SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2023:2809-1)

high Nessus Plugin ID 178179

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:2809-1 advisory.

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non- SSP A-MSDU frames to inject arbitrary network packets (bsc#1185861).
- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
- CVE-2022-3523: Fixed a use after free related to device private page handling (bsc#1204363).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bsc#1207050).
- CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header bits (bsc#1207034).
- CVE-2023-0386: A flaw was found where unauthorized access to the execution of the setuid file with capabilities was found in the OverlayFS subsystem, when a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allowed a local user to escalate their privileges on the system (bsc#1209615).
- CVE-2023-0394: Fixed a null pointer dereference in the network subcomponent. This flaw could cause system crashes (bsc#1207168).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-0469: Fixed a use-after-free flaw in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent (bsc#1207521).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-1583: Fixed a NULL pointer dereference in io_file_bitmap_get in io_uring/filetable.c (bsc#1209637).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779, bsc#1198400).
- CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt- wrapper.S (bsc#1212155).
- CVE-2023-21106: Fixed possible memory corruption due to double free in adreno_set_param of adreno_gpu.c (bsc#1211654).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of- service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).
- CVE-2023-2235: Fixed a use-after-free vulnerability in the Performance Events system that could have been exploited to achieve local privilege escalation (bsc#1210986).
- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).
- CVE-2023-22998: Fixed NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776).
- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
- CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-23006: Fixed NULL vs IS_ERR checking in dr_domain_init_resources (bsc#1208845).
- CVE-2023-23454: Fixed a type confusion bug in the CBQ network scheduler which could lead to a use-after- free (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28866: Fixed an out-of-bounds access in net/bluetooth/hci_sync.c because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but did not (bsc#1209780).
- CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855, bsc#1205153).
- CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-3220: Fixed a NULL pointer dereference flaw in dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() (bsc#1212556).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).
- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).
- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).
- CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).
- CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).
- CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).



Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1109158

https://bugzilla.suse.com/1142685

https://bugzilla.suse.com/1152472

https://bugzilla.suse.com/1152489

https://bugzilla.suse.com/1155798

https://bugzilla.suse.com/1160435

https://bugzilla.suse.com/1166486

https://bugzilla.suse.com/1172073

https://bugzilla.suse.com/1174777

https://bugzilla.suse.com/1177529

https://bugzilla.suse.com/1185861

https://bugzilla.suse.com/1186449

https://bugzilla.suse.com/1189998

https://bugzilla.suse.com/1189999

https://bugzilla.suse.com/1191731

https://bugzilla.suse.com/1193629

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195175

https://bugzilla.suse.com/1195655

https://bugzilla.suse.com/1195921

https://bugzilla.suse.com/1196058

https://bugzilla.suse.com/1197534

https://bugzilla.suse.com/1197617

https://bugzilla.suse.com/1198101

https://bugzilla.suse.com/1198400

https://bugzilla.suse.com/1198438

https://bugzilla.suse.com/1198835

https://bugzilla.suse.com/1199304

https://bugzilla.suse.com/1199701

https://bugzilla.suse.com/1200054

https://bugzilla.suse.com/1202353

https://bugzilla.suse.com/1202633

https://bugzilla.suse.com/1203039

https://bugzilla.suse.com/1203200

https://bugzilla.suse.com/1203325

https://bugzilla.suse.com/1203331

https://bugzilla.suse.com/1203332

https://bugzilla.suse.com/1203693

https://bugzilla.suse.com/1203906

https://bugzilla.suse.com/1204356

https://bugzilla.suse.com/1204363

https://bugzilla.suse.com/1204662

https://bugzilla.suse.com/1204993

https://bugzilla.suse.com/1205153

https://bugzilla.suse.com/1205191

https://bugzilla.suse.com/1205205

https://bugzilla.suse.com/1205544

https://bugzilla.suse.com/1209856

https://bugzilla.suse.com/1209871

https://bugzilla.suse.com/1209927

https://bugzilla.suse.com/1209980

https://bugzilla.suse.com/1209982

https://bugzilla.suse.com/1209999

https://bugzilla.suse.com/1210034

https://bugzilla.suse.com/1210050

https://bugzilla.suse.com/1210158

https://bugzilla.suse.com/1210165

https://bugzilla.suse.com/1210202

https://bugzilla.suse.com/1210203

https://bugzilla.suse.com/1210206

https://bugzilla.suse.com/1210216

https://bugzilla.suse.com/1210230

https://bugzilla.suse.com/1210294

https://bugzilla.suse.com/1210301

https://bugzilla.suse.com/1210329

https://bugzilla.suse.com/1210336

https://bugzilla.suse.com/1210337

https://bugzilla.suse.com/1210409

https://bugzilla.suse.com/1210439

https://bugzilla.suse.com/1210449

https://bugzilla.suse.com/1210450

https://bugzilla.suse.com/1210453

https://bugzilla.suse.com/1210454

https://bugzilla.suse.com/1210469

https://bugzilla.suse.com/1210498

https://bugzilla.suse.com/1210506

https://bugzilla.suse.com/1210533

https://bugzilla.suse.com/1210551

https://bugzilla.suse.com/1210629

https://bugzilla.suse.com/1210644

https://bugzilla.suse.com/1210647

https://bugzilla.suse.com/1210725

https://bugzilla.suse.com/1210741

https://bugzilla.suse.com/1210762

https://bugzilla.suse.com/1210763

https://bugzilla.suse.com/1210764

https://bugzilla.suse.com/1210765

https://bugzilla.suse.com/1210766

https://bugzilla.suse.com/1210767

https://bugzilla.suse.com/1210768

https://bugzilla.suse.com/1210769

https://bugzilla.suse.com/1210770

https://bugzilla.suse.com/1210771

https://bugzilla.suse.com/1210775

https://bugzilla.suse.com/1210783

https://bugzilla.suse.com/1210791

https://bugzilla.suse.com/1210793

https://bugzilla.suse.com/1210806

https://bugzilla.suse.com/1210816

https://bugzilla.suse.com/1210817

https://bugzilla.suse.com/1210827

https://bugzilla.suse.com/1210940

https://bugzilla.suse.com/1210943

https://bugzilla.suse.com/1210947

https://bugzilla.suse.com/1210953

https://bugzilla.suse.com/1210986

https://bugzilla.suse.com/1211025

https://bugzilla.suse.com/1211037

https://bugzilla.suse.com/1211043

https://bugzilla.suse.com/1211044

https://bugzilla.suse.com/1211089

https://bugzilla.suse.com/1211105

https://bugzilla.suse.com/1211113

https://bugzilla.suse.com/1211131

https://bugzilla.suse.com/1211205

https://bugzilla.suse.com/1211263

https://bugzilla.suse.com/1211280

https://bugzilla.suse.com/1211281

https://bugzilla.suse.com/1211299

https://bugzilla.suse.com/1211346

https://bugzilla.suse.com/1211387

https://bugzilla.suse.com/1211400

https://bugzilla.suse.com/1211410

https://bugzilla.suse.com/1211414

https://bugzilla.suse.com/1211449

https://bugzilla.suse.com/1211465

https://bugzilla.suse.com/1211519

https://bugzilla.suse.com/1211564

https://bugzilla.suse.com/1211590

https://bugzilla.suse.com/1211592

https://bugzilla.suse.com/1211593

https://bugzilla.suse.com/1211595

https://bugzilla.suse.com/1211654

https://bugzilla.suse.com/1211686

https://bugzilla.suse.com/1211687

https://bugzilla.suse.com/1211688

https://bugzilla.suse.com/1211689

https://bugzilla.suse.com/1211690

https://bugzilla.suse.com/1211691

https://bugzilla.suse.com/1211692

https://bugzilla.suse.com/1211693

https://bugzilla.suse.com/1211714

https://bugzilla.suse.com/1211794

https://bugzilla.suse.com/1211796

https://bugzilla.suse.com/1211804

https://bugzilla.suse.com/1211807

https://bugzilla.suse.com/1211808

https://bugzilla.suse.com/1211820

https://bugzilla.suse.com/1211836

https://bugzilla.suse.com/1211847

https://bugzilla.suse.com/1211852

https://bugzilla.suse.com/1211855

https://bugzilla.suse.com/1211960

https://bugzilla.suse.com/1212129

https://bugzilla.suse.com/1212154

https://bugzilla.suse.com/1212155

https://bugzilla.suse.com/1212158

https://bugzilla.suse.com/1212350

https://bugzilla.suse.com/1212405

https://bugzilla.suse.com/1212445

https://bugzilla.suse.com/1212448

https://bugzilla.suse.com/1212494

https://bugzilla.suse.com/1212495

https://bugzilla.suse.com/1212504

https://bugzilla.suse.com/1212513

https://bugzilla.suse.com/1212540

https://bugzilla.suse.com/1212556

https://bugzilla.suse.com/1212561

https://bugzilla.suse.com/1212563

https://bugzilla.suse.com/1212564

https://bugzilla.suse.com/1212584

https://bugzilla.suse.com/1212592

https://bugzilla.suse.com/1212605

https://bugzilla.suse.com/1212606

https://bugzilla.suse.com/1212619

https://bugzilla.suse.com/1212701

https://bugzilla.suse.com/1212741

https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html

https://www.suse.com/security/cve/CVE-2020-24588

https://www.suse.com/security/cve/CVE-2022-2196

https://www.suse.com/security/cve/CVE-2022-3523

https://www.suse.com/security/cve/CVE-2022-4269

https://www.suse.com/security/cve/CVE-2022-4744

https://www.suse.com/security/cve/CVE-2022-36280

https://www.suse.com/security/cve/CVE-2022-38096

https://www.suse.com/security/cve/CVE-2022-45884

https://www.suse.com/security/cve/CVE-2022-45885

https://www.suse.com/security/cve/CVE-2022-45886

https://www.suse.com/security/cve/CVE-2022-45887

https://www.suse.com/security/cve/CVE-2022-45919

https://www.suse.com/security/cve/CVE-2023-0045

https://www.suse.com/security/cve/CVE-2023-0122

https://www.suse.com/security/cve/CVE-2023-0179

https://www.suse.com/security/cve/CVE-2023-0386

https://www.suse.com/security/cve/CVE-2023-0394

https://www.suse.com/security/cve/CVE-2023-0461

https://www.suse.com/security/cve/CVE-2023-0469

https://www.suse.com/security/cve/CVE-2023-0590

https://www.suse.com/security/cve/CVE-2023-0597

https://www.suse.com/security/cve/CVE-2023-1075

https://www.suse.com/security/cve/CVE-2023-1076

https://www.suse.com/security/cve/CVE-2023-1077

https://www.suse.com/security/cve/CVE-2023-1078

https://www.suse.com/security/cve/CVE-2023-1079

https://www.suse.com/security/cve/CVE-2023-1095

https://www.suse.com/security/cve/CVE-2023-1118

https://www.suse.com/security/cve/CVE-2023-1249

https://www.suse.com/security/cve/CVE-2023-1382

https://www.suse.com/security/cve/CVE-2023-1513

https://www.suse.com/security/cve/CVE-2023-1582

https://www.suse.com/security/cve/CVE-2023-1583

https://www.suse.com/security/cve/CVE-2023-1611

https://www.suse.com/security/cve/CVE-2023-1637

https://www.suse.com/security/cve/CVE-2023-1652

https://www.suse.com/security/cve/CVE-2023-1670

https://www.suse.com/security/cve/CVE-2023-1838

https://www.suse.com/security/cve/CVE-2023-1855

https://www.suse.com/security/cve/CVE-2023-1989

https://www.suse.com/security/cve/CVE-2023-1998

https://www.suse.com/security/cve/CVE-2023-2002

https://www.suse.com/security/cve/CVE-2023-2124

https://www.suse.com/security/cve/CVE-2023-2156

https://www.suse.com/security/cve/CVE-2023-2162

https://www.suse.com/security/cve/CVE-2023-2176

https://www.suse.com/security/cve/CVE-2023-2235

https://www.suse.com/security/cve/CVE-2023-2269

https://www.suse.com/security/cve/CVE-2023-2513

https://www.suse.com/security/cve/CVE-2023-3006

https://www.suse.com/security/cve/CVE-2023-3141

https://www.suse.com/security/cve/CVE-2023-3161

https://www.suse.com/security/cve/CVE-2023-3220

https://www.suse.com/security/cve/CVE-2023-3357

https://www.suse.com/security/cve/CVE-2023-3358

https://www.suse.com/security/cve/CVE-2023-21102

https://www.suse.com/security/cve/CVE-2023-21106

https://www.suse.com/security/cve/CVE-2023-22998

https://www.suse.com/security/cve/CVE-2023-23000

https://www.suse.com/security/cve/CVE-2023-23001

https://www.suse.com/security/cve/CVE-2023-23004

https://www.suse.com/security/cve/CVE-2023-23006

https://www.suse.com/security/cve/CVE-2023-23454

https://www.suse.com/security/cve/CVE-2023-23455

https://www.suse.com/security/cve/CVE-2023-25012

https://www.suse.com/security/cve/CVE-2023-26545

https://www.suse.com/security/cve/CVE-2023-28327

https://www.suse.com/security/cve/CVE-2023-28410

https://www.suse.com/security/cve/CVE-2023-28464

https://www.suse.com/security/cve/CVE-2023-28466

https://www.suse.com/security/cve/CVE-2023-28866

https://www.suse.com/security/cve/CVE-2023-30456

https://www.suse.com/security/cve/CVE-2023-30772

https://www.suse.com/security/cve/CVE-2023-31084

https://www.suse.com/security/cve/CVE-2023-31436

https://www.suse.com/security/cve/CVE-2023-32233

https://www.suse.com/security/cve/CVE-2023-33288

https://www.suse.com/security/cve/CVE-2023-33951

https://www.suse.com/security/cve/CVE-2023-33952

https://www.suse.com/security/cve/CVE-2023-35788

https://www.suse.com/security/cve/CVE-2023-35823

https://www.suse.com/security/cve/CVE-2023-35828

https://www.suse.com/security/cve/CVE-2023-35829

https://bugzilla.suse.com/1205650

https://bugzilla.suse.com/1205756

https://bugzilla.suse.com/1205758

https://bugzilla.suse.com/1205760

https://bugzilla.suse.com/1205762

https://bugzilla.suse.com/1205803

https://bugzilla.suse.com/1205846

https://bugzilla.suse.com/1206024

https://bugzilla.suse.com/1206036

https://bugzilla.suse.com/1206056

https://bugzilla.suse.com/1206057

https://bugzilla.suse.com/1206103

https://bugzilla.suse.com/1206224

https://bugzilla.suse.com/1206232

https://bugzilla.suse.com/1206340

https://bugzilla.suse.com/1206459

https://bugzilla.suse.com/1206492

https://bugzilla.suse.com/1206493

https://bugzilla.suse.com/1206578

https://bugzilla.suse.com/1206640

https://bugzilla.suse.com/1206649

https://bugzilla.suse.com/1206824

https://bugzilla.suse.com/1206843

https://bugzilla.suse.com/1206876

https://bugzilla.suse.com/1206877

https://bugzilla.suse.com/1206878

https://bugzilla.suse.com/1206880

https://bugzilla.suse.com/1206881

https://bugzilla.suse.com/1206882

https://bugzilla.suse.com/1206883

https://bugzilla.suse.com/1206884

https://bugzilla.suse.com/1206885

https://bugzilla.suse.com/1206886

https://bugzilla.suse.com/1206887

https://bugzilla.suse.com/1206888

https://bugzilla.suse.com/1206889

https://bugzilla.suse.com/1206890

https://bugzilla.suse.com/1206891

https://bugzilla.suse.com/1206893

https://bugzilla.suse.com/1206894

https://bugzilla.suse.com/1206935

https://bugzilla.suse.com/1206992

https://bugzilla.suse.com/1207034

https://bugzilla.suse.com/1207036

https://bugzilla.suse.com/1207050

https://bugzilla.suse.com/1207051

https://bugzilla.suse.com/1207088

https://bugzilla.suse.com/1207125

https://bugzilla.suse.com/1207149

https://bugzilla.suse.com/1207158

