Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:0900-2
Distribution: SUSE
Plattformen: SUSE Manager Proxy 4.3, SUSE Manager Server 4.3
Datum: Fr, 15. März 2024, 18:14
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52452
Applikationen: Linux

Originalnachricht

--===============7127805785392853110==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:0900-2
Rating: important
References:

* bsc#1211515
* bsc#1213456
* bsc#1214064
* bsc#1218195
* bsc#1218216
* bsc#1218562
* bsc#1218915
* bsc#1219073
* bsc#1219126
* bsc#1219127
* bsc#1219146
* bsc#1219295
* bsc#1219633
* bsc#1219653
* bsc#1219827
* bsc#1219835
* bsc#1220009
* bsc#1220140
* bsc#1220187
* bsc#1220238
* bsc#1220240
* bsc#1220241
* bsc#1220243
* bsc#1220250
* bsc#1220251
* bsc#1220253
* bsc#1220254
* bsc#1220255
* bsc#1220257
* bsc#1220326
* bsc#1220328
* bsc#1220330
* bsc#1220335
* bsc#1220344
* bsc#1220350
* bsc#1220364
* bsc#1220398
* bsc#1220409
* bsc#1220433
* bsc#1220444
* bsc#1220457
* bsc#1220459
* bsc#1220469
* bsc#1220649
* bsc#1220735
* bsc#1220736
* bsc#1220796
* bsc#1220797
* bsc#1220825
* bsc#1220845
* bsc#1220917
* bsc#1220930
* bsc#1220931
* bsc#1220933


Cross-References:

* CVE-2019-25162
* CVE-2021-46923
* CVE-2021-46924
* CVE-2021-46932
* CVE-2021-46934
* CVE-2021-47083
* CVE-2022-48627
* CVE-2023-28746
* CVE-2023-5197
* CVE-2023-52340
* CVE-2023-52429
* CVE-2023-52439
* CVE-2023-52443
* CVE-2023-52445
* CVE-2023-52447
* CVE-2023-52448
* CVE-2023-52449
* CVE-2023-52451
* CVE-2023-52452
* CVE-2023-52456
* CVE-2023-52457
* CVE-2023-52463
* CVE-2023-52464
* CVE-2023-52467
* CVE-2023-52475
* CVE-2023-52478
* CVE-2023-52482
* CVE-2023-52484
* CVE-2023-52530
* CVE-2023-52531
* CVE-2023-52559
* CVE-2023-6270
* CVE-2023-6817
* CVE-2024-0607
* CVE-2024-1151
* CVE-2024-23849
* CVE-2024-23850
* CVE-2024-23851
* CVE-2024-26585
* CVE-2024-26586
* CVE-2024-26589
* CVE-2024-26591
* CVE-2024-26593
* CVE-2024-26595
* CVE-2024-26598
* CVE-2024-26602
* CVE-2024-26603
* CVE-2024-26607
* CVE-2024-26622


CVSS scores:

* CVE-2019-25162 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-46923 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46924 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46932 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-46934 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47083 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2022-48627 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-5197 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-5197 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52439 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52439 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52443 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52445 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52445 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52447 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52451 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52452 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52456 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52457 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52467 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52475 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52478 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52482 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-52484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6817 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6817 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0607 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-0607 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-1151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-23849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23851 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26589 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26607 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


Affected Products:

