[SUSE-SU-2023:2805-1] Security update for the Linux Kernel
Severity
Important
Affected Packages
7
CVEs
38
Security update for the Linux Kernel
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).
- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- Drop dvb-core fix patch due to regression (bsc#1205758).
- Revert CVE-2018-20784 due to regression (bsc#1126703).
- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).
- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).
- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (CVE-2023-1989 bsc#1210336).
- btrfs: fix race between quota disable and quota assign ioctls (CVE-2023-1611 bsc#1209687).
- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT (bsc#1207036 CVE-2023-23454 bsc#1207125 CVE-2023-23455).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878 bsc#1211105 CVE-2023-2513).
- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).
- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).
- fix a mistake in the CVE-2023-0590 / bsc#1207795 backport
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (bsc#1210715 CVE-2023-2194).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- ipvlan:Fix out-of-bounds caused by unclear skb->cb (bsc#1212842 CVE-2023-3090).
- kernel/sys.c: fix potential Spectre v1 issue (bsc#1209256 CVE-2017-5753).
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).
- media: dvb-core: Fix use-after-free due on race condition at dvb_net (CVE-2022-45886 bsc#1205760).
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend (CVE-2022-45885 bsc#1205758).
- media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() (bsc#1209291 CVE-2023-28328).
- media: dvb_frontend: kABI workaround (CVE-2022-45885 bsc#1205758).
- media: dvb_net: kABI workaround (CVE-2022-45886 bsc#1205760).
- media: dvbdev: fix error logic at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (CVE-2023-1118 bsc#1208837).
- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() (CVE-2022-45887 bsc#1205762).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).
- netfilter: nf_tables: fix null deref due to zeroed list head (CVE-2023-1095 bsc#1208777).
- netrom: Fix use-after-free caused by accept on already connected socket (bsc#1211186 CVE-2023-32269).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes bsc#1210337 CVE-2023-1990).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (CVE-2023-30772 bsc#1210329).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256 CVE-2017-5753).
- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (bsc#1210647 CVE-2023-2162).
- seq_buf: Fix overflow in seq_buf_putmem_hex() (bsc#1209549 CVE-2023-28772).
- tcp: Fix data races around icsk->icsk_af_ops (bsc#1204405 CVE-2022-3566).
- tipc: fix NULL deref in tipc_link_xmit() (bsc#1209289 CVE-2023-1390).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (bsc#1209287 CVE-2023-1380).
