Bug 1194765 (CVE-2022-23222) - VUL-0: CVE-2022-23222: kernel-source: eBPF Improper Input Validation Vulnerability
Summary: VUL-0: CVE-2022-23222: kernel-source: eBPF Improper Input Validation Vulnerab...
Status: RESOLVED FIXED
Alias: CVE-2022-23222
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/320775/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-23222:6.7:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-01-17 11:35 UTC by Robert Frohl
Modified: 2025-02-27 05:37 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2022-01-17 11:35:16 UTC
This vulnerability allows local attackers to escalate privileges on
affected installations of Linux Kernel. An attacker must first obtain the
ability to execute low-privileged code on the target system in order to
exploit this vulnerability.

The specific flaw exists within the handling of eBPF programs. The issue
results from the lack of proper validation of user-supplied eBPF programs
prior to executing them. An attacker can leverage this vulnerability to
escalate privileges and execute code in the context of the kernel.
BE AWARE, unprivileged bpf is disabled by default in most distros.

*Affected Version*

    Linux Kernel 5.8 or later

*Root Cause Analysis*

The bpf verifier(kernel/bpf/verifier.c) did not properly restrict several
*_OR_NULL pointer types which allows these types to do pointer arithmetic.
This can be leveraged to bypass the verifier check and escalate privilege.
(see
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/kernel/bpf/verifier.c?h=v5.10.83#n6022
)

*Exploit Code*

Exploit code will be delayed for 5 days and will be posted at 12:00 UTC,
Jan 18, 2022

*Mitigations*

set kernel.unprivileged_bpf_disabled to 1

BE AWARE AGAIN, unprivileged bpf is disabled by default in most distros.

*Credits*

tr3e of SecCoder Security Lab
Best,
tr3e

https://www.openwall.com/lists/oss-security/2022/01/13/1
http://www.openwall.com/lists/oss-security/2022/01/14/1
Comment 1 Robert Frohl 2022-01-17 11:35:57 UTC
related to CVE-2021-4204, bsc#1194111
Comment 5 Robert Frohl 2022-01-17 11:46:08 UTC
not to sure if we should keep this private as the CVE [0] is public already, but there is no public commit at the moment. 

[0] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
Comment 8 Marcus Meissner 2022-01-20 13:15:57 UTC
issue is public via oss-sec

https://seclists.org/oss-sec/2022/q1/38

 Re: Linux Kernel eBPF Improper Input Validation Vulnerability From: tr3e wang <tr3e.wang () gmail com>
Date: Fri, 14 Jan 2022 16:57:53 +0800

Hi all,

CVE-2022-23222 has been assigned to this issue.

Thanks,
tr3e

tr3e wang <tr3e.wang () gmail com> 于2022年1月13日周四 16:21写道:

    Hi all,

    This vulnerability allows local attackers to escalate privileges on
    affected installations of Linux Kernel. An attacker must first obtain the
    ability to execute low-privileged code on the target system in order to
    exploit this vulnerability.

    The specific flaw exists within the handling of eBPF programs. The issue
    results from the lack of proper validation of user-supplied eBPF programs
    prior to executing them. An attacker can leverage this vulnerability to
    escalate privileges and execute code in the context of the kernel.
    BE AWARE, unprivileged bpf is disabled by default in most distros.

    *Affected Version*

        Linux Kernel 5.8 or later

    *Root Cause Analysis*

    The bpf verifier(kernel/bpf/verifier.c) did not properly restrict several
    *_OR_NULL pointer types which allows these types to do pointer arithmetic.
    This can be leveraged to bypass the verifier check and escalate privilege.
    (see
    https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/kernel/bpf/verifier.c?h=v5.10.83#n6022
    )

    *Exploit Code*

    Exploit code will be delayed for 5 days and will be posted at 12:00 UTC,
    Jan 18, 2022

    *Mitigations*

    set kernel.unprivileged_bpf_disabled to 1

    BE AWARE AGAIN, unprivileged bpf is disabled by default in most distros.

