com/security/cve/CVE-2024-41082

https://www.suse.com/security/cve/CVE-2024-42154

https://www.suse.com/security/cve/CVE-2024-42259

https://www.suse.com/security/cve/CVE-2024-42265

https://www.suse.com/security/cve/CVE-2024-42304

https://www.suse.com/security/cve/CVE-2024-42305

https://www.suse.com/security/cve/CVE-2024-42306

https://www.suse.com/security/cve/CVE-2024-43828

https://www.suse.com/security/cve/CVE-2024-43835

https://www.suse.com/security/cve/CVE-2024-43890

https://www.suse.com/security/cve/CVE-2024-43898

https://www.suse.com/security/cve/CVE-2024-43912

https://www.suse.com/security/cve/CVE-2024-43914

https://www.suse.com/security/cve/CVE-2024-44935

https://www.suse.com/security/cve/CVE-2024-44944

https://www.suse.com/security/cve/CVE-2024-44946

https://www.suse.com/security/cve/CVE-2024-44948

https://www.suse.com/security/cve/CVE-2024-44950

https://www.suse.com/security/cve/CVE-2024-44952

https://www.suse.com/security/cve/CVE-2024-44954

https://www.suse.com/security/cve/CVE-2024-44967

https://www.suse.com/security/cve/CVE-2024-44969

https://www.suse.com/security/cve/CVE-2024-44970

https://www.suse.com/security/cve/CVE-2024-44971

https://www.suse.com/security/cve/CVE-2024-44972

https://www.suse.com/security/cve/CVE-2024-44977

https://www.suse.com/security/cve/CVE-2024-44982

https://www.suse.com/security/cve/CVE-2024-44986

https://www.suse.com/security/cve/CVE-2024-44987

https://www.suse.com/security/cve/CVE-2024-44988

https://www.suse.com/security/cve/CVE-2024-44989

https://www.suse.com/security/cve/CVE-2024-44990

https://www.suse.com/security/cve/CVE-2024-44998

https://www.suse.com/security/cve/CVE-2024-44999

https://www.suse.com/security/cve/CVE-2024-45000

https://www.suse.com/security/cve/CVE-2024-45001

https://www.suse.com/security/cve/CVE-2024-45003

https://www.suse.com/security/cve/CVE-2024-45006

https://www.suse.com/security/cve/CVE-2024-45007

https://www.suse.com/security/cve/CVE-2024-45008

https://www.suse.com/security/cve/CVE-2024-45011

https://www.suse.com/security/cve/CVE-2024-45013

https://www.suse.com/security/cve/CVE-2024-45015

https://www.suse.com/security/cve/CVE-2024-45018

https://www.suse.com/security/cve/CVE-2024-45020

https://www.suse.com/security/cve/CVE-2024-45021

https://www.suse.com/security/cve/CVE-2024-45026

https://www.suse.com/security/cve/CVE-2024-45028

https://www.suse.com/security/cve/CVE-2024-45029

https://www.suse.com/security/cve/CVE-2024-46673

https://www.suse.com/security/cve/CVE-2024-46674

https://www.suse.com/security/cve/CVE-2024-46675

https://www.suse.com/security/cve/CVE-2024-46676

https://www.suse.com/security/cve/CVE-2024-46677

https://www.suse.com/security/cve/CVE-2024-46679

https://www.suse.com/security/cve/CVE-2024-46685

https://www.suse.com/security/cve/CVE-2024-46686

https://www.suse.com/security/cve/CVE-2024-46689

https://www.suse.com/security/cve/CVE-2024-46694

https://www.suse.com/security/cve/CVE-2024-46702

https://www.suse.com/security/cve/CVE-2024-46707

https://www.suse.com/security/cve/CVE-2024-46714

https://www.suse.com/security/cve/CVE-2024-46715

https://www.suse.com/security/cve/CVE-2024-46717

https://www.suse.com/security/cve/CVE-2024-46720

https://www.suse.com/security/cve/CVE-2024-46721

https://www.suse.com/security/cve/CVE-2024-46722

https://www.suse.com/security/cve/CVE-2024-46723

https://www.suse.com/security/cve/CVE-2024-46724