* SUSE Manager Proxy 4.3
* SUSE Manager Server 4.3



An update that solves 49 vulnerabilities and has five security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
* CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend
(bsc#1220933).
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
(bsc#1220930).
* CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
* CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register
(bsc#1220433).
* CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach
(bsc#1220254).
* CVE-2024-26589: Fixed out of bounds read due to variable offset alu on
PTR_TO_FLOW_KEYS (bsc#1220255).
* CVE-2023-52484: Fixed a soft lockup triggered by
arm_smmu_mm_invalidate_range (bsc#1220797).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220187).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219295).
* CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval()
(bsc#1218915).
* CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control()
(bsc#1220825).
* CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).
* CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
* CVE-2023-52457: Fixed skipped resource freeing if
pm_runtime_resume_and_get() failed (bsc#1220350).
* CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
* CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
* CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl
notifier
(bsc#1220238).
* CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
* CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).
* CVE-2024-26598: Fixed potential UAF in LPI translation cache (bsc#1220326).
* CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
* CVE-2023-52445: Fixed use after free on context disconnection
(bsc#1220241).
* CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
* CVE-2023-52443: Fixed crash when parsed profile name is empty
(bsc#1220240).
* CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
* CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
* CVE-2024-26586: Fixed stack corruption (bsc#1220243).
* CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
* CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
* CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump
(bsc#1220253).
* CVE-2024-1151: Fixed unlimited number of recursions from action sets
(bsc#1219835).
* CVE-2023-5197: Fixed se-after-free due to addition and removal of rules
from
chain bindings within the same transaction (bsc#1218216).
* CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv
(bsc#1219127).
* CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-
table.c (bsc#1219827).
* CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c
(bsc#1219146).

The following non-security bugs were fixed:

* bpf: Fix verification of indirect var-off stack access (git-fixes).
* bpf: Guard stack limits against 32bit overflow (git-fixes).
* KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
* KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-
fixes).
* NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633).
* nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
* nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).
* nvme: start keep-alive after admin queue setup (bsc#1211515).
* x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
* x86/bugs: Add asm helpers for executing VERW (git-fixes).
* x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-
fixes).
* x86/entry_32: Add VERW just before userspace transition (git-fixes).
* x86/entry_64: Add VERW just before userspace transition (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-900=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-900=1

## Package List:

* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.111.2
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.111.2
* kernel-default-debugsource-5.14.21-150400.24.111.2
* kernel-syms-5.14.21-150400.24.111.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.111.2
* kernel-default-devel-5.14.21-150400.24.111.2
* kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.111.1
* kernel-source-5.14.21-150400.24.111.1
* kernel-devel-5.14.21-150400.24.111.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.111.2
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.111.2
* kernel-default-debugsource-5.14.21-150400.24.111.2
* kernel-syms-5.14.21-150400.24.111.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.111.2
* kernel-default-devel-5.14.21-150400.24.111.2
* SUSE Manager Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.111.1
* kernel-source-5.14.21-150400.24.111.1
* kernel-devel-5.14.21-150400.24.111.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.111.2
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.111.2
* kernel-zfcpdump-debugsource-5.14.21-150400.24.111.2

## References:

* https://www.suse.com/security/cve/CVE-2019-25162.html
* https://www.suse.com/security/cve/CVE-2021-46923.html
* https://www.suse.com/security/cve/CVE-2021-46924.html
* https://www.suse.com/security/cve/CVE-2021-46932.html
* https://www.suse.com/security/cve/CVE-2021-46934.html
* https://www.suse.com/security/cve/CVE-2021-47083.html
* https://www.suse.com/security/cve/CVE-2022-48627.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-5197.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2023-52429.html
* https://www.suse.com/security/cve/CVE-2023-52439.html
* https://www.suse.com/security/cve/CVE-2023-52443.html
* https://www.suse.com/security/cve/CVE-2023-52445.html
* https://www.suse.com/security/cve/CVE-2023-52447.html
* https://www.suse.com/security/cve/CVE-2023-52448.html
* https://www.suse.com/security/cve/CVE-2023-52449.html
* https://www.suse.com/security/cve/CVE-2023-52451.html
* https://www.suse.com/security/cve/CVE-2023-52452.html
* https://www.suse.com/security/cve/CVE-2023-52456.html
* https://www.suse.com/security/cve/CVE-2023-52457.html
* https://www.suse.com/security/cve/CVE-2023-52463.html
* https://www.suse.com/security/cve/CVE-2023-52464.html
* https://www.suse.com/security/cve/CVE-2023-52467.html
* https://www.suse.com/security/cve/CVE-2023-52475.html
* https://www.suse.com/security/cve/CVE-2023-52478.html
* https://www.suse.com/security/cve/CVE-2023-52482.html
* https://www.suse.com/security/cve/CVE-2023-52484.html
* https://www.suse.com/security/cve/CVE-2023-52530.html
* https://www.suse.com/security/cve/CVE-2023-52531.html
* https://www.suse.com/security/cve/CVE-2023-52559.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-6817.html
* https://www.suse.com/security/cve/CVE-2024-0607.html
* https://www.suse.com/security/cve/CVE-2024-1151.html
* https://www.suse.com/security/cve/CVE-2024-23849.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-23851.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26586.html
* https://www.suse.com/security/cve/CVE-2024-26589.html
* https://www.suse.com/security/cve/CVE-2024-26591.html
* https://www.suse.com/security/cve/CVE-2024-26593.html
* https://www.suse.com/security/cve/CVE-2024-26595.html
* https://www.suse.com/security/cve/CVE-2024-26598.html
* https://www.suse.com/security/cve/CVE-2024-26602.html
* https://www.suse.com/security/cve/CVE-2024-26603.html
* https://www.suse.com/security/cve/CVE-2024-26607.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1211515
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1214064
* https://bugzilla.suse.com/show_bug.cgi?id=1218195
* https://bugzilla.suse.com/show_bug.cgi?id=1218216
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218915
* https://bugzilla.suse.com/show_bug.cgi?id=1219073
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219127
* https://bugzilla.suse.com/show_bug.cgi?id=1219146
* https://bugzilla.suse.com/show_bug.cgi?id=1219295
* https://bugzilla.suse.com/show_bug.cgi?id=1219633
* https://bugzilla.suse.com/show_bug.cgi?id=1219653
* https://bugzilla.suse.com/show_bug.cgi?id=1219827
* https://bugzilla.suse.com/show_bug.cgi?id=1219835
* https://bugzilla.suse.com/show_bug.cgi?id=1220009
* https://bugzilla.suse.com/show_bug.cgi?id=1220140
* https://bugzilla.suse.com/show_bug.cgi?id=1220187
* https://bugzilla.suse.com/show_bug.cgi?id=1220238
* https://bugzilla.suse.com/show_bug.cgi?id=1220240
* https://bugzilla.suse.com/show_bug.cgi?id=1220241
* https://bugzilla.suse.com/show_bug.cgi?id=1220243
* https://bugzilla.suse.com/show_bug.cgi?id=1220250
* https://bugzilla.suse.com/show_bug.cgi?id=1220251
* https://bugzilla.suse.com/show_bug.cgi?id=1220253
* https://bugzilla.suse.com/show_bug.cgi?id=1220254
* https://bugzilla.suse.com/show_bug.cgi?id=1220255
* https://bugzilla.suse.com/show_bug.cgi?id=1220257
* https://bugzilla.suse.com/show_bug.cgi?id=1220326
* https://bugzilla.suse.com/show_bug.cgi?id=1220328
* https://bugzilla.suse.com/show_bug.cgi?id=1220330
* https://bugzilla.suse.com/show_bug.cgi?id=1220335
* https://bugzilla.suse.com/show_bug.cgi?id=1220344
* https://bugzilla.suse.com/show_bug.cgi?id=1220350
* https://bugzilla.suse.com/show_bug.cgi?id=1220364
* https://bugzilla.suse.com/show_bug.cgi?id=1220398
* https://bugzilla.suse.com/show_bug.cgi?id=1220409
* https://bugzilla.suse.com/show_bug.cgi?id=1220433
* https://bugzilla.suse.com/show_bug.cgi?id=1220444
* https://bugzilla.suse.com/show_bug.cgi?id=1220457
* https://bugzilla.suse.com/show_bug.cgi?id=1220459
* https://bugzilla.suse.com/show_bug.cgi?id=1220469
* https://bugzilla.suse.com/show_bug.cgi?id=1220649
* https://bugzilla.suse.com/show_bug.cgi?id=1220735
* https://bugzilla.suse.com/show_bug.cgi?id=1220736
* https://bugzilla.suse.com/show_bug.cgi?id=1220796
* https://bugzilla.suse.com/show_bug.cgi?id=1220797
* https://bugzilla.suse.com/show_bug.cgi?id=1220825
* https://bugzilla.suse.com/show_bug.cgi?id=1220845
* https://bugzilla.suse.com/show_bug.cgi?id=1220917
* https://bugzilla.suse.com/show_bug.cgi?id=1220930
* https://bugzilla.suse.com/show_bug.cgi?id=1220931
* https://bugzilla.suse.com/show_bug.cgi?id=1220933