    *Credits*

    tr3e of SecCoder Security Lab
    Best,
    tr3e
Comment 9 Shung-Hsi Yu 2022-02-01 00:29:57 UTC
Backported the following fix

  64620e0a1e71 bpf: Fix out of bounds access for ringbuf helpers

The following are pulled in as dependency

  be80a1d3f9db bpf: Generalize check_ctx_reg for reuse with other types
  6788ab23508b bpf: Generally fix helper register offset check

The following additional fix is *not* backported because it requires changes that is too intrusive when 64620e0a1e71 alone is sufficient

  a672b2e36a64 bpf: Fix ringbuf memory type confusion when passing to helpers

Reassigning back to security team
Comment 31 Swamp Workflow Management 2022-07-21 22:26:55 UTC
SUSE-SU-2022:2520-1: An update that solves 49 vulnerabilities, contains 26 features and has 207 fixes is now available.

Category: security (important)
Bug References: 1055117,1061840,1065729,1071995,1089644,1103269,1118212,1121726,1137728,1156395,1157038,1157923,1175667,1179439,1179639,1180814,1183682,1183872,1184318,1184924,1187716,1188885,1189998,1190137,1190208,1190336,1190497,1190768,1190786,1190812,1191271,1191663,1192483,1193064,1193277,1193289,1193431,1193556,1193629,1193640,1193787,1193823,1193852,1194086,1194111,1194191,1194409,1194501,1194523,1194526,1194583,1194585,1194586,1194625,1194765,1194826,1194869,1195099,1195287,1195478,1195482,1195504,1195651,1195668,1195669,1195775,1195823,1195826,1195913,1195915,1195926,1195944,1195957,1195987,1196079,1196114,1196130,1196213,1196306,1196367,1196400,1196426,1196478,1196514,1196570,1196723,1196779,1196830,1196836,1196866,1196868,1196869,1196901,1196930,1196942,1196960,1197016,1197157,1197227,1197243,1197292,1197302,1197303,1197304,1197362,1197386,1197501,1197601,1197661,1197675,1197761,1197817,1197819,1197820,1197888,1197889,1197894,1197915,1197917,1197918,1197920,1197921,1197922,1197926,1198009,1198010,1198012,1198013,1198014,1198015,1198016,1198017,1198018,1198019,1198020,1198021,1198022,1198023,1198024,1198027,1198030,1198034,1198058,1198217,1198379,1198400,1198402,1198410,1198412,1198413,1198438,1198484,1198577,1198585,1198660,1198802,1198803,1198806,1198811,1198826,1198829,1198835,1198968,1198971,1199011,1199024,1199035,1199046,1199052,1199063,1199163,1199173,1199260,1199314,1199390,1199426,1199433,1199439,1199482,1199487,1199505,1199507,1199605,1199611,1199626,1199631,1199650,1199657,1199674,1199736,1199793,1199839,1199875,1199909,1200015,1200019,1200045,1200046,1200144,1200205,1200211,1200259,1200263,1200284,1200315,1200343,1200420,1200442,1200475,1200502,1200567,1200569,1200571,1200599,1200600,1200608,1200611,1200619,1200692,1200762,1200763,1200806,1200807,1200808,1200809,1200810,1200812,1200813,1200815,1200816,1200820,1200821,1200822,1200824,1200825,1200827,1200828,1200829,1200830,1200845,1200882,1200925,1201050,1201080,1201160,1201171,1201177,1201193,1201196,1201218,1201222,1201228,1201251,1201381,1201471,1201524