https://www.suse.com/security/cve/CVE-2024-46725

https://www.suse.com/security/cve/CVE-2024-46726

https://www.suse.com/security/cve/CVE-2024-46727

https://www.suse.com/security/cve/CVE-2024-46728

https://www.suse.com/security/cve/CVE-2024-46730

https://www.suse.com/security/cve/CVE-2024-46731

https://www.suse.com/security/cve/CVE-2024-46732

https://www.suse.com/security/cve/CVE-2024-46737

https://www.suse.com/security/cve/CVE-2024-46738

https://www.suse.com/security/cve/CVE-2024-46739

https://www.suse.com/security/cve/CVE-2024-46743

https://www.suse.com/security/cve/CVE-2024-46744

https://www.suse.com/security/cve/CVE-2024-46745

https://www.suse.com/security/cve/CVE-2024-46746

https://www.suse.com/security/cve/CVE-2024-46747

https://www.suse.com/security/cve/CVE-2024-46750

https://www.suse.com/security/cve/CVE-2024-46751

https://www.suse.com/security/cve/CVE-2024-46752

https://www.suse.com/security/cve/CVE-2024-46753

https://www.suse.com/security/cve/CVE-2024-46755

https://www.suse.com/security/cve/CVE-2024-46756

Plugin Details

Severity: High

ID: 208671

File Name: suse_SU-2024-3569-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/10/2024

Updated: 10/10/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-46798

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_83-default, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/9/2024

Vulnerability Publication Date: 2/15/2024

Reference Information

CVE: CVE-2022-48901, CVE-2022-48911, CVE-2022-48923, CVE-2022-48935, CVE-2022-48944, CVE-2022-48945, CVE-2023-52610, CVE-2023-52916, CVE-2024-26640, CVE-2024-26759, CVE-2024-26767, CVE-2024-26804, CVE-2024-26837, CVE-2024-37353, CVE-2024-38538, CVE-2024-38596, CVE-2024-38632, CVE-2024-40910, CVE-2024-40973, CVE-2024-40983, CVE-2024-41062, CVE-2024-41082, CVE-2024-42154, CVE-2024-42259, CVE-2024-42265, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-43828, CVE-2024-43835, CVE-2024-43890, CVE-2024-43898, CVE-2024-43912, CVE-2024-43914, CVE-2024-44935, CVE-2024-44944, CVE-2024-44946, CVE-2024-44948, CVE-2024-44950, CVE-2024-44952, CVE-2024-44954, CVE-2024-44967, CVE-2024-44969, CVE-2024-44970, CVE-2024-44971, CVE-2024-44972, CVE-2024-44977, CVE-2024-44982, CVE-2024-44986, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44998, CVE-2024-44999, CVE-2024-45000, CVE-2024-45001, CVE-2024-45003, CVE-2024-45006, CVE-2024-45007, CVE-2024-45008, CVE-2024-45011, CVE-2024-45013, CVE-2024-45015, CVE-2024-45018, CVE-2024-45020, CVE-2024-45021, CVE-2024-45026, CVE-2024-45028, CVE-2024-45029, CVE-2024-46673, CVE-2024-46674, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46686, CVE-2024-46689, CVE-2024-46694, CVE-2024-46702, CVE-2024-46707, CVE-2024-46714, CVE-2024-46715, CVE-2024-46717, CVE-2024-46720, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46726, CVE-2024-46727, CVE-2024-46728, CVE-2024-46730, CVE-2024-46731, CVE-2024-46732, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46746, CVE-2024-46747, CVE-2024-46750, CVE-2024-46751, CVE-2024-46752, CVE-2024-46753, CVE-2024-46755, CVE-2024-46756, CVE-2024-46758, CVE-2024-46759, CVE-2024-46761, CVE-2024-46771, CVE-2024-46772, CVE-2024-46773, CVE-2024-46774, CVE-2024-46778, CVE-2024-46780, CVE-2024-46781, CVE-2024-46783, CVE-2024-46784, CVE-2024-46786, CVE-2024-46787, CVE-2024-46791, CVE-2024-46794, CVE-2024-46798, CVE-2024-46822, CVE-2024-46830

SuSE: SUSE-SU-2024:3569-1