SUSE update for the Linux Kernel



Published: 2024-07-09
Risk High
Patch available YES
Number of vulnerabilities 37
CVE-ID CVE-2020-10135
CVE-2021-43389
CVE-2021-4439
CVE-2021-47247
CVE-2021-47311
CVE-2021-47328
CVE-2021-47368
CVE-2021-47372
CVE-2021-47379
CVE-2021-47571
CVE-2021-47583
CVE-2022-0435
CVE-2022-22942
CVE-2022-2938
CVE-2022-48711
CVE-2022-48760
CVE-2022-48771
CVE-2023-24023
CVE-2023-52707
CVE-2023-52752
CVE-2023-52881
CVE-2024-26921
CVE-2024-26923
CVE-2024-35789
CVE-2024-35861
CVE-2024-35862
CVE-2024-35864
CVE-2024-35878
CVE-2024-35950
CVE-2024-36894
CVE-2024-36904
CVE-2024-36940
CVE-2024-36964
CVE-2024-38541
CVE-2024-38545
CVE-2024-38559
CVE-2024-38560
CWE-ID CWE-300
CWE-129
CWE-125
CWE-416
CWE-399
CWE-908
CWE-121
CWE-264
CWE-20
CWE-119
CWE-347
CWE-451
CWE-191
CWE-667
CWE-476
CWE-415
CWE-269
Exploitation vector Network
Public exploit Vulnerability #13 is being exploited in the wild.
Public exploit code for vulnerability #18 is available.
Vulnerable software
Subscribe
SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux
Operating systems & Components / Operating system

SUSE Linux Enterprise High Availability Extension 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15 SP2 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

reiserfs-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-default
Operating systems & Components / Operating system package or component

kernel-docs
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-macros
Operating systems & Components / Operating system package or component

kernel-preempt-debugsource
Operating systems & Components / Operating system package or component

kernel-default-base
Operating systems & Components / Operating system package or component

kernel-default-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-obs-build-debugsource
Operating systems & Components / Operating system package or component

kernel-preempt-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-obs-build
Operating systems & Components / Operating system package or component

kernel-preempt-debuginfo
Operating systems & Components / Operating system package or component

kernel-syms
Operating systems & Components / Operating system package or component

kernel-preempt-devel
Operating systems & Components / Operating system package or component

kernel-default-devel
Operating systems & Components / Operating system package or component

kernel-preempt
Operating systems & Components / Operating system package or component

dlm-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-default
Operating systems & Components / Operating system package or component

gfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-default
Operating systems & Components / Operating system package or component

ocfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-default
Operating systems & Components / Operating system package or component

cluster-md-kmp-default
Operating systems & Components / Operating system package or component

kernel-default-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-livepatch
Operating systems & Components / Operating system package or component

kernel-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP2_Update_50-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-5_3_18-150200_24_197-default
Operating systems & Components / Operating system package or component

kernel-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 37 vulnerabilities.

1) Man-in-the-Middle (MitM) attack

EUVDB-ID: #VU28001

Risk: Medium

CVSSv3.1: 4.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-10135

CWE-ID: CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a Man-in-the-Middle (MitM) attack.

The vulnerability exists in the implementation of Bluetooth v5.0, v4.2, v4.1, v4.0 on devices manufactured by multiple vendors. A remote attacker with physical proximity to the victim can successful perform a MitM attack even against previously paired devices and gain access to sensitive information.

Below is the list of chips and devices, confirmed to be vulnerable:

Chip Device
Bluetooth v5.0
Apple 339S00397 iPhone 8
CYW20819 CYW920819EVB-02
Intel 9560 ThinkPad L390
Snapdragon 630 Nokia 7
Snapdragon 636 Nokia X6
Snapdragon 835 Pixel 2
Snapdragon 845 Pixel 3, OnePlus 6
Bluetooth v4.2
Apple 339S00056 MacBookPro 2017
Apple 339S00199 iPhone 7plus
Apple 339S00448 iPad 2018
CSR 11393 Sennheiser PXC 550
Exynos 7570 Galaxy J3 2017
Intel 7265 ThinkPad X1 3rd
Intel 8260 HP ProBook 430 G3
Bluetooth v4.1
CYW4334 iPhone 5s
CYW4339 Nexus 5, iPhone 6
CYW43438 RPi 3B+
Snapdragon 210 LG K4
Snapdragon 410 Motorola G3, Galaxy J5
Bluetooth <= v4.0
BCM20730 ThinkPad 41U5008
BCM4329B1 iPad MC349LL
CSR 6530 PLT BB903+
CSR 8648 Philips SHB7250
Exynos 3470 Galaxy S5 mini
Exynos 3475 Galaxy J3 2016
Intel 1280 Lenovo U430
Intel 6205 ThinkPad X230
Snapdragon 200 Lumia 530

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Validation of Array Index

EUVDB-ID: #VU63385

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-43389

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to improper validation of array index in the ISDN CAPI implementation within detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds read

EUVDB-ID: #VU92900

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-4439

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU90090

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47247

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5e_take_all_route_decap_flows() and mlx5e_encap_valid() functions in drivers/net/ethernet/mellanox/mlx5/core/en/tc_tun_encap.c, within the wait_for_completion() and mlx5e_take_all_encap_flows() functions in drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c, within the mlx5e_rep_neigh_update() and mlx5e_rep_update_flows() functions in drivers/net/ethernet/mellanox/mlx5/core/en/rep/neigh.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU90103

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47311

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the emac_remove() function in drivers/net/ethernet/qualcomm/emac/emac.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU91060

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47328

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the iscsi_prep_bidi_ahs(), iscsi_check_tmf_restrictions(), iscsi_data_in_rsp(), EXPORT_SYMBOL_GPL(), iscsi_exec_task_mgmt_fn(), iscsi_eh_abort(), iscsi_eh_device_reset(), iscsi_session_recovery_timedout(), iscsi_conn_failure(), iscsi_eh_target_reset(), iscsi_session_setup(), iscsi_conn_setup(), iscsi_conn_teardown(), iscsi_conn_start() and iscsi_start_session_recovery() functions in drivers/scsi/libiscsi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU93188

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47368

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the enetc_clear_bdrs() and enetc_setup_irqs() functions in drivers/net/ethernet/freescale/enetc/enetc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU90136

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47372

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the macb_remove() function in drivers/net/ethernet/cadence/macb_pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use-after-free

EUVDB-ID: #VU90139

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47379

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the spin_lock_irq() and blkcg_deactivate_policy() functions in block/blk-cgroup.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU91051

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47571

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the _rtl92e_pci_disconnect() function in drivers/staging/rtl8192e/rtl8192e/rtl_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use of uninitialized resource

EUVDB-ID: #VU92933

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-47583

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mxl111sf_init() and mxl111sf_get_stream_config_dvbt() functions in drivers/media/usb/dvb-usb-v2/mxl111sf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Stack-based buffer overflow

EUVDB-ID: #VU61216

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-0435

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Linux kernel networking module for the Transparent Inter-Process Communication (TIPC) protocol. A remote unauthenticated attacker can send specially crafted traffic to the system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the TIPC bearer is set up.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU61217

Risk: Low

CVSSv3.1: 7.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2022-22942

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an error in the vmwgfx driver in Linux kernel. A local unprivileged user can gain access to files opened by other processes on the system through a dangling 'file' pointer.

Exploiting this vulnerability requires an attacker to have access to either /dev/dri/card0 or /dev/dri/rendererD128 and be able to issue an ioctl() on the resulting file descriptor.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

14) Use-after-free

EUVDB-ID: #VU67513

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-2938

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in Linux kernel implementation of Pressure Stall Information. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Input validation error

EUVDB-ID: #VU92925

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48711

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the tipc_mon_rcv() function in net/tipc/monitor.c, within the tipc_link_proto_rcv() function in net/tipc/link.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Buffer overflow

EUVDB-ID: #VU92976

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48760

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the usb_kill_urb() and usb_poison_urb() functions in drivers/usb/core/urb.c, within the __usb_hcd_giveback_urb() function in drivers/usb/core/hcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use-after-free

EUVDB-ID: #VU92899

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48771

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vmw_kms_helper_buffer_finish() function in drivers/gpu/drm/vmwgfx/vmwgfx_kms.c, within the vmw_fence_event_ioctl() function in drivers/gpu/drm/vmwgfx/vmwgfx_fence.c, within the vmw_execbuf_fence_commands(), vmw_execbuf_copy_fence_user() and vmw_execbuf_process() functions in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Improper Verification of Cryptographic Signature

EUVDB-ID: #VU83116

Risk: Medium

CVSSv3.1: 6.1 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-24023

CWE-ID: CWE-347 - Improper Verification of Cryptographic Signature

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a MitM attack.

