SUSE Linux Kernel Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.
[Updated on 2024-10-09]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
[Updated on 2024-10-14]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
Impact
- Security Restriction Bypass
- Denial of Service
- Remote Code Execution
- Information Disclosure
- Data Manipulation
System / Technologies affected
- Basesystem Module 15-SP5
- Confidential Computing Module 15-SP6
- Development Tools Module 15-SP5
- Legacy Module 15-SP5
- Public Cloud Module 15-SP5
- Public Cloud Module 15-SP6
- SUSE Enterprise Storage 7.1
- SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
- SUSE Linux Enterprise Desktop 15 SP5
- SUSE Linux Enterprise High Availability Extension 12 SP5
- SUSE Linux Enterprise High Availability Extension 15 SP2
- SUSE Linux Enterprise High Availability Extension 15 SP3
- SUSE Linux Enterprise High Availability Extension 15 SP4
- SUSE Linux Enterprise High Availability Extension 15 SP5
- SUSE Linux Enterprise High Performance Computing 12 SP5
- SUSE Linux Enterprise High Performance Computing 15 SP2
- SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise High Performance Computing 15 SP3
- SUSE Linux Enterprise High Performance Computing 15 SP4
- SUSE Linux Enterprise High Performance Computing 15 SP5
- SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
- SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
- SUSE Linux Enterprise Live Patching 12-SP5
- SUSE Linux Enterprise Live Patching 15-SP2
- SUSE Linux Enterprise Live Patching 15-SP3
- SUSE Linux Enterprise Live Patching 15-SP4
- SUSE Linux Enterprise Live Patching 15-SP5
- SUSE Linux Enterprise Live Patching 15-SP6
- SUSE Linux Enterprise Micro 5.1
- SUSE Linux Enterprise Micro 5.2
- SUSE Linux Enterprise Micro 5.3
- SUSE Linux Enterprise Micro 5.4
- SUSE Linux Enterprise Micro 5.5
- SUSE Linux Enterprise Micro for Rancher 5.2
- SUSE Linux Enterprise Micro for Rancher 5.3
- SUSE Linux Enterprise Micro for Rancher 5.4
- SUSE Linux Enterprise Real Time 12 SP5
- SUSE Linux Enterprise Real Time 15 SP4
- SUSE Linux Enterprise Real Time 15 SP5
- SUSE Linux Enterprise Real Time 15 SP6
- SUSE Linux Enterprise Server 12 SP5
- SUSE Linux Enterprise Server 15 SP2
- SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
- SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
- SUSE Linux Enterprise Server 15 SP3
- SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
- SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
- SUSE Linux Enterprise Server 15 SP4
- SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
- SUSE Linux Enterprise Server 15 SP5
- SUSE Linux Enterprise Server 15 SP6
- SUSE Linux Enterprise Server for SAP Applications 12 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP2
- SUSE Linux Enterprise Server for SAP Applications 15 SP3
- SUSE Linux Enterprise Server for SAP Applications 15 SP4
- SUSE Linux Enterprise Server for SAP Applications 15 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP6
- SUSE Linux Enterprise Software Development Kit 12 SP5
- SUSE Linux Enterprise Workstation Extension 12 12-SP5
- SUSE Linux Enterprise Workstation Extension 15 SP5
- SUSE Manager Proxy 4.1
- SUSE Manager Proxy 4.2
- SUSE Manager Proxy 4.3
- SUSE Manager Retail Branch Server 4.1
- SUSE Manager Retail Branch Server 4.2
- SUSE Manager Retail Branch Server 4.3
- SUSE Manager Server 4.1
- SUSE Manager Server 4.2
- SUSE Manager Server 4.3
- SUSE Real Time Module 15-SP5
- SUSE Real Time Module 15-SP6
- openSUSE Leap 15.3
- openSUSE Leap 15.4
- openSUSE Leap 15.5
- openSUSE Leap 15.6
- openSUSE Leap Micro 5.5
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://www.suse.com/support/update/announcement/2024/suse-su-20243499-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243547-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243551-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243553-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243559-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243563-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243564-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243565-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243566-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243567-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243569-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243585-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243587-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243591-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243592-1/
Vulnerability Identifier
- CVE-2021-4442
- CVE-2021-47069
- CVE-2021-47387
- CVE-2021-47408
- CVE-2021-47620