--===============7127805785392853110==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:0900-2</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211515">bsc#1211515</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">bsc#1213456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214064">bsc#1214064</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218195">bsc#1218195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218216">bsc#1218216</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218915">bsc#1218915</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219073">bsc#1219073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">bsc#1219126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219127">bsc#1219127</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219146">bsc#1219146</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219295">bsc#1219295</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219633">bsc#1219633</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219653">bsc#1219653</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219827">bsc#1219827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219835">bsc#1219835</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220009">bsc#1220009</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220140">bsc#1220140</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">bsc#1220187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220238">bsc#1220238</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220240">bsc#1220240</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220241">bsc#1220241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220243">bsc#1220243</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220250">bsc#1220250</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220251">bsc#1220251</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220253">bsc#1220253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220254">bsc#1220254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220255">bsc#1220255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220257">bsc#1220257</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220326">bsc#1220326</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">bsc#1220328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220330">bsc#1220330</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220335">bsc#1220335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220344">bsc#1220344</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220350">bsc#1220350</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220364">bsc#1220364</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220398">bsc#1220398</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220409">bsc#1220409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220433">bsc#1220433</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220444">bsc#1220444</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220457">bsc#1220457</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220459">bsc#1220459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220469">bsc#1220469</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220649">bsc#1220649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220735">bsc#1220735</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220736">bsc#1220736</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220796">bsc#1220796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220797">bsc#1220797</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220825">bsc#1220825</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220845">bsc#1220845</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220917">bsc#1220917</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220930">bsc#1220930</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220931">bsc#1220931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220933">bsc#1220933</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2019-25162.html">CVE-2019-25162</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46923.html">CVE-2021-46923</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46924.html">CVE-2021-46924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46932.html">CVE-2021-46932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46934.html">CVE-2021-46934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47083.html">CVE-2021-47083</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48627.html">CVE-2022-48627</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">CVE-2023-28746</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-5197.html">CVE-2023-5197</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52340.html">CVE-2023-52340</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52429.html">CVE-2023-52429</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52439.html">CVE-2023-52439</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52443.html">CVE-2023-52443</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52445.html">CVE-2023-52445</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52447.html">CVE-2023-52447</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52448.html">CVE-2023-52448</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52449.html">CVE-2023-52449</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52451.html">CVE-2023-52451</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52452.html">CVE-2023-52452</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52456.html">CVE-2023-52456</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52457.html">CVE-2023-52457</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52463.html">CVE-2023-52463</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52464.html">CVE-2023-52464</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52467.html">CVE-2023-52467</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52475.html">CVE-2023-52475</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52478.html">CVE-2023-52478</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52482.html">CVE-2023-52482</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52484.html">CVE-2023-52484</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52530.html">CVE-2023-52530</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52531.html">CVE-2023-52531</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52559.html">CVE-2023-52559</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6817.html">CVE-2023-6817</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0607.html">CVE-2024-0607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-1151.html">CVE-2024-1151</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23849.html">CVE-2024-23849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23850.html">CVE-2024-23850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23851.html">CVE-2024-23851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">CVE-2024-26585</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26586.html">CVE-2024-26586</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26589.html">CVE-2024-26589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26591.html">CVE-2024-26591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26593.html">CVE-2024-26593</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26595.html">CVE-2024-26595</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26598.html">CVE-2024-26598</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26602.html">CVE-2024-26602</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26603.html">CVE-2024-26603</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26607.html">CVE-2024-26607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26622.html">CVE-2024-26622</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2019-25162</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46923</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47083</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48627</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-28746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-5197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-5197</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52340</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52429</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52429</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52439</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52439</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52443</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52443</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52445</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52445</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52447</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52447</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52448</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52449</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52451</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52452</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52456</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52457</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52463</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52464</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52467</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52475</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52478</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52482</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52484</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52530</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52531</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52559</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6817</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6817</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0607</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-1151</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23849</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23851</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26586</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26595</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26598</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26602</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26603</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26622</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Manager
Proxy 4.3</li>