- x86/speculation: Allow enabling STIBP with legacy IBRS (bsc#1210506 CVE-2023-1998).
- xfs: verify buffer contents when we skip log replay (bsc#1210498 CVE-2023-2124).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (bsc#1209871 CVE-2023-1670).
Package | Affected Version |
---|---|
pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=2 | < 4.4.121-92.205.1 |
- ID
- SUSE-SU-2023:2805-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232805-1/
- Published
-
2023-07-11T04:31:55
(14 months ago) - Modified
-
2023-07-11T04:31:55
(14 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2018-956
- ALAS-2021-1480
- ALAS-2021-1539
- ALAS-2023-1701
- ALAS-2023-1735
- ALAS-2023-1744
- ALAS-2024-1899
- ALAS-2024-1942
- ALAS2-2018-956
- ALAS2-2021-1600
- ALAS2-2021-1696
- ALAS2-2022-1838
- ALAS2-2023-1932
- ALAS2-2023-1987
- ALAS2-2023-2027
- ALAS2-2023-2035
- ALAS2-2023-2100
- ALAS2-2024-2391
- ALAS2-2024-2588
- ALPINE:CVE-2017-5753
- ALSA-2023:2458
- ALSA-2023:2951
- ALSA-2023:3723
- ALSA-2023:4377
- ALSA-2023:4517
- ALSA-2023:5244
- ALSA-2023:7077
- ALSA-2023:7549
- ALSA-2024:0113
- ALSA-2024:3138
- CISCO-SA-20180104-CPUSIDECHANNEL
- DSA-4187-1
- DSA-4188-1
- DSA-5324-1
- DSA-5402-1
- DSA-5448-1
- DSA-5480-1
- DSA-5492-1
- ELSA-2018-0007
- ELSA-2018-0008
- ELSA-2018-0292
- ELSA-2018-4004
- ELSA-2018-4020
- ELSA-2018-4022
- ELSA-2018-4285
- ELSA-2018-4289
- ELSA-2019-4585
- ELSA-2019-4668
- ELSA-2019-4785
- ELSA-2023-12160
- ELSA-2023-12196
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-12232
- ELSA-2023-12323
- ELSA-2023-12375
- ELSA-2023-12565
- ELSA-2023-12566
- ELSA-2023-12688
- ELSA-2023-12842
- ELSA-2023-12974
- ELSA-2023-13001
- ELSA-2023-13005
- ELSA-2023-13043
- ELSA-2023-2458
- ELSA-2023-2951
- ELSA-2023-3723
- ELSA-2023-4377
- ELSA-2023-4517
- ELSA-2023-5244
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7549
- ELSA-2024-12069
- ELSA-2024-12110
- ELSA-2024-12150
- ELSA-2024-12354
- ELSA-2024-12610
- ELSA-2024-12612
- ELSA-2024-1831
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2018-0590e4af13
- FEDORA-2018-690989736a
- FEDORA-2023-00393126a0
- FEDORA-2023-26325e5399
- FEDORA-2023-98251cef79
- FEDORA-2023-c46eb02bbf
- FEDORA-2023-d525cf5272
- FEDORA-2023-dfd4a6e8f2
- FREEBSD:1CE95BC7-3278-11E8-B527-00012E582166
- GLSA-201810-06
- MS:CVE-2023-1095
- MS:CVE-2023-1118
- MS:CVE-2023-1513
- MS:CVE-2023-23454
- MS:CVE-2023-23455
- MS:CVE-2023-2513
- MS:CVE-2023-3090
- MS:CVE-2023-31436
- openSUSE-SU-2021:1212-1
- openSUSE-SU-2021:2861-1
- RHSA-2018:0016
- RHSA-2018:0151
- RHSA-2018:0512
- RHSA-2019:1959
- RHSA-2019:1971
- RHSA-2021:1578
- RHSA-2021:1739
- RHSA-2022:7933
- RHSA-2022:8267
- RHSA-2023:2148
- RHSA-2023:2458
- RHSA-2023:2736
- RHSA-2023:2951
- RHSA-2023:3708
- RHSA-2023:3723
- RHSA-2023:4377
- RHSA-2023:4378
- RHSA-2023:4380
- RHSA-2023:4517
- RHSA-2023:4541
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5255
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2024:0113
- RHSA-2024:0134
- RHSA-2024:1323
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2023:4517
- RLSA-2023:5244
- RLSA-2023:7549
- RLSA-2024:3138
- SSA:2018-057-01
- SSA:2023-048-01
- SSA:2023-172-02
- SSA:2023-325-01
- SUSE-SU-2018:0010-1
- SUSE-SU-2018:0011-1
- SUSE-SU-2018:0012-1
- SUSE-SU-2018:0031-1
- SUSE-SU-2018:0040-1
- SUSE-SU-2018:0069-1
- SUSE-SU-2018:0113-1
- SUSE-SU-2018:0114-1
- SUSE-SU-2018:0115-1
- SUSE-SU-2018:0131-1
- SUSE-SU-2018:0171-1
- SUSE-SU-2018:0180-1
- SUSE-SU-2018:0213-1
- SUSE-SU-2018:0219-1
- SUSE-SU-2018:0285-1
- SUSE-SU-2018:0438-1
- SUSE-SU-2018:0472-1
- SUSE-SU-2018:0552-1
- SUSE-SU-2018:0552-2
- SUSE-SU-2018:0601-1
- SUSE-SU-2018:0609-1
- SUSE-SU-2018:0638-1
- SUSE-SU-2018:0678-1
- SUSE-SU-2018:0909-1
- SUSE-SU-2018:1368-1
- SUSE-SU-2018:1376-1
- SUSE-SU-2018:1603-1
- SUSE-SU-2018:1658-1
- SUSE-SU-2018:1699-1
- SUSE-SU-2018:1699-2
- SUSE-SU-2018:2092-1
- SUSE-SU-2018:2150-1
- SUSE-SU-2018:2222-1
- SUSE-SU-2018:2528-1
- SUSE-SU-2019:0222-1
- SUSE-SU-2019:0765-1
- SUSE-SU-2019:1550-1
- SUSE-SU-2019:2430-1
- SUSE-SU-2021:2861-1
- SUSE-SU-2021:2862-1
- SUSE-SU-2021:3929-1
- SUSE-SU-2022:2077-1
- SUSE-SU-2022:2082-1
- SUSE-SU-2022:4504-1
- SUSE-SU-2022:4585-1
- SUSE-SU-2022:4617-1
- SUSE-SU-2023:0145-1
- SUSE-SU-2023:0152-1
- SUSE-SU-2023:0406-1
- SUSE-SU-2023:0407-1
- SUSE-SU-2023:0410-1
- SUSE-SU-2023:0416-1
- SUSE-SU-2023:0420-1
- SUSE-SU-2023:0433-1
- SUSE-SU-2023:0485-1
- SUSE-SU-2023:0488-1
- SUSE-SU-2023:0591-1
- SUSE-SU-2023:0618-1
- SUSE-SU-2023:0634-1
- SUSE-SU-2023:0747-1
- SUSE-SU-2023:0749-1
- SUSE-SU-2023:0749-2
- SUSE-SU-2023:0762-1
- SUSE-SU-2023:0767-1
- SUSE-SU-2023:0768-1
- SUSE-SU-2023:0770-1
- SUSE-SU-2023:0774-1
- SUSE-SU-2023:0778-1
- SUSE-SU-2023:0779-1
- SUSE-SU-2023:0780-1
- SUSE-SU-2023:0852-1
- SUSE-SU-2023:1608-1
- SUSE-SU-2023:1609-1
- SUSE-SU-2023:1710-1
- SUSE-SU-2023:1800-1
- SUSE-SU-2023:1801-1
- SUSE-SU-2023:1802-1
- SUSE-SU-2023:1803-1
- SUSE-SU-2023:1811-1
- SUSE-SU-2023:1848-1
- SUSE-SU-2023:1892-1
- SUSE-SU-2023:1894-1
- SUSE-SU-2023:1895-1
- SUSE-SU-2023:1897-1
- SUSE-SU-2023:1971-1
- SUSE-SU-2023:1972-1
- SUSE-SU-2023:1973-1
- SUSE-SU-2023:1975-1
- SUSE-SU-2023:1977-1
- SUSE-SU-2023:1981-1
- SUSE-SU-2023:1982-1
- SUSE-SU-2023:1983-1
- SUSE-SU-2023:1992-1
- SUSE-SU-2023:1995-1
- SUSE-SU-2023:2007-1
- SUSE-SU-2023:2009-1
- SUSE-SU-2023:2023-1
- SUSE-SU-2023:2024-1
- SUSE-SU-2023:2031-1
- SUSE-SU-2023:2035-1
- SUSE-SU-2023:2043-1
- SUSE-SU-2023:2055-1
- SUSE-SU-2023:2140-1
- SUSE-SU-2023:2141-1
- SUSE-SU-2023:2146-1
- SUSE-SU-2023:2147-1
- SUSE-SU-2023:2148-1
- SUSE-SU-2023:2151-1
- SUSE-SU-2023:2156-1
- SUSE-SU-2023:2162-1
- SUSE-SU-2023:2163-1
- SUSE-SU-2023:2231-1
- SUSE-SU-2023:2232-1
- SUSE-SU-2023:2367-1
- SUSE-SU-2023:2368-1
- SUSE-SU-2023:2369-1
- SUSE-SU-2023:2371-1
- SUSE-SU-2023:2376-1
- SUSE-SU-2023:2384-1
- SUSE-SU-2023:2385-1
- SUSE-SU-2023:2386-1
- SUSE-SU-2023:2389-1
- SUSE-SU-2023:2395-1
- SUSE-SU-2023:2399-1
- SUSE-SU-2023:2401-1
- SUSE-SU-2023:2405-1
- SUSE-SU-2023:2413-1
- SUSE-SU-2023:2415-1
- SUSE-SU-2023:2416-1
- SUSE-SU-2023:2420-1
- SUSE-SU-2023:2422-1
- SUSE-SU-2023:2423-1
- SUSE-SU-2023:2425-1
- SUSE-SU-2023:2428-1
- SUSE-SU-2023:2429-1
- SUSE-SU-2023:2431-1
- SUSE-SU-2023:2442-1
- SUSE-SU-2023:2443-1
- SUSE-SU-2023:2448-1
- SUSE-SU-2023:2450-1
- SUSE-SU-2023:2453-1
- SUSE-SU-2023:2455-1
- SUSE-SU-2023:2459-1
- SUSE-SU-2023:2468-1
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2506-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2660-1
- SUSE-SU-2023:2666-1
- SUSE-SU-2023:2679-1
- SUSE-SU-2023:2680-1
- SUSE-SU-2023:2681-1
- SUSE-SU-2023:2686-1
- SUSE-SU-2023:2687-1
- SUSE-SU-2023:2689-1
- SUSE-SU-2023:2690-1
- SUSE-SU-2023:2694-1
- SUSE-SU-2023:2695-1
- SUSE-SU-2023:2697-1
- SUSE-SU-2023:2698-1
- SUSE-SU-2023:2700-1
- SUSE-SU-2023:2701-1
- SUSE-SU-2023:2702-1
- SUSE-SU-2023:2703-1
- SUSE-SU-2023:2708-1
- SUSE-SU-2023:2709-1
- SUSE-SU-2023:2710-1
- SUSE-SU-2023:2714-1
- SUSE-SU-2023:2718-1
- SUSE-SU-2023:2719-1
- SUSE-SU-2023:2720-1
- SUSE-SU-2023:2721-1
- SUSE-SU-2023:2724-1
- SUSE-SU-2023:2727-1
- SUSE-SU-2023:2731-1
- SUSE-SU-2023:2734-1
- SUSE-SU-2023:2735-1
- SUSE-SU-2023:2741-1
- SUSE-SU-2023:2743-1
- SUSE-SU-2023:2755-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2803-1
- SUSE-SU-2023:2804-1
- SUSE-SU-2023:2808-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2810-1
- SUSE-SU-2023:2820-1
- SUSE-SU-2023:2822-1
- SUSE-SU-2023:2830-1
- SUSE-SU-2023:2831-1
- SUSE-SU-2023:2834-1
- SUSE-SU-2023:2859-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:2892-1
- SUSE-SU-2023:3035-1
- SUSE-SU-2023:3046-1
- SUSE-SU-2023:3069-1
- SUSE-SU-2023:3073-1
- SUSE-SU-2023:3075-1
- SUSE-SU-2023:3081-1
- SUSE-SU-2023:3083-1
- SUSE-SU-2023:3104-1
- SUSE-SU-2023:3107-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3566-1
- SUSE-SU-2023:3571-1
- SUSE-SU-2023:3576-1
- SUSE-SU-2023:3582-1
- SUSE-SU-2023:3585-1
- SUSE-SU-2023:3592-1
- SUSE-SU-2023:3594-1
- SUSE-SU-2023:3595-1
- SUSE-SU-2023:3596-1
- SUSE-SU-2023:3603-1
- SUSE-SU-2023:3607-1
- SUSE-SU-2023:3612-1
- SUSE-SU-2023:3620-1
- SUSE-SU-2023:3621-1
- SUSE-SU-2023:3623-1
- SUSE-SU-2023:3627-1
- SUSE-SU-2023:3628-1
- SUSE-SU-2023:3629-1
- SUSE-SU-2023:3630-1
- SUSE-SU-2023:3631-1
- SUSE-SU-2023:3644-1
- SUSE-SU-2023:3647-1
- SUSE-SU-2023:3648-1
- SUSE-SU-2023:3657-1
- SUSE-SU-2023:3668-1
- SUSE-SU-2023:3671-1
- SUSE-SU-2023:3675-1
- SUSE-SU-2023:3676-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2024:0112-1
- USN-3516-1
- USN-3521-1
- USN-3530-1
- USN-3540-1
- USN-3540-2
- USN-3541-1
- USN-3541-2
- USN-3542-1
- USN-3542-2
- USN-3549-1
- USN-3580-1
- USN-3597-1
- USN-3597-2
- USN-4115-1
- USN-4118-1
- USN-4211-1
- USN-4211-2
- USN-5754-1
- USN-5754-2
- USN-5755-1
- USN-5755-2
- USN-5756-1
- USN-5756-2
- USN-5756-3
- USN-5757-1
- USN-5757-2
- USN-5758-1
- USN-5773-1
- USN-5774-1
- USN-5779-1
- USN-5789-1
- USN-5850-1
- USN-5851-1
- USN-5860-1
- USN-5876-1
- USN-5877-1
- USN-5878-1
- USN-5879-1
- USN-5915-1
- USN-5917-1
- USN-5924-1
- USN-5927-1
- USN-5934-1
- USN-5939-1
- USN-5940-1
- USN-5951-1
- USN-5975-1
- USN-5981-1
- USN-5982-1
- USN-5984-1
- USN-5987-1
- USN-5991-1
- USN-6000-1
- USN-6001-1
- USN-6004-1
- USN-6009-1
- USN-6013-1
- USN-6014-1
- USN-6024-1
- USN-6030-1
- USN-6031-1
- USN-6032-1
- USN-6033-1
- USN-6045-1
- USN-6071-1
- USN-6072-1
- USN-6079-1
- USN-6080-1
- USN-6081-1
- USN-6084-1
- USN-6085-1
- USN-6090-1
- USN-6091-1
- USN-6092-1
- USN-6094-1
- USN-6095-1
- USN-6096-1
- USN-6109-1
- USN-6118-1
- USN-6123-1
- USN-6124-1
- USN-6127-1
- USN-6130-1
- USN-6131-1
- USN-6132-1
- USN-6133-1
- USN-6134-1
- USN-6135-1
- USN-6149-1
- USN-6150-1
- USN-6162-1
- USN-6171-1
- USN-6172-1
- USN-6173-1
- USN-6175-1
- USN-6185-1
- USN-6186-1
- USN-6187-1
- USN-6206-1
- USN-6207-1
- USN-6221-1
- USN-6222-1
- USN-6223-1
- USN-6224-1
- USN-6228-1
- USN-6231-1
- USN-6235-1
- USN-6246-1
- USN-6250-1
- USN-6251-1
- USN-6252-1
- USN-6254-1
- USN-6255-1
- USN-6256-1
- USN-6260-1
- USN-6261-1
- USN-6283-1
- USN-6284-1
- USN-6300-1
- USN-6301-1
- USN-6311-1
- USN-6312-1
- USN-6314-1
- USN-6331-1
- USN-6332-1
- USN-6337-1
- USN-6340-1
- USN-6340-2
- USN-6341-1
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6388-1
- USN-6397-1
- USN-6412-1
- USN-6460-1
- USN-6466-1
- USN-6739-1
- USN-6740-1
- VU:584653
- XSA-254
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/kernel-syms?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-syms | < 4.4.121-92.205.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-source?arch=noarch&distro=sles-12&sp=2 | suse | kernel-source | < 4.4.121-92.205.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-macros?arch=noarch&distro=sles-12&sp=2 | suse | kernel-macros | < 4.4.121-92.205.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-devel?arch=noarch&distro=sles-12&sp=2 | suse | kernel-devel | < 4.4.121-92.205.1 | sles-12 | noarch | |
Affected | pkg:rpm/suse/kernel-default?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default | < 4.4.121-92.205.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-devel?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-devel | < 4.4.121-92.205.1 | sles-12 | x86_64 | |
Affected | pkg:rpm/suse/kernel-default-base?arch=x86_64&distro=sles-12&sp=2 | suse | kernel-default-base | < 4.4.121-92.205.1 | sles-12 | x86_64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |