SUSE Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution and sensitive information disclosure on the targeted system.
Notes:
CVE-2024-1086 is being exploited in the wild. It is related to use-after-free vulnerability in the netfilter: nf_tables component. Local attackers could exploit this flaw to elevate privileges from a regular user to root. The risk level remain medium risk.
[Updated on 2024-02-14]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-02-16]
Updated Impact, System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-02-28]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-05-31]
Updated Description.
Impact
- Denial of Service
- Remote Code Execution
- Elevation of Privilege
- Information Disclosure
System / Technologies affected
- Basesystem Module 15-SP5
- Development Tools Module 15-SP5
- Legacy Module 15-SP5
- Public Cloud Module 15-SP4
- Public Cloud Module 15-SP5
- SUSE Enterprise Storage 7.1
- SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
- SUSE Linux Enterprise Desktop 15 SP5
- SUSE Linux Enterprise High Availability Extension 12 SP5
- SUSE Linux Enterprise High Availability Extension 15 SP2
- SUSE Linux Enterprise High Availability Extension 15 SP3
- SUSE Linux Enterprise High Availability Extension 15 SP4
- SUSE Linux Enterprise High Availability Extension 15 SP5
- SUSE Linux Enterprise High Performance Computing 12 SP5
- SUSE Linux Enterprise High Performance Computing 15 SP1
- SUSE Linux Enterprise High Performance Computing 15 SP2
- SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise High Performance Computing 15 SP3
- SUSE Linux Enterprise High Performance Computing 15 SP4
- SUSE Linux Enterprise High Performance Computing 15 SP5
- SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Live Patching 15-SP1
- SUSE Linux Enterprise Live Patching 15-SP2
- SUSE Linux Enterprise Live Patching 15-SP3
- SUSE Linux Enterprise Live Patching 15-SP4
- SUSE Linux Enterprise Live Patching 15-SP5
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.3
- SUSE Linux Enterprise Micro 5.4
- SUSE Linux Enterprise Micro 5.5
- SUSE Linux Enterprise Micro for Rancher 5.2
- SUSE Linux Enterprise Micro for Rancher 5.3
- SUSE Linux Enterprise Micro for Rancher 5.4
- SUSE Linux Enterprise Real Time 12 SP5
- SUSE Linux Enterprise Real Time 15 SP4
- SUSE Linux Enterprise Real Time 15 SP5
- SUSE Linux Enterprise Server 12 SP5
- SUSE Linux Enterprise Server 15 SP1
- SUSE Linux Enterprise Server 15 SP2
- SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
- SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise Server 15 SP3
- SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
- SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
- SUSE Linux Enterprise Server 15 SP4
- SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
- SUSE Linux Enterprise Server 15 SP5
- SUSE Linux Enterprise Server for SAP Applications 12 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP1
- SUSE Linux Enterprise Server for SAP Applications 15 SP2
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
- SUSE Linux Enterprise Server for SAP Applications 15 SP5
- SUSE Linux Enterprise Software Development Kit 12 SP5
- SUSE Linux Enterprise Workstation Extension 12 12-SP5
- SUSE Linux Enterprise Workstation Extension 15 SP5
- SUSE Manager Proxy 4.1
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.1
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.1
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
- SUSE Real Time Module 15-SP5
- openSUSE Leap 15.3
- openSUSE Leap 15.4
- openSUSE Leap 15.5
- openSUSE Leap Micro 5.3
- openSUSE Leap Micro 5.4
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2023/suse-su-20232646-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20230774-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240348-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240351-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240352-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240358-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240362-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240373-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240376-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240377-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240378-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240380-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240389-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240393-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240394-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240395-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240409-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240410-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240411-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240414-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240418-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240421-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240428-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240429-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240463-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240468-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240469-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240474-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240476-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240478-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240483-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240484-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240514-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240515-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240516-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240620-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240622-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240624-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240639-1
Vulnerability Identifier
- CVE-2021-33631
- CVE-2022-2196
- CVE-2022-3523
- CVE-2022-4269
- CVE-2022-4744
- CVE-2022-36280
- CVE-2022-38096
- CVE-2022-45884
- CVE-2022-45885
- CVE-2022-45886
- CVE-2022-45887
- CVE-2022-45919
- CVE-2023-0045
- CVE-2023-0122
- CVE-2023-0179
- CVE-2023-0394
- CVE-2023-0461
- CVE-2023-0469
- CVE-2023-0590
- CVE-2023-0597
- CVE-2023-1075
- CVE-2023-1076
- CVE-2023-1077
- CVE-2023-1079
- CVE-2023-1095
- CVE-2023-1118
- CVE-2023-1380
- CVE-2023-1382
- CVE-2023-1513
- CVE-2023-1582
- CVE-2023-1583
- CVE-2023-1611
- CVE-2023-1637
- CVE-2023-1652
- CVE-2023-1670
- CVE-2023-1829
- CVE-2023-1838
- CVE-2023-1855
- CVE-2023-1989
- CVE-2023-1998
- CVE-2023-2002
- CVE-2023-2124
- CVE-2023-2156
- CVE-2023-2162
- CVE-2023-2176
- CVE-2023-2235
- CVE-2023-2269
- CVE-2023-2483
- CVE-2023-2513
- CVE-2023-3006
- CVE-2023-3141
- CVE-2023-3161
- CVE-2023-4921
- CVE-2023-5178
- CVE-2023-6040
- CVE-2023-6176
- CVE-2023-6356
- CVE-2023-6531
- CVE-2023-6535
- CVE-2023-6536
- CVE-2023-6610
- CVE-2023-6915
- CVE-2023-6932
- CVE-2023-21102
- CVE-2023-21106
- CVE-2023-22995
- CVE-2023-22998
- CVE-2023-23000
- CVE-2023-23001
- CVE-2023-23004
- CVE-2023-23006
- CVE-2023-23454
- CVE-2023-23455
- CVE-2023-23559
- CVE-2023-25012
- CVE-2023-26545
- CVE-2023-28327
- CVE-2023-28410
- CVE-2023-28464
- CVE-2023-30456
- CVE-2023-30772
- CVE-2023-31084
- CVE-2023-31436
- CVE-2023-32233
- CVE-2023-33288
- CVE-2023-33951
- CVE-2023-33952
- CVE-2023-39198
- CVE-2023-46838
- CVE-2023-47233
- CVE-2023-51042
- CVE-2023-51043
- CVE-2023-51780
- CVE-2023-51782
- CVE-2024-0340
- CVE-2024-0565
- CVE-2024-0641
- CVE-2024-0775
- CVE-2024-1085
- CVE-2024-1086
- CVE-2024-24860
Source
Related Link
- https://www.suse.com/support/update/announcement/2023/suse-su-20232646-1
- https://www.suse.com/support/update/announcement/2023/suse-su-20230774-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240348-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240351-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240352-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240358-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240362-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240373-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240376-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240377-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240378-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240380-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240389-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240393-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240394-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240395-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240409-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240410-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240411-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240414-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240418-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240421-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240428-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240429-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240463-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240468-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240469-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240474-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240476-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240478-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240483-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240484-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240514-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240515-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240516-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240620-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240622-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240624-1
- https://www.suse.com/support/update/announcement/2024/suse-su-20240639-1
Related Tags
Share with