CVE References: CVE-2021-26341,CVE-2021-33061,CVE-2021-4204,CVE-2021-44879,CVE-2021-45402,CVE-2022-0264,CVE-2022-0494,CVE-2022-0617,CVE-2022-1012,CVE-2022-1016,CVE-2022-1184,CVE-2022-1198,CVE-2022-1205,CVE-2022-1462,CVE-2022-1508,CVE-2022-1651,CVE-2022-1652,CVE-2022-1671,CVE-2022-1679,CVE-2022-1729,CVE-2022-1734,CVE-2022-1789,CVE-2022-1852,CVE-2022-1966,CVE-2022-1972,CVE-2022-1974,CVE-2022-1998,CVE-2022-20132,CVE-2022-20154,CVE-2022-21123,CVE-2022-21125,CVE-2022-21127,CVE-2022-21166,CVE-2022-21180,CVE-2022-21499,CVE-2022-2318,CVE-2022-23222,CVE-2022-26365,CVE-2022-26490,CVE-2022-29582,CVE-2022-29900,CVE-2022-29901,CVE-2022-30594,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33743,CVE-2022-33981,CVE-2022-34918
JIRA References: SLE-13513,SLE-13521,SLE-15442,SLE-17855,SLE-18194,SLE-18234,SLE-18375,SLE-18377,SLE-18378,SLE-18382,SLE-18385,SLE-18901,SLE-18938,SLE-18978,SLE-19001,SLE-19026,SLE-19242,SLE-19249,SLE-19253,SLE-19924,SLE-21315,SLE-23643,SLE-24072,SLE-24093,SLE-24350,SLE-24549
Sources used:
openSUSE Leap 15.4 (src):    dtb-aarch64-5.14.21-150400.24.11.1, kernel-64kb-5.14.21-150400.24.11.1, kernel-debug-5.14.21-150400.24.11.1, kernel-default-5.14.21-150400.24.11.1, kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6, kernel-docs-5.14.21-150400.24.11.1, kernel-kvmsmall-5.14.21-150400.24.11.1, kernel-obs-build-5.14.21-150400.24.11.1, kernel-obs-qa-5.14.21-150400.24.11.1, kernel-source-5.14.21-150400.24.11.1, kernel-syms-5.14.21-150400.24.11.1, kernel-zfcpdump-5.14.21-150400.24.11.1
SUSE Linux Enterprise Workstation Extension 15-SP4 (src):    kernel-default-5.14.21-150400.24.11.1
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src):    kernel-default-5.14.21-150400.24.11.1, kernel-livepatch-SLE15-SP4_Update_1-1-150400.9.5.3
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src):    kernel-default-5.14.21-150400.24.11.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    kernel-docs-5.14.21-150400.24.11.1, kernel-obs-build-5.14.21-150400.24.11.1, kernel-source-5.14.21-150400.24.11.1, kernel-syms-5.14.21-150400.24.11.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    kernel-64kb-5.14.21-150400.24.11.1, kernel-default-5.14.21-150400.24.11.1, kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6, kernel-source-5.14.21-150400.24.11.1, kernel-zfcpdump-5.14.21-150400.24.11.1
SUSE Linux Enterprise High Availability 15-SP4 (src):    kernel-default-5.14.21-150400.24.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 33 Swamp Workflow Management 2022-08-01 13:28:30 UTC
SUSE-SU-2022:2615-1: An update that solves 48 vulnerabilities, contains 26 features and has 202 fixes is now available.

Category: security (important)
Bug References: 1055117,1061840,1065729,1071995,1089644,1103269,1118212,1121726,1137728,1156395,1157038,1157923,1175667,1179439,1179639,1180814,1183682,1183872,1184318,1184924,1187716,1188885,1189998,1190137,1190208,1190336,1190497,1190768,1190786,1190812,1191271,1191663,1192483,1193064,1193277,1193289,1193431,1193556,1193629,1193640,1193787,1193823,1193852,1194086,1194111,1194191,1194409,1194501,1194523,1194526,1194583,1194585,1194586,1194625,1194765,1194826,1194869,1195099,1195287,1195478,1195482,1195504,1195651,1195668,1195669,1195775,1195823,1195826,1195913,1195915,1195926,1195944,1195957,1195987,1196079,1196114,1196130,1196213,1196306,1196367,1196400,1196426,1196478,1196514,1196570,1196723,1196779,1196830,1196836,1196866,1196868,1196869,1196901,1196930,1196942,1196960,1197016,1197157,1197227,1197243,1197292,1197302,1197303,1197304,1197362,1197386,1197501,1197601,1197661,1197675,1197761,1197817,1197819,1197820,1197888,1197889,1197894,1197915,1197917,1197918,1197920,1197921,1197922,1197926,1198009,1198010,1198012,1198013,1198014,1198015,1198016,1198017,1198018,1198019,1198020,1198021,1198022,1198023,1198024,1198027,1198030,1198034,1198058,1198217,1198379,1198400,1198402,1198412,1198413,1198438,1198484,1198577,1198585,1198660,1198802,1198803,1198806,1198811,1198826,1198835,1198968,1198971,1199011,1199024,1199035,1199046,1199052,1199063,1199163,1199173,1199260,1199314,1199390,1199426,1199433,1199439,1199482,1199487,1199505,1199507,1199605,1199611,1199626,1199631,1199650,1199657,1199674,1199736,1199793,1199839,1199875,1199909,1200015,1200019,1200045,1200046,1200144,1200205,1200211,1200259,1200263,1200284,1200315,1200343,1200420,1200442,1200475,1200502,1200567,1200569,1200571,1200572,1200599,1200600,1200608,1200611,1200619,1200692,1200762,1200763,1200806,1200807,1200808,1200809,1200810,1200812,1200815,1200816,1200820,1200822,1200824,1200825,1200827,1200828,1200829,1200830,1200845,1200882,1200925,1201050,1201160,1201171,1201177,1201193,1201196,1201218,1201222,1201228,1201251,150300
CVE References: CVE-2021-26341,CVE-2021-33061,CVE-2021-4204,CVE-2021-44879,CVE-2021-45402,CVE-2022-0264,CVE-2022-0494,CVE-2022-0617,CVE-2022-1012,CVE-2022-1016,CVE-2022-1184,CVE-2022-1198,CVE-2022-1205,CVE-2022-1508,CVE-2022-1651,CVE-2022-1652,CVE-2022-1671,CVE-2022-1679,CVE-2022-1729,CVE-2022-1734,CVE-2022-1789,CVE-2022-1852,CVE-2022-1966,CVE-2022-1972,CVE-2022-1974,CVE-2022-1998,CVE-2022-20132,CVE-2022-20154,CVE-2022-21123,CVE-2022-21125,CVE-2022-21127,CVE-2022-21166,CVE-2022-21180,CVE-2022-21499,CVE-2022-2318,CVE-2022-23222,CVE-2022-26365,CVE-2022-26490,CVE-2022-29582,CVE-2022-29900,CVE-2022-29901,CVE-2022-30594,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33743,CVE-2022-33981,CVE-2022-34918
JIRA References: SLE-13513,SLE-13521,SLE-15442,SLE-17855,SLE-18194,SLE-18234,SLE-18375,SLE-18377,SLE-18378,SLE-18382,SLE-18385,SLE-18901,SLE-18938,SLE-18978,SLE-19001,SLE-19026,SLE-19242,SLE-19249,SLE-19253,SLE-19924,SLE-21315,SLE-23643,SLE-24072,SLE-24093,SLE-24350,SLE-24549
Sources used:
openSUSE Leap 15.4 (src):    kernel-azure-5.14.21-150400.14.7.1, kernel-source-azure-5.14.21-150400.14.7.1, kernel-syms-azure-5.14.21-150400.14.7.1
SUSE Linux Enterprise Module for Public Cloud 15-SP4 (src):    kernel-azure-5.14.21-150400.14.7.1, kernel-source-azure-5.14.21-150400.14.7.1, kernel-syms-azure-5.14.21-150400.14.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 44 Maintenance Automation 2024-09-10 12:35:55 UTC
SUSE-SU-2024:3190-1: An update that solves 292 vulnerabilities, contains two features and has 45 security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243190-1
Category: security (important)
Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203329, 1203330, 1203360, 1205462, 1206006, 1206258, 1206843, 1207158, 1208783, 1210644, 1213580, 1213632, 1214285, 1216834, 1220428, 1220877, 1220962, 1221269, 1221326, 1221630, 1221645, 1222335, 1222350, 1222372, 1222387, 1222634, 1222808, 1222967, 1223074, 1223191, 1223508, 1223720, 1223742, 1223777, 1223803, 1223807, 1224105, 1224415, 1224496, 1224510, 1224542, 1224578, 1224639, 1225162, 1225352, 1225428, 1225524, 1225578, 1225582, 1225773, 1225814, 1225827, 1225832, 1225903, 1226168, 1226530, 1226613, 1226742, 1226765, 1226798, 1226801, 1226874, 1226885, 1227079, 1227623, 1227761, 1227830, 1227863, 1227867, 1227929, 1227937, 1227958, 1228020, 1228065, 1228114, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228463, 1228466, 1228467, 1228469, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228487, 1228489, 1228491, 1228493, 1228494, 1228495, 1228496, 1228501, 1228503, 1228509, 1228513, 1228515, 1228516, 1228526, 1228531, 1228563, 1228564, 1228567, 1228576, 1228579, 1228584, 1228588, 1228590, 1228615, 1228616, 1228635, 1228636, 1228654, 1228656, 1228658, 1228660, 1228662, 1228667, 1228673, 1228677, 1228687, 1228706, 1228708, 1228710, 1228718, 1228720, 1228721, 1228722, 1228724, 1228726, 1228727, 1228733, 1228748, 1228766, 1228779, 1228801, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228979, 1228988, 1228989, 1228991, 1228992, 1229042, 1229054, 1229086, 1229136, 1229154, 1229187, 1229188, 1229190, 1229287, 1229290, 1229292, 1229296, 1229297, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229314, 1229315, 1229317, 1229318, 1229319, 1229327, 1229341, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229354, 1229356, 1229357, 1229358, 1229359, 1229360, 1229366, 1229370, 1229373, 1229374, 1229381, 1229382, 1229383, 1229386, 1229388, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229418, 1229444, 1229453, 1229454, 1229481, 1229482, 1229488, 1229489, 1229490, 1229493, 1229495, 1229497, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229521, 1229522, 1229523, 1229524, 1229525, 1229526, 1229527, 1229528, 1229529, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229545, 1229546, 1229547, 1229548, 1229554, 1229557, 1229558, 1229559, 1229560, 1229562, 1229564, 1229565, 1229566, 1229568, 1229569, 1229572, 1229573, 1229576, 1229581, 1229588, 1229598, 1229603, 1229604, 1229605, 1229608, 1229611, 1229612, 1229613, 1229614, 1229615, 1229616, 1229617, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229632, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229658, 1229662, 1229664, 1229707, 1229739, 1229743, 1229746, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229768, 1229781, 1229784, 1229787, 1229788, 1229789, 1229792, 1229820
CVE References: CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-38457, CVE-2022-40133, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947
Jira References: PED-8491, PED-8779
Maintenance Incident: [SUSE:Maintenance:35523](https://smelt.suse.de/incident/35523/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-syms-azure-5.14.21-150500.33.66.1, kernel-source-azure-5.14.21-150500.33.66.1
Public Cloud Module 15-SP5 (src):
 kernel-syms-azure-5.14.21-150500.33.66.1, kernel-source-azure-5.14.21-150500.33.66.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 45 Maintenance Automation 2024-09-11 16:30:05 UTC
SUSE-SU-2024:3209-1: An update that solves 292 vulnerabilities, contains two features and has 45 security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243209-1
Category: security (important)
Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203329, 1203330, 1203360, 1205462, 1206006, 1206258, 1206843, 1207158, 1208783, 1210644, 1213580, 1213632, 1214285, 1216834, 1220428, 1220877, 1220962, 1221269, 1221326, 1221630, 1221645, 1222335, 1222350, 1222372, 1222387, 1222634, 1222808, 1222967, 1223074, 1223191, 1223508, 1223720, 1223742, 1223777, 1223803, 1223807, 1224105, 1224415, 1224496, 1224510, 1224542, 1224578, 1224639, 1225162, 1225352, 1225428, 1225524, 1225578, 1225582, 1225773, 1225814, 1225827, 1225832, 1225903, 1226168, 1226530, 1226613, 1226742, 1226765, 1226798, 1226801, 1226874, 1226885, 1227079, 1227623, 1227761, 1227830, 1227863, 1227867, 1227929, 1227937, 1227958, 1228020, 1228065, 1228114, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228463, 1228466, 1228467, 1228469, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228487, 1228489, 1228491, 1228493, 1228494, 1228495, 1228496, 1228501, 1228503, 1228509, 1228513, 1228515, 1228516, 1228526, 1228531, 1228563, 1228564, 1228567, 1228576, 1228579, 1228584, 1228588, 1228590, 1228615, 1228616, 1228635, 1228636, 1228654, 1228656, 1228658, 1228660, 1228662, 1228667, 1228673, 1228677, 1228687, 1228706, 1228708, 1228710, 1228718, 1228720, 1228721, 1228722, 1228724, 1228726, 1228727, 1228733, 1228748, 1228766, 1228779, 1228801, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228979, 1228988, 1228989, 1228991, 1228992, 1229042, 1229054, 1229086, 1229136, 1229154, 1229187, 1229188, 1229190, 1229287, 1229290, 1229292, 1229296, 1229297, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229314, 1229315, 1229317, 1229318, 1229319, 1229327, 1229341, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229354, 1229356, 1229357, 1229358, 1229359, 1229360, 1229366, 1229370, 1229373, 1229374, 1229381, 1229382, 1229383, 1229386, 1229388, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229418, 1229444, 1229453, 1229454, 1229481, 1229482, 1229488, 1229489, 1229490, 1229493, 1229495, 1229497, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229521, 1229522, 1229523, 1229524, 1229525, 1229526, 1229527, 1229528, 1229529, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229545, 1229546, 1229547, 1229548, 1229554, 1229557, 1229558, 1229559, 1229560, 1229562, 1229564, 1229565, 1229566, 1229568, 1229569, 1229572, 1229573, 1229576, 1229581, 1229588, 1229598, 1229603, 1229604, 1229605, 1229608, 1229611, 1229612, 1229613, 1229614, 1229615, 1229616, 1229617, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229632, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229658, 1229662, 1229664, 1229707, 1229739, 1229743, 1229746, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229768, 1229781, 1229784, 1229787, 1229788, 1229789, 1229792, 1229820
CVE References: CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-38457, CVE-2022-40133, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947
Jira References: PED-8491, PED-8779
Maintenance Incident: [SUSE:Maintenance:35569](https://smelt.suse.de/incident/35569/)
Sources used:
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5-RT_Update_19-1-150500.11.3.2
SUSE Real Time Module 15-SP5 (src):
 kernel-syms-rt-5.14.21-150500.13.67.1, kernel-source-rt-5.14.21-150500.13.67.3
openSUSE Leap 15.5 (src):
 kernel-livepatch-SLE15-SP5-RT_Update_19-1-150500.11.3.2, kernel-syms-rt-5.14.21-150500.13.67.1, kernel-source-rt-5.14.21-150500.13.67.3
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-source-rt-5.14.21-150500.13.67.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 46 Maintenance Automation 2024-09-12 16:30:16 UTC
SUSE-SU-2024:3227-1: An update that solves 69 vulnerabilities and has 17 security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243227-1
Category: security (important)
Bug References: 1193629, 1194111, 1194765, 1196261, 1196516, 1196894, 1198017, 1203360, 1206006, 1206258, 1207158, 1216834, 1221326, 1221645, 1223191, 1224105, 1227832, 1228020, 1228466, 1228516, 1228576, 1228718, 1228801, 1228959, 1229042, 1229292, 1229400, 1229454, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229522, 1229526, 1229528, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229554, 1229557, 1229565, 1229566, 1229568, 1229581, 1229598, 1229603, 1229604, 1229608, 1229611, 1229612, 1229613, 1229614, 1229617, 1229619, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229664, 1229707, 1229792
CVE References: CVE-2021-4441, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48890, CVE-2022-48891, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48907, CVE-2022-48909, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48921, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48935, CVE-2022-48937, CVE-2022-48938, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-52489, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52900, CVE-2023-52901, CVE-2023-52905, CVE-2023-52907, CVE-2023-52911, CVE-2024-40910, CVE-2024-41009, CVE-2024-41062, CVE-2024-41087, CVE-2024-42077, CVE-2024-42126, CVE-2024-42232, CVE-2024-42271, CVE-2024-43853, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44938, CVE-2024-44947
Maintenance Incident: [SUSE:Maintenance:35567](https://smelt.suse.de/incident/35567/)
Sources used:
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 kernel-source-rt-5.14.21-150400.15.91.3
SUSE Linux Enterprise Micro 5.3 (src):
 kernel-source-rt-5.14.21-150400.15.91.3
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 kernel-source-rt-5.14.21-150400.15.91.3
SUSE Linux Enterprise Micro 5.4 (src):
 kernel-source-rt-5.14.21-150400.15.91.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 47 Maintenance Automation 2024-09-24 08:30:22 UTC
SUSE-SU-2024:3408-1: An update that solves 73 vulnerabilities and has 18 security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243408-1
Category: security (important)
Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203360, 1206006, 1206258, 1207158, 1216834, 1221326, 1221645, 1223191, 1224105, 1227832, 1228020, 1228114, 1228466, 1228489, 1228516, 1228576, 1228718, 1228801, 1228959, 1229042, 1229292, 1229400, 1229454, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229522, 1229526, 1229528, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229554, 1229557, 1229565, 1229566, 1229568, 1229581, 1229598, 1229603, 1229604, 1229608, 1229611, 1229612, 1229613, 1229614, 1229617, 1229619, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229664, 1229707, 1229792, 1230245, 1230413
CVE References: CVE-2021-4441, CVE-2022-4382, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48890, CVE-2022-48891, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48907, CVE-2022-48909, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48921, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48935, CVE-2022-48937, CVE-2022-48938, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-52489, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52900, CVE-2023-52901, CVE-2023-52905, CVE-2023-52907, CVE-2023-52911, CVE-2024-40910, CVE-2024-41009, CVE-2024-41011, CVE-2024-41062, CVE-2024-41087, CVE-2024-42077, CVE-2024-42126, CVE-2024-42230, CVE-2024-42232, CVE-2024-42271, CVE-2024-43853, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44938, CVE-2024-44947, CVE-2024-45003
Maintenance Incident: [SUSE:Maintenance:35534](https://smelt.suse.de/incident/35534/)
Sources used:
openSUSE Leap 15.4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-livepatch-SLE15-SP4_Update_31-1-150400.9.3.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-qa-5.14.21-150400.24.133.1, kernel-source-5.14.21-150400.24.133.2, kernel-obs-build-5.14.21-150400.24.133.2
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
SUSE Linux Enterprise Micro 5.3 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
SUSE Linux Enterprise Micro 5.4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
SUSE Linux Enterprise Live Patching 15-SP4 (src):
 kernel-livepatch-SLE15-SP4_Update_31-1-150400.9.3.2
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2
SUSE Manager Proxy 4.3 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1
SUSE Manager Retail Branch Server 4.3 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2
SUSE Manager Server 4.3 (src):
 kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 48 Maintenance Automation 2024-09-27 16:30:06 UTC
SUSE-SU-2024:3483-1: An update that solves 296 vulnerabilities, contains two features and has 42 security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243483-1
Category: security (important)
Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203329, 1203330, 1203360, 1205462, 1206006, 1206258, 1206843, 1207158, 1208783, 1210644, 1213580, 1213632, 1214285, 1216834, 1220428, 1220877, 1220962, 1221269, 1221326, 1221630, 1221645, 1222335, 1222350, 1222372, 1222387, 1222634, 1222808, 1222967, 1223074, 1223191, 1223508, 1223720, 1223742, 1223777, 1223803, 1223807, 1224105, 1224415, 1224496, 1224510, 1224542, 1224578, 1224639, 1225162, 1225352, 1225428, 1225524, 1225578, 1225582, 1225773, 1225814, 1225827, 1225832, 1225903, 1226168, 1226530, 1226613, 1226742, 1226765, 1226798, 1226801, 1226874, 1226885, 1227079, 1227623, 1227761, 1227830, 1227863, 1227867, 1227929, 1227937, 1227958, 1228020, 1228065, 1228114, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228463, 1228466, 1228467, 1228469, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228487, 1228489, 1228491, 1228493, 1228494, 1228495, 1228496, 1228501, 1228503, 1228509, 1228513, 1228515, 1228516, 1228526, 1228531, 1228563, 1228564, 1228567, 1228576, 1228579, 1228584, 1228588, 1228590, 1228615, 1228616, 1228635, 1228636, 1228654, 1228656, 1228658, 1228660, 1228662, 1228667, 1228673, 1228677, 1228687, 1228706, 1228708, 1228710, 1228718, 1228720, 1228721, 1228722, 1228724, 1228726, 1228727, 1228733, 1228748, 1228766, 1228779, 1228801, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228979, 1228988, 1228989, 1228991, 1228992, 1229042, 1229054, 1229086, 1229136, 1229154, 1229187, 1229188, 1229190, 1229287, 1229290, 1229292, 1229296, 1229297, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229314, 1229315, 1229317, 1229318, 1229319, 1229327, 1229341, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229354, 1229356, 1229357, 1229358, 1229359, 1229360, 1229366, 1229370, 1229373, 1229374, 1229381, 1229382, 1229383, 1229386, 1229388, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229418, 1229444, 1229453, 1229454, 1229481, 1229482, 1229488, 1229489, 1229490, 1229493, 1229495, 1229497, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229521, 1229522, 1229523, 1229524, 1229525, 1229526, 1229527, 1229528, 1229529, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229545, 1229546, 1229547, 1229548, 1229554, 1229557, 1229558, 1229559, 1229560, 1229562, 1229564, 1229565, 1229566, 1229568, 1229569, 1229572, 1229573, 1229576, 1229581, 1229588, 1229598, 1229603, 1229604, 1229605, 1229608, 1229611, 1229612, 1229613, 1229614, 1229615, 1229616, 1229617, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229632, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229658, 1229662, 1229664, 1229707, 1229739, 1229743, 1229746, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229768, 1229781, 1229784, 1229787, 1229788, 1229789, 1229792, 1229820, 1230413
CVE References: CVE-2021-4204, CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-0500, CVE-2022-23222, CVE-2022-38457, CVE-2022-40133, CVE-2022-4382, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947
Jira References: PED-8491, PED-8779
Maintenance Incident: [SUSE:Maintenance:35521](https://smelt.suse.de/incident/35521/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-obs-build-5.14.21-150500.55.80.1, kernel-syms-5.14.21-150500.55.80.1, kernel-source-5.14.21-150500.55.80.2, kernel-livepatch-SLE15-SP5_Update_19-1-150500.11.3.2, kernel-obs-qa-5.14.21-150500.55.80.1, kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
openSUSE Leap Micro 5.5 (src):
 kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Basesystem Module 15-SP5 (src):
 kernel-source-5.14.21-150500.55.80.2, kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
Development Tools Module 15-SP5 (src):
 kernel-obs-build-5.14.21-150500.55.80.1, kernel-syms-5.14.21-150500.55.80.1, kernel-source-5.14.21-150500.55.80.2
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5_Update_19-1-150500.11.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.