<li class="list-group-item">SUSE Manager
Server 4.3</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 49 vulnerabilities and has five security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).</li>
<li>CVE-2023-52463: Fixed null pointer dereference in efivarfs
(bsc#1220328).</li>
<li>CVE-2023-52559: Fixed a bug by avoiding memory allocation in
iommu_suspend (bsc#1220933).</li>
<li>CVE-2023-28746: Fixed Register File Data Sampling
(bsc#1213456).</li>
<li>CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
(bsc#1220930).</li>
<li>CVE-2024-26607: Fixed a probing race issue in sii902x:
(bsc#1220736).</li>
<li>CVE-2023-52467: Fixed a null pointer dereference in
of_syscon_register (bsc#1220433).</li>
<li>CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach
(bsc#1220254).</li>
<li>CVE-2024-26589: Fixed out of bounds read due to variable offset alu
on PTR_TO_FLOW_KEYS (bsc#1220255).</li>
<li>CVE-2023-52484: Fixed a soft lockup triggered by
arm_smmu_mm_invalidate_range (bsc#1220797).</li>
<li>CVE-2024-26585: Fixed race between tx work scheduling and socket
close (bsc#1220187).</li>
<li>CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of
the Linux kernel by forcing 100% CPU (bsc#1219295).</li>
<li>CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval()
(bsc#1218915).</li>
<li>CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk
(bsc#1218195).</li>
<li>CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control()
(bsc#1220825).</li>
<li>CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).</li>
<li>CVE-2023-52452: Fixed Fix accesses to uninit stack slots
(bsc#1220257).</li>
<li>CVE-2023-52457: Fixed skipped resource freeing if
pm_runtime_resume_and_get() failed (bsc#1220350).</li>
<li>CVE-2023-52456: Fixed tx statemachine deadlock
(bsc#1220364).</li>
<li>CVE-2023-52451: Fixed access beyond end of drmem array
(bsc#1220250).</li>
<li>CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl
notifier (bsc#1220238).</li>
<li>CVE-2021-46923: Fixed reference leakage in fs/mount_setattr
(bsc#1220457).</li>
<li>CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround
(bsc#1220251).</li>
<li>CVE-2024-26598: Fixed potential UAF in LPI translation cache
(bsc#1220326).</li>
<li>CVE-2024-26603: Fixed infinite loop via #PF handling
(bsc#1220335).</li>
<li>CVE-2023-52445: Fixed use after free on context disconnection
(bsc#1220241).</li>
<li>CVE-2023-52439: Fixed use-after-free in uio_open
(bsc#1220140).</li>
<li>CVE-2023-52443: Fixed crash when parsed profile name is empty
(bsc#1220240).</li>
<li>CVE-2024-26602: Fixed overall slowdowns with sys_membarrier
(bsc1220398).</li>
<li>CVE-2024-26593: Fixed block process call transactions
(bsc#1220009).</li>
<li>CVE-2024-26586: Fixed stack corruption (bsc#1220243).</li>
<li>CVE-2024-26595: Fixed NULL pointer dereference in error path
(bsc#1220344).</li>
<li>CVE-2023-52464: Fixed possible out-of-bounds string access
(bsc#1220330)</li>
<li>CVE-2023-52448: Fixed kernel NULL pointer dereference in
gfs2_rgrp_dump (bsc#1220253).</li>
<li>CVE-2024-1151: Fixed unlimited number of recursions from action sets
(bsc#1219835).</li>
<li>CVE-2023-5197: Fixed se-after-free due to addition and removal of
rules from chain bindings within the same transaction (bsc#1218216).</li>
<li>CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv
(bsc#1219127).</li>
<li>CVE-2023-52429: Fixed potential DoS in dm_table_create in
drivers/md/dm-table.c (bsc#1219827).</li>
<li>CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c
(bsc#1219146).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>bpf: Fix verification of indirect var-off stack access
(git-fixes).</li>
<li>bpf: Guard stack limits against 32bit overflow
(git-fixes).</li>
<li>KVM: VMX: Move VERW closer to VMentry for MDS mitigation
(git-fixes).</li>
<li>KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH
(git-fixes).</li>
<li>NFS: avoid infinite loop in pnfs_update_layout
(bsc#1219633).</li>
<li>nvme: move nvme_stop_keep_alive() back to original position
(bsc#1211515).</li>
<li>nvme: remove nvme_alloc_request and nvme_alloc_request_qid
(bsc#1214064).</li>
<li>nvme: start keep-alive after admin queue setup
(bsc#1211515).</li>
<li>x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix
(git-fixes).</li>
<li>x86/bugs: Add asm helpers for executing VERW (git-fixes). </li>
<li>x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key
(git-fixes).</li>
<li>x86/entry_32: Add VERW just before userspace transition
(git-fixes).</li>
<li>x86/entry_64: Add VERW just before userspace transition
(git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Manager Proxy 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-900=1</code>



