SUSE Linux Kernel Multiple Vulnerabilities
Last Update Date:
3 Dec 2024 11:00
Release Date:
3 Dec 2024
426
Views
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, sensitive information disclosure, remote code execution and security restriction bypass on the targeted system.
Impact
- Denial of Service
- Information Disclosure
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- openSUSE Leap 15.3
- openSUSE Leap 15.4
- openSUSE Leap 15.5
- SUSE Enterprise Storage 7.1
- SUSE Linux Enterprise Desktop 15 SP4 LTSS
- SUSE Linux Enterprise High Availability Extension 15 SP3
- SUSE Linux Enterprise High Availability Extension 15 SP4
- SUSE Linux Enterprise High Performance Computing 15 SP3
- SUSE Linux Enterprise High Performance Computing 15 SP4
- SUSE Linux Enterprise High Performance Computing 15 SP5
- SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
- SUSE Linux Enterprise Live Patching 15-SP3
- SUSE Linux Enterprise Live Patching 15-SP4
- SUSE Linux Enterprise Live Patching 15-SP5
- SUSE Linux Enterprise Live Patching 15-SP6
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.3
- SUSE Linux Enterprise Micro 5.4
- SUSE Linux Enterprise Micro 5.5
- SUSE Linux Enterprise Micro for Rancher 5.2
- SUSE Linux Enterprise Micro for Rancher 5.3
- SUSE Linux Enterprise Micro for Rancher 5.4
- SUSE Linux Enterprise Real Time 15 SP4
- SUSE Linux Enterprise Real Time 15 SP5
- SUSE Linux Enterprise Real Time 15 SP6
- SUSE Linux Enterprise Server 15 SP3
- SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
- SUSE Linux Enterprise Server 15 SP3 LTSS
- SUSE Linux Enterprise Server 15 SP4
- SUSE Linux Enterprise Server 15 SP4 LTSS
- SUSE Linux Enterprise Server 15 SP5
- SUSE Linux Enterprise Server 15 SP6
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
- SUSE Linux Enterprise Server for SAP Applications 15 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP6
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2024/suse-su-20244141-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244139-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244131-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244129-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244128-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244127-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244125-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244124-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244123-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244122-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244120-1/
Vulnerability Identifier
- CVE-2021-47416
- CVE-2021-47517
- CVE-2021-47534
- CVE-2021-47589
- CVE-2021-47598
- CVE-2022-3435
- CVE-2022-45934
- CVE-2022-48651
- CVE-2022-48662
- CVE-2022-48664
- CVE-2022-48879
- CVE-2022-48946
- CVE-2022-48947
- CVE-2022-48948
- CVE-2022-48949
- CVE-2022-48951
- CVE-2022-48953
- CVE-2022-48954
- CVE-2022-48955
- CVE-2022-48956
- CVE-2022-48959
- CVE-2022-48960
- CVE-2022-48961
- CVE-2022-48962
- CVE-2022-48967
- CVE-2022-48968
- CVE-2022-48969
- CVE-2022-48970
- CVE-2022-48971
- CVE-2022-48972
- CVE-2022-48973
- CVE-2022-48975
- CVE-2022-48977
- CVE-2022-48978
- CVE-2022-48981
- CVE-2022-48985
- CVE-2022-48987
- CVE-2022-48988
- CVE-2022-48991
- CVE-2022-48992
- CVE-2022-48994
- CVE-2022-48995
- CVE-2022-48997
- CVE-2022-48999
- CVE-2022-49000
- CVE-2022-49002
- CVE-2022-49003
- CVE-2022-49005
- CVE-2022-49006
- CVE-2022-49007
- CVE-2022-49010
- CVE-2022-49011
- CVE-2022-49012
- CVE-2022-49014
- CVE-2022-49015
- CVE-2022-49016
- CVE-2022-49019
- CVE-2022-49021
- CVE-2022-49022
- CVE-2022-49023
- CVE-2022-49024
- CVE-2022-49025
- CVE-2022-49026
- CVE-2022-49027
- CVE-2022-49028
- CVE-2022-49029
- CVE-2022-49031
- CVE-2022-49032
- CVE-2023-2166
- CVE-2023-6270
- CVE-2023-6546
- CVE-2023-28327
- CVE-2023-46343
- CVE-2023-52340
- CVE-2023-52502
- CVE-2023-52752
- CVE-2023-52766
- CVE-2023-52800
- CVE-2023-52846
- CVE-2023-52881
- CVE-2023-52919
- CVE-2024-23307
- CVE-2024-26585
- CVE-2024-26610
- CVE-2024-26622
- CVE-2024-26766
- CVE-2024-26828
- CVE-2024-26852
- CVE-2024-26923
- CVE-2024-26930
- CVE-2024-27043
- CVE-2024-27398
- CVE-2024-35817
- CVE-2024-35861
- CVE-2024-35862
- CVE-2024-35863
- CVE-2024-35864
- CVE-2024-35867
- CVE-2024-35905
- CVE-2024-35949
- CVE-2024-35950
- CVE-2024-36899
- CVE-2024-36904
- CVE-2024-36964
- CVE-2024-40909
- CVE-2024-40954
- CVE-2024-41059
- CVE-2024-42145
- CVE-2024-43854
- CVE-2024-43861
- CVE-2024-44947
- CVE-2024-45013
- CVE-2024-45016
- CVE-2024-45026
- CVE-2024-46716
- CVE-2024-46813
- CVE-2024-46814
- CVE-2024-46815
- CVE-2024-46816
- CVE-2024-46817
- CVE-2024-46818
- CVE-2024-46849
- CVE-2024-47668
- CVE-2024-47674
- CVE-2024-47684
- CVE-2024-47706
- CVE-2024-47747
- CVE-2024-47748
- CVE-2024-49860
- CVE-2024-49867
- CVE-2024-49925
- CVE-2024-49930
- CVE-2024-49936
- CVE-2024-49945
- CVE-2024-49960
- CVE-2024-49969
- CVE-2024-49974
- CVE-2024-49982
- CVE-2024-49991
- CVE-2024-49995
- CVE-2024-50047
- CVE-2024-50208
Source
Related Link
- https://www.suse.com/support/update/announcement/2024/suse-su-20244141-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244139-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244131-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244129-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244128-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244127-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244125-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244124-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244123-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244122-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20244120-1/
Related Tags
Share with