https://bugzilla.suse.com/1207168

https://bugzilla.suse.com/1207185

https://bugzilla.suse.com/1207270

https://bugzilla.suse.com/1207315

https://bugzilla.suse.com/1207328

https://bugzilla.suse.com/1207497

https://bugzilla.suse.com/1207500

https://bugzilla.suse.com/1207501

https://bugzilla.suse.com/1207506

https://bugzilla.suse.com/1207507

https://bugzilla.suse.com/1207521

https://bugzilla.suse.com/1207553

https://bugzilla.suse.com/1207560

https://bugzilla.suse.com/1207574

https://bugzilla.suse.com/1207588

https://bugzilla.suse.com/1207589

https://bugzilla.suse.com/1207590

https://bugzilla.suse.com/1207591

https://bugzilla.suse.com/1207592

https://bugzilla.suse.com/1207593

https://bugzilla.suse.com/1207594

https://bugzilla.suse.com/1207602

https://bugzilla.suse.com/1207603

https://bugzilla.suse.com/1207605

https://bugzilla.suse.com/1207606

https://bugzilla.suse.com/1207607

https://bugzilla.suse.com/1207608

https://bugzilla.suse.com/1207609

https://bugzilla.suse.com/1207610

https://bugzilla.suse.com/1207611

https://bugzilla.suse.com/1207612

https://bugzilla.suse.com/1207613

https://bugzilla.suse.com/1207614

https://bugzilla.suse.com/1207615

https://bugzilla.suse.com/1207616

https://bugzilla.suse.com/1207617

https://bugzilla.suse.com/1207618

https://bugzilla.suse.com/1207619

https://bugzilla.suse.com/1207620

https://bugzilla.suse.com/1207621

https://bugzilla.suse.com/1207622

https://bugzilla.suse.com/1207623

https://bugzilla.suse.com/1207624

https://bugzilla.suse.com/1207625

https://bugzilla.suse.com/1207626

https://bugzilla.suse.com/1207627

https://bugzilla.suse.com/1207628

https://bugzilla.suse.com/1207629

https://bugzilla.suse.com/1207630

https://bugzilla.suse.com/1207631

https://bugzilla.suse.com/1207632

https://bugzilla.suse.com/1207633

https://bugzilla.suse.com/1207634

https://bugzilla.suse.com/1207635

https://bugzilla.suse.com/1207636

https://bugzilla.suse.com/1207637

https://bugzilla.suse.com/1207638

https://bugzilla.suse.com/1207639

https://bugzilla.suse.com/1207640

https://bugzilla.suse.com/1207641

https://bugzilla.suse.com/1207642

https://bugzilla.suse.com/1207643

https://bugzilla.suse.com/1207644

https://bugzilla.suse.com/1207645

https://bugzilla.suse.com/1207646

https://bugzilla.suse.com/1207647

https://bugzilla.suse.com/1207648

https://bugzilla.suse.com/1207649

https://bugzilla.suse.com/1207650

https://bugzilla.suse.com/1207651

https://bugzilla.suse.com/1207652

https://bugzilla.suse.com/1207653

https://bugzilla.suse.com/1207734

https://bugzilla.suse.com/1207768

https://bugzilla.suse.com/1207769

https://bugzilla.suse.com/1207770

https://bugzilla.suse.com/1207771

https://bugzilla.suse.com/1207773

https://bugzilla.suse.com/1207795

https://bugzilla.suse.com/1207827

https://bugzilla.suse.com/1207842

https://bugzilla.suse.com/1207845

https://bugzilla.suse.com/1207875

https://bugzilla.suse.com/1207878

https://bugzilla.suse.com/1207933

https://bugzilla.suse.com/1207935

https://bugzilla.suse.com/1207948

https://bugzilla.suse.com/1208050

https://bugzilla.suse.com/1208076

https://bugzilla.suse.com/1208081

https://bugzilla.suse.com/1208105

https://bugzilla.suse.com/1208107

https://bugzilla.suse.com/1208128

https://bugzilla.suse.com/1208130

https://bugzilla.suse.com/1208149

https://bugzilla.suse.com/1208153

https://bugzilla.suse.com/1208183

https://bugzilla.suse.com/1208212

https://bugzilla.suse.com/1208219

https://bugzilla.suse.com/1208290

https://bugzilla.suse.com/1208368

https://bugzilla.suse.com/1208410

https://bugzilla.suse.com/1208420

https://bugzilla.suse.com/1208428

https://bugzilla.suse.com/1208429

https://bugzilla.suse.com/1208449

https://bugzilla.suse.com/1208534

https://bugzilla.suse.com/1208541

https://bugzilla.suse.com/1208542

https://bugzilla.suse.com/1208570

https://bugzilla.suse.com/1208588

https://bugzilla.suse.com/1208598

https://bugzilla.suse.com/1208599

https://bugzilla.suse.com/1208600

https://bugzilla.suse.com/1208601

https://bugzilla.suse.com/1208602

https://bugzilla.suse.com/1208604

https://bugzilla.suse.com/1208605

https://bugzilla.suse.com/1208607

https://bugzilla.suse.com/1208619

https://bugzilla.suse.com/1208628

https://bugzilla.suse.com/1208700

https://bugzilla.suse.com/1208741

https://bugzilla.suse.com/1208758

https://bugzilla.suse.com/1208759

https://bugzilla.suse.com/1208776

https://bugzilla.suse.com/1208777

https://bugzilla.suse.com/1208784

https://bugzilla.suse.com/1208787

https://bugzilla.suse.com/1208815

https://bugzilla.suse.com/1208816

https://bugzilla.suse.com/1208829

https://bugzilla.suse.com/1208837

https://bugzilla.suse.com/1208843

https://bugzilla.suse.com/1208845

https://bugzilla.suse.com/1208848

https://bugzilla.suse.com/1208864

https://bugzilla.suse.com/1208902

https://bugzilla.suse.com/1208948

https://bugzilla.suse.com/1208976

https://bugzilla.suse.com/1209008

https://bugzilla.suse.com/1209039

https://bugzilla.suse.com/1209052

https://bugzilla.suse.com/1209092

https://bugzilla.suse.com/1209159

https://bugzilla.suse.com/1209256

https://bugzilla.suse.com/1209258

https://bugzilla.suse.com/1209262

https://bugzilla.suse.com/1209287

https://bugzilla.suse.com/1209288

https://bugzilla.suse.com/1209290

https://bugzilla.suse.com/1209291

https://bugzilla.suse.com/1209292

https://bugzilla.suse.com/1209366

https://bugzilla.suse.com/1209367

https://bugzilla.suse.com/1209436

https://bugzilla.suse.com/1209457

https://bugzilla.suse.com/1209504

https://bugzilla.suse.com/1209532

https://bugzilla.suse.com/1209556

https://bugzilla.suse.com/1209600

https://bugzilla.suse.com/1209615

https://bugzilla.suse.com/1209635

https://bugzilla.suse.com/1209636

https://bugzilla.suse.com/1209637

https://bugzilla.suse.com/1209684

https://bugzilla.suse.com/1209687

https://bugzilla.suse.com/1209693

https://bugzilla.suse.com/1209739

https://bugzilla.suse.com/1209779

https://bugzilla.suse.com/1209780

https://bugzilla.suse.com/1209788

https://bugzilla.suse.com/1209798

https://bugzilla.suse.com/1209799

https://bugzilla.suse.com/1209804

https://bugzilla.suse.com/1209805

Plugin Details

Severity: High

ID: 178179

File Name: suse_SU-2023-2809-1.nasl

Version: 1.6

Type: local

Agent: unix

Published: 7/12/2023

Updated: 9/24/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Low

Base Score: 2.9

Temporal Score: 2.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2020-24588

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2022-2196

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_13_5-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/11/2023

Vulnerability Publication Date: 5/11/2021

CISA Known Exploited Vulnerability Due Dates: 7/8/2025

Reference Information

CVE: CVE-2020-24588, CVE-2022-2196, CVE-2022-3523, CVE-2022-36280, CVE-2022-38096, CVE-2022-4269, CVE-2022-45884, CVE-2022-45885, CVE-2022-45886, CVE-2022-45887, CVE-2022-45919, CVE-2022-4744, CVE-2023-0045, CVE-2023-0122, CVE-2023-0179, CVE-2023-0386, CVE-2023-0394, CVE-2023-0461, CVE-2023-0469, CVE-2023-0590, CVE-2023-0597, CVE-2023-1075, CVE-2023-1076, CVE-2023-1077, CVE-2023-1078, CVE-2023-1079, CVE-2023-1095, CVE-2023-1118, CVE-2023-1249, CVE-2023-1382, CVE-2023-1513, CVE-2023-1582, CVE-2023-1583, CVE-2023-1611, CVE-2023-1637, CVE-2023-1652, CVE-2023-1670, CVE-2023-1838, CVE-2023-1855, CVE-2023-1989, CVE-2023-1998, CVE-2023-2002, CVE-2023-21102, CVE-2023-21106, CVE-2023-2124, CVE-2023-2156, CVE-2023-2162, CVE-2023-2176, CVE-2023-2235, CVE-2023-2269, CVE-2023-22998, CVE-2023-23000, CVE-2023-23001, CVE-2023-23004, CVE-2023-23006, CVE-2023-23454, CVE-2023-23455, CVE-2023-25012, CVE-2023-2513, CVE-2023-26545, CVE-2023-28327, CVE-2023-28410, CVE-2023-28464, CVE-2023-28466, CVE-2023-28866, CVE-2023-3006, CVE-2023-30456, CVE-2023-30772, CVE-2023-31084, CVE-2023-3141, CVE-2023-31436, CVE-2023-3161, CVE-2023-3220, CVE-2023-32233, CVE-2023-33288, CVE-2023-3357, CVE-2023-3358, CVE-2023-33951, CVE-2023-33952, CVE-2023-35788, CVE-2023-35823, CVE-2023-35828, CVE-2023-35829

IAVA: 2025-A-0456

SuSE: SUSE-SU-2023:2809-1