</li>

<li class="list-group-item">
SUSE Manager Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-900=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Manager Proxy 4.3 (nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.111.2</li>

</ul>
</li>

<li>
SUSE Manager Proxy 4.3 (x86_64)
<ul>


<li>kernel-default-debuginfo-5.14.21-150400.24.111.2</li>


<li>kernel-default-debugsource-5.14.21-150400.24.111.2</li>


<li>kernel-syms-5.14.21-150400.24.111.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.111.2</li>


<li>kernel-default-devel-5.14.21-150400.24.111.2</li>


<li>kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1</li>

</ul>
</li>

<li>
SUSE Manager Proxy 4.3 (noarch)
<ul>


<li>kernel-macros-5.14.21-150400.24.111.1</li>


<li>kernel-source-5.14.21-150400.24.111.1</li>


<li>kernel-devel-5.14.21-150400.24.111.1</li>

</ul>
</li>



<li>
SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.111.2</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (ppc64le x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (ppc64le s390x x86_64)
<ul>


<li>kernel-default-debuginfo-5.14.21-150400.24.111.2</li>


<li>kernel-default-debugsource-5.14.21-150400.24.111.2</li>


<li>kernel-syms-5.14.21-150400.24.111.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.111.2</li>


<li>kernel-default-devel-5.14.21-150400.24.111.2</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (noarch)
<ul>


<li>kernel-macros-5.14.21-150400.24.111.1</li>


<li>kernel-source-5.14.21-150400.24.111.1</li>


<li>kernel-devel-5.14.21-150400.24.111.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.111.2</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.111.2</li>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.111.2</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2019-25162.html">https://www.suse.com/security/cve/CVE-2019-25162.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46923.html">https://www.suse.com/security/cve/CVE-2021-46923.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46924.html">https://www.suse.com/security/cve/CVE-2021-46924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46932.html">https://www.suse.com/security/cve/CVE-2021-46932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46934.html">https://www.suse.com/security/cve/CVE-2021-46934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47083.html">https://www.suse.com/security/cve/CVE-2021-47083.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48627.html">https://www.suse.com/security/cve/CVE-2022-48627.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">https://www.suse.com/security/cve/CVE-2023-28746.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-5197.html">https://www.suse.com/security/cve/CVE-2023-5197.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52340.html">https://www.suse.com/security/cve/CVE-2023-52340.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52429.html">https://www.suse.com/security/cve/CVE-2023-52429.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52439.html">https://www.suse.com/security/cve/CVE-2023-52439.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52443.html">https://www.suse.com/security/cve/CVE-2023-52443.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52445.html">https://www.suse.com/security/cve/CVE-2023-52445.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52447.html">https://www.suse.com/security/cve/CVE-2023-52447.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52448.html">https://www.suse.com/security/cve/CVE-2023-52448.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52449.html">https://www.suse.com/security/cve/CVE-2023-52449.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52451.html">https://www.suse.com/security/cve/CVE-2023-52451.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52452.html">https://www.suse.com/security/cve/CVE-2023-52452.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52456.html">https://www.suse.com/security/cve/CVE-2023-52456.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52457.html">https://www.suse.com/security/cve/CVE-2023-52457.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52463.html">https://www.suse.com/security/cve/CVE-2023-52463.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52464.html">https://www.suse.com/security/cve/CVE-2023-52464.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52467.html">https://www.suse.com/security/cve/CVE-2023-52467.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52475.html">https://www.suse.com/security/cve/CVE-2023-52475.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52478.html">https://www.suse.com/security/cve/CVE-2023-52478.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52482.html">https://www.suse.com/security/cve/CVE-2023-52482.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52484.html">https://www.suse.com/security/cve/CVE-2023-52484.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52530.html">https://www.suse.com/security/cve/CVE-2023-52530.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52531.html">https://www.suse.com/security/cve/CVE-2023-52531.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52559.html">https://www.suse.com/security/cve/CVE-2023-52559.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6817.html">https://www.suse.com/security/cve/CVE-2023-6817.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0607.html">https://www.suse.com/security/cve/CVE-2024-0607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-1151.html">https://www.suse.com/security/cve/CVE-2024-1151.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23849.html">https://www.suse.com/security/cve/CVE-2024-23849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23850.html">https://www.suse.com/security/cve/CVE-2024-23850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23851.html">https://www.suse.com/security/cve/CVE-2024-23851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">https://www.suse.com/security/cve/CVE-2024-26585.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26586.html">https://www.suse.com/security/cve/CVE-2024-26586.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26589.html">https://www.suse.com/security/cve/CVE-2024-26589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26591.html">https://www.suse.com/security/cve/CVE-2024-26591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26593.html">https://www.suse.com/security/cve/CVE-2024-26593.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26595.html">https://www.suse.com/security/cve/CVE-2024-26595.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26598.html">https://www.suse.com/security/cve/CVE-2024-26598.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26602.html">https://www.suse.com/security/cve/CVE-2024-26602.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26603.html">https://www.suse.com/security/cve/CVE-2024-26603.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26607.html">https://www.suse.com/security/cve/CVE-2024-26607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26622.html">https://www.suse.com/security/cve/CVE-2024-26622.