The vulnerability exists due to improper verification of cryptographic signature in bluetooth implementation. A remote attacker with physical proximity to the system can perform MitM attack and potentially compromise the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

19) Use-after-free

EUVDB-ID: #VU90064

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52707

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the psi_trigger_destroy() function in kernel/sched/psi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Use-after-free

EUVDB-ID: #VU90068

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52752

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the seq_printf() and spin_unlock() functions in fs/smb/client/cifs_debug.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Spoofing attack

EUVDB-ID: #VU89895

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52881

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error within the tcp_ack() function in net/ipv4/tcp_input.c, which can result in system accepting ACK responses for bytes that were never sent. A remote attacker can perform spoofing attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Integer underflow

EUVDB-ID: #VU91672

Risk: Low

CVSSv3.1: 6.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26921

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the nf_ct_frag6_queue() and nf_ct_frag6_gather() functions in net/ipv6/netfilter/nf_conntrack_reasm.c, within the ip_frag_queue() and ip_defrag() functions in net/ipv4/ip_fragment.c, within the FRAG_CB(), inet_frag_queue_insert(), inet_frag_reasm_prepare(), EXPORT_SYMBOL() and inet_frag_reasm_finish() functions in net/ipv4/inet_fragment.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Improper locking

EUVDB-ID: #VU92035

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26923

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper locking within the unix_gc() function in net/unix/garbage.c due to garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. A local user can execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU90167

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35789

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ieee80211_change_station() function in net/mac80211/cfg.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Use-after-free

EUVDB-ID: #VU90150

Risk: Medium

CVSSv3.1: 5 [AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35861

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the cifs_signal_cifsd_for_reconnect() function in fs/smb/client/connect.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use-after-free

EUVDB-ID: #VU90152

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35862

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the smb2_is_network_name_deleted() function in fs/smb/client/smb2ops.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Use-after-free

EUVDB-ID: #VU90149

Risk: Medium

CVSSv3.1: 5 [AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35864

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the smb2_is_valid_lease_break() function in fs/smb/client/smb2misc.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) NULL pointer dereference

EUVDB-ID: #VU90508

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35878

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the of_modalias() function in drivers/of/module.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Use-after-free

EUVDB-ID: #VU92212

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-35950

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Improper locking

EUVDB-ID: #VU90735

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36894

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ffs_user_copy_worker() and ffs_epfile_async_io_complete() functions in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Use-after-free

EUVDB-ID: #VU90047

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36904

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tcp_twsk_unique() function in net/ipv4/tcp_ipv4.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Double Free

EUVDB-ID: #VU90885

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36940

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the pinctrl_enable() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Improper privilege management

EUVDB-ID: #VU93734

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36964

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the p9mode2perm() function in fs/9p/vfs_inode.c. A local user can read and manipulate data.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Buffer overflow

EUVDB-ID: #VU92376

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38541

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the of_modalias() function in drivers/of/module.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Use-after-free

EUVDB-ID: #VU92306

Risk: Low

CVSSv3.1: 7.7 [AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38545

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the alloc_cqc(), free_cqc() and hns_roce_cq_event() functions in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Out-of-bounds read

EUVDB-ID: #VU92328

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38559

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the qedf_dbg_debug_cmd_write() function in drivers/scsi/qedf/qedf_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Out-of-bounds read

EUVDB-ID: #VU92327

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38560

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bfad_debugfs_write_regrd() and bfad_debugfs_write_regwr() functions in drivers/scsi/bfa/bfad_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP2

SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2

SUSE Linux Enterprise High Availability Extension 15: SP2

SUSE Linux Enterprise Server for SAP Applications 15: SP2

SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise Server 15: SP2

SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2

SUSE Linux Enterprise High Performance Computing 15: SP2

SUSE Manager Server: 4.1

SUSE Manager Retail Branch Server: 4.1

SUSE Manager Proxy: 4.1

reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

reiserfs-kmp-default: before 5.3.18-150200.24.197.1

kernel-docs: before 5.3.18-150200.24.197.1

kernel-devel: before 5.3.18-150200.24.197.1

kernel-source: before 5.3.18-150200.24.197.1

kernel-macros: before 5.3.18-150200.24.197.1

kernel-preempt-debugsource: before 5.3.18-150200.24.197.1

kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1

kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1

kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1

kernel-obs-build: before 5.3.18-150200.24.197.1

kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1

kernel-syms: before 5.3.18-150200.24.197.1

kernel-preempt-devel: before 5.3.18-150200.24.197.1

kernel-default-devel: before 5.3.18-150200.24.197.1

kernel-preempt: before 5.3.18-150200.24.197.1

dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

gfs2-kmp-default: before 5.3.18-150200.24.197.1

gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

dlm-kmp-default: before 5.3.18-150200.24.197.1

ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1

ocfs2-kmp-default: before 5.3.18-150200.24.197.1

cluster-md-kmp-default: before 5.3.18-150200.24.197.1

kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1

kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1

kernel-default-livepatch: before 5.3.18-150200.24.197.1

kernel-default-debuginfo: before 5.3.18-150200.24.197.1

kernel-default-debugsource: before 5.3.18-150200.24.197.1

kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1

kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1

kernel-default: before 5.3.18-150200.24.197.1

External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###