- CVE-2021-47622
- CVE-2022-48686
- CVE-2022-48788
- CVE-2022-48789
- CVE-2022-48790
- CVE-2022-48791
- CVE-2022-48799
- CVE-2022-48844
- CVE-2022-48872
- CVE-2022-48873
- CVE-2022-48901
- CVE-2022-48911
- CVE-2022-48912
- CVE-2022-48919
- CVE-2022-48923
- CVE-2022-48935
- CVE-2022-48943
- CVE-2022-48944
- CVE-2022-48945
- CVE-2023-52610
- CVE-2023-52752
- CVE-2023-52766
- CVE-2023-52854
- CVE-2023-52915
- CVE-2023-52916
- CVE-2024-26640
- CVE-2024-26759
- CVE-2024-26767
- CVE-2024-26804
- CVE-2024-26837
- CVE-2024-27024
- CVE-2024-36953
- CVE-2024-36971
- CVE-2024-37353
- CVE-2024-38381
- CVE-2024-38538
- CVE-2024-38596
- CVE-2024-38632
- CVE-2024-40910
- CVE-2024-40965
- CVE-2024-40973
- CVE-2024-40983
- CVE-2024-41000
- CVE-2024-41062
- CVE-2024-41073
- CVE-2024-41079
- CVE-2024-41082
- CVE-2024-41087
- CVE-2024-42154
- CVE-2024-42232
- CVE-2024-42243
- CVE-2024-42252
- CVE-2024-42259
- CVE-2024-42265
- CVE-2024-42271
- CVE-2024-42294
- CVE-2024-42301
- CVE-2024-42304
- CVE-2024-42305
- CVE-2024-42306
- CVE-2024-43828
- CVE-2024-43832
- CVE-2024-43835
- CVE-2024-43845
- CVE-2024-43861
- CVE-2024-43870
- CVE-2024-43882
- CVE-2024-43883
- CVE-2024-43884
- CVE-2024-43886
- CVE-2024-43890
- CVE-2024-43898
- CVE-2024-43904
- CVE-2024-43912
- CVE-2024-43914
- CVE-2024-44935
- CVE-2024-44944
- CVE-2024-44946
- CVE-2024-44947
- CVE-2024-44948
- CVE-2024-44950
- CVE-2024-44951
- CVE-2024-44952
- CVE-2024-44954
- CVE-2024-44960
- CVE-2024-44961
- CVE-2024-44962
- CVE-2024-44965
- CVE-2024-44967
- CVE-2024-44969
- CVE-2024-44970
- CVE-2024-44971
- CVE-2024-44972
- CVE-2024-44977
- CVE-2024-44982
- CVE-2024-44984
- CVE-2024-44985
- CVE-2024-44986
- CVE-2024-44987
- CVE-2024-44988
- CVE-2024-44989
- CVE-2024-44990
- CVE-2024-44991
- CVE-2024-44997
- CVE-2024-44998
- CVE-2024-44999
- CVE-2024-45000
- CVE-2024-45001
- CVE-2024-45002
- CVE-2024-45003
- CVE-2024-45005
- CVE-2024-45006
- CVE-2024-45007
- CVE-2024-45008
- CVE-2024-45011
- CVE-2024-45012
- CVE-2024-45013
- CVE-2024-45015
- CVE-2024-45017
- CVE-2024-45018
- CVE-2024-45019
- CVE-2024-45020
- CVE-2024-45021
- CVE-2024-45022
- CVE-2024-45023
- CVE-2024-45026
- CVE-2024-45028
- CVE-2024-45029
- CVE-2024-45030
- CVE-2024-46672
- CVE-2024-46673
- CVE-2024-46674
- CVE-2024-46675
- CVE-2024-46676
- CVE-2024-46677
- CVE-2024-46678
- CVE-2024-46679
- CVE-2024-46685
- CVE-2024-46686
- CVE-2024-46687
- CVE-2024-46689
- CVE-2024-46691
- CVE-2024-46692
- CVE-2024-46693
- CVE-2024-46694
- CVE-2024-46695
- CVE-2024-46702
- CVE-2024-46706
- CVE-2024-46707
- CVE-2024-46709
- CVE-2024-46710
- CVE-2024-46711
- CVE-2024-46714
- CVE-2024-46715
- CVE-2024-46716
- CVE-2024-46717
- CVE-2024-46719
- CVE-2024-46720
- CVE-2024-46721
- CVE-2024-46722
- CVE-2024-46723
- CVE-2024-46724
- CVE-2024-46725
- CVE-2024-46726
- CVE-2024-46727
- CVE-2024-46728
- CVE-2024-46729
- CVE-2024-46730
- CVE-2024-46731
- CVE-2024-46732
- CVE-2024-46734
- CVE-2024-46735
- CVE-2024-46737
- CVE-2024-46738
- CVE-2024-46739
- CVE-2024-46741
- CVE-2024-46743
- CVE-2024-46744
- CVE-2024-46745
- CVE-2024-46746
- CVE-2024-46747
- CVE-2024-46749
- CVE-2024-46750
- CVE-2024-46751
- CVE-2024-46752
- CVE-2024-46753
- CVE-2024-46755
- CVE-2024-46756
- CVE-2024-46757
- CVE-2024-46758
- CVE-2024-46759
- CVE-2024-46760
- CVE-2024-46761
- CVE-2024-46767
- CVE-2024-46770
- CVE-2024-46771
- CVE-2024-46772
- CVE-2024-46773
- CVE-2024-46774
- CVE-2024-46775
- CVE-2024-46776
- CVE-2024-46778
- CVE-2024-46780
- CVE-2024-46781
- CVE-2024-46783
- CVE-2024-46784
- CVE-2024-46786
- CVE-2024-46787
- CVE-2024-46791
- CVE-2024-46794
- CVE-2024-46797
- CVE-2024-46798
- CVE-2024-46822
- CVE-2024-46826
- CVE-2024-46830
- CVE-2024-46853
- CVE-2024-46854
- CVE-2024-46855
- CVE-2024-46857
- CVE-2024-46859
Source
Related Link
- https://www.suse.com/support/update/announcement/2024/suse-su-20243499-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243547-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243551-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243553-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243559-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243563-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243564-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243565-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243566-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243567-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243569-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243585-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243587-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243591-1/
- https://www.suse.com/support/update/announcement/2024/suse-su-20243592-1/
Related Tags
Share with