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211515">https://bugzilla.suse.com/show_bug.cgi?id=1211515</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">https://bugzilla.suse.com/show_bug.cgi?id=1213456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214064">https://bugzilla.suse.com/show_bug.cgi?id=1214064</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218195">https://bugzilla.suse.com/show_bug.cgi?id=1218195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218216">https://bugzilla.suse.com/show_bug.cgi?id=1218216</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218915">https://bugzilla.suse.com/show_bug.cgi?id=1218915</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219073">https://bugzilla.suse.com/show_bug.cgi?id=1219073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">https://bugzilla.suse.com/show_bug.cgi?id=1219126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219127">https://bugzilla.suse.com/show_bug.cgi?id=1219127</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219146">https://bugzilla.suse.com/show_bug.cgi?id=1219146</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219295">https://bugzilla.suse.com/show_bug.cgi?id=1219295</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219633">https://bugzilla.suse.com/show_bug.cgi?id=1219633</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219653">https://bugzilla.suse.com/show_bug.cgi?id=1219653</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219827">https://bugzilla.suse.com/show_bug.cgi?id=1219827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219835">https://bugzilla.suse.com/show_bug.cgi?id=1219835</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220009">https://bugzilla.suse.com/show_bug.cgi?id=1220009</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220140">https://bugzilla.suse.com/show_bug.cgi?id=1220140</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">https://bugzilla.suse.com/show_bug.cgi?id=1220187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220238">https://bugzilla.suse.com/show_bug.cgi?id=1220238</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220240">https://bugzilla.suse.com/show_bug.cgi?id=1220240</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220241">https://bugzilla.suse.com/show_bug.cgi?id=1220241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220243">https://bugzilla.suse.com/show_bug.cgi?id=1220243</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220250">https://bugzilla.suse.com/show_bug.cgi?id=1220250</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220251">https://bugzilla.suse.com/show_bug.cgi?id=1220251</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220253">https://bugzilla.suse.com/show_bug.cgi?id=1220253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220254">https://bugzilla.suse.com/show_bug.cgi?id=1220254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220255">https://bugzilla.suse.com/show_bug.cgi?id=1220255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220257">https://bugzilla.suse.com/show_bug.cgi?id=1220257</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220326">https://bugzilla.suse.com/show_bug.cgi?id=1220326</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">https://bugzilla.suse.com/show_bug.cgi?id=1220328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220330">https://bugzilla.suse.com/show_bug.cgi?id=1220330</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220335">https://bugzilla.suse.com/show_bug.cgi?id=1220335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220344">https://bugzilla.suse.com/show_bug.cgi?id=1220344</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220350">https://bugzilla.suse.com/show_bug.cgi?id=1220350</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220364">https://bugzilla.suse.com/show_bug.cgi?id=1220364</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220398">https://bugzilla.suse.com/show_bug.cgi?id=1220398</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220409">https://bugzilla.suse.com/show_bug.cgi?id=1220409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220433">https://bugzilla.suse.com/show_bug.cgi?id=1220433</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220444">https://bugzilla.suse.com/show_bug.cgi?id=1220444</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220457">https://bugzilla.suse.com/show_bug.cgi?id=1220457</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220459">https://bugzilla.suse.com/show_bug.cgi?id=1220459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220469">https://bugzilla.suse.com/show_bug.cgi?id=1220469</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220649">https://bugzilla.suse.com/show_bug.cgi?id=1220649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220735">https://bugzilla.suse.com/show_bug.cgi?id=1220735</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220736">https://bugzilla.suse.com/show_bug.cgi?id=1220736</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220796">https://bugzilla.suse.com/show_bug.cgi?id=1220796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220797">https://bugzilla.suse.com/show_bug.cgi?id=1220797</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220825">https://bugzilla.suse.com/show_bug.cgi?id=1220825</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220845">https://bugzilla.suse.com/show_bug.cgi?id=1220845</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220917">https://bugzilla.suse.com/show_bug.cgi?id=1220917</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220930">https://bugzilla.suse.com/show_bug.cgi?id=1220930</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220931">https://bugzilla.suse.com/show_bug.cgi?id=1220931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220933">https://bugzilla.suse.com/show_bug.cgi?id=1220933</a>
</li>


</ul>

</div>

--===============7127805785392853110==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung