[SUSE-SU-2024:1669-1] Security update for the Linux Kernel
Severity
Important
CVEs
20
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).
- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).
- CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219295).
- CVE-2021-46932: Initialized work before appletouch device registration (bsc#1220444).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).
- CVE-2023-52475: Fixed a use-after-free in powermate_config_complete() (bsc#1220649).
- CVE-2023-52445: Fixed a use-after-free on context disconnection in pvrusb2 (bsc#1220241).
- CVE-2023-52429: Limited the number of targets and parameter size area for device mapper (bsc#1219146).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl() related to a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-51782: Fixed a use-after-free in rose_ioctl() related to a rose_accept race condition (bsc#1218757).
- CVE-2023-31083: Fixed a NULL pointer dereference in hci_uart_tty_ioctl() (bsc#1210780).
The following non-security bugs were fixed:
- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: Add asm helpers for executing VERW (bsc#1213456).
- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).
- x86/entry_32: Add VERW just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
- ID
- SUSE-SU-2024:1669-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2024/suse-su-20241669-1/
- Published
-
2024-05-16T08:50:07
(4 months ago) - Modified
-
2024-05-16T08:50:07
(4 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2024-1899
- ALAS-2024-1923
- ALAS2-2021-1636
- ALAS2-2022-1798
- ALAS2-2024-2391
- ALAS2-2024-2475
- ALAS2-2024-2549
- ALPINE:CVE-2023-28746
- ALSA-2024:3138
- ALSA-2024:3618
- ALSA-2024:5101
- DSA-5593-1
- DSA-5594-1
- DSA-5681-1
- ELSA-2024-12193
- ELSA-2024-12606
- ELSA-2024-2394
- ELSA-2024-3138
- ELSA-2024-3618
- ELSA-2024-5101
- FEDORA-2024-29f57f1b4e
- FEDORA-2024-3a36322c4b
- FEDORA-2024-88847bc77a
- FEDORA-2024-96f3c3f3d3
- FEDORA-2024-987089eca2
- FEDORA-2024-9e9f53d01d
- FEDORA-2024-d16d94b00d
- FEDORA-2024-f3692f8528
- FREEBSD:B6DD9D93-E09B-11EE-92FC-1C697A616631
- MS:CVE-2023-28746
- MS:CVE-2023-51780
- RHSA-2024:2950
- RHSA-2024:3138
- RHSA-2024:3618
- RHSA-2024:3627
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2024:3138
- RLSA-2024:3618
- RLSA-2024:5101
- SSA:2024-157-01
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:4733-1
- SUSE-SU-2023:4735-1
- SUSE-SU-2023:4783-1
- SUSE-SU-2023:4784-1
- SUSE-SU-2023:4811-1
- SUSE-SU-2023:4882-1
- SUSE-SU-2023:4883-1
- SUSE-SU-2024:0463-1
- SUSE-SU-2024:0468-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0476-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0483-1
- SUSE-SU-2024:0484-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0620-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0624-1
- SUSE-SU-2024:0639-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0656-1
- SUSE-SU-2024:0662-1
- SUSE-SU-2024:0663-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0685-1
- SUSE-SU-2024:0694-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0705-1
- SUSE-SU-2024:0727-1
- SUSE-SU-2024:0855-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0917-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:0976-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:1101-1
- SUSE-SU-2024:1102-1
- SUSE-SU-2024:1105-1
- SUSE-SU-2024:1139-1
- SUSE-SU-2024:1152-1
- SUSE-SU-2024:1181-1
- SUSE-SU-2024:1183-1
- SUSE-SU-2024:1184-1
- SUSE-SU-2024:1207-1
- SUSE-SU-2024:1229-1
- SUSE-SU-2024:1236-1
- SUSE-SU-2024:1239-1
- SUSE-SU-2024:1246-1
- SUSE-SU-2024:1248-1
- SUSE-SU-2024:1249-1
- SUSE-SU-2024:1251-1
- SUSE-SU-2024:1252-1
- SUSE-SU-2024:1257-1
- SUSE-SU-2024:1273-1
- SUSE-SU-2024:1274-1
- SUSE-SU-2024:1278-1
- SUSE-SU-2024:1280-1
- SUSE-SU-2024:1288-1
- SUSE-SU-2024:1292-1
- SUSE-SU-2024:1298-1
- SUSE-SU-2024:1299-1
- SUSE-SU-2024:1312-1
- SUSE-SU-2024:1318-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1362-1
- SUSE-SU-2024:1409-1
- SUSE-SU-2024:1411-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1465-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1641-1
- SUSE-SU-2024:1642-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1645-1
- SUSE-SU-2024:1646-1
- SUSE-SU-2024:1647-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1650-1
- SUSE-SU-2024:1659-1
- SUSE-SU-2024:1663-1
- SUSE-SU-2024:1682-1
- SUSE-SU-2024:1711-1
- SUSE-SU-2024:1749-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:1979-1
- SUSE-SU-2024:1983-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2092-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2162-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2184-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2203-1
- SUSE-SU-2024:2207-1
- SUSE-SU-2024:2337-1
- SUSE-SU-2024:2446-1
- SUSE-SU-2024:2535-1
- SUSE-SU-2024:2722-1
- SUSE-SU-2024:2802-1
- SUSE-SU-2024:2824-1
- SUSE-SU-2024:2850-1
- SUSE-SU-2024:2894-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2929-1
- SUSE-SU-2024:2947-1
- SUSE-SU-2024:2973-1
- USN-6439-1
- USN-6439-2
- USN-6440-1
- USN-6440-2
- USN-6440-3
- USN-6462-1
- USN-6462-2
- USN-6464-1
- USN-6465-1
- USN-6465-2
- USN-6465-3
- USN-6466-1
- USN-6516-1
- USN-6520-1
- USN-6639-1
- USN-6646-1
- USN-6647-1
- USN-6647-2
- USN-6651-1
- USN-6651-2
- USN-6651-3
- USN-6652-1
- USN-6653-1
- USN-6653-2
- USN-6653-3
- USN-6653-4
- USN-6680-1
- USN-6680-2
- USN-6680-3
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6686-1
- USN-6686-2
- USN-6686-3
- USN-6686-4
- USN-6686-5
- USN-6688-1
- USN-6705-1
- USN-6716-1
- USN-6724-1
- USN-6724-2
- USN-6725-1
- USN-6725-2
- USN-6726-1
- USN-6726-2
- USN-6726-3
- USN-6739-1
- USN-6740-1
- USN-6765-1
- USN-6797-1
- USN-6816-1
- USN-6817-1
- USN-6817-2
- USN-6817-3
- USN-6818-1
- USN-6818-2
- USN-6818-3
- USN-6818-4
- USN-6819-1
- USN-6819-2
- USN-6819-3
- USN-6819-4
- USN-6820-1
- USN-6820-2
- USN-6821-1
- USN-6821-2
- USN-6821-3
- USN-6821-4
- USN-6828-1
- USN-6831-1
- USN-6865-1
- USN-6866-1
- USN-6866-2
- USN-6866-3
- USN-6867-1
- USN-6871-1
- USN-6878-1
- USN-6892-1
- USN-6895-1
- USN-6895-2
- USN-6895-3
- USN-6895-4
- USN-6896-1
- USN-6896-2
- USN-6896-3
- USN-6896-4
- USN-6896-5
- USN-6900-1
- USN-6919-1
- USN-6926-1
- USN-6926-2
- USN-6926-3
- USN-6938-1
- USN-6971-1
- USN-6976-1
- XSA-452
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |