Vulnerability from csaf_suse
Published
2024-05-10 07:19
Modified
2024-05-10 07:19
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)
Description of the patch
This update for the Linux Kernel 5.14.21-150500_53 fixes several issues.
The following security issues were fixed:
- CVE-2024-0775: Fixed a use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 (bsc#1219079).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability perf component (bsc#1216644).
- CVE-2024-26622: Fixed a use-after-free bug in tomoyo_write_control() (bsc#1220828).
- CVE-2024-1086: Fixed a use-after-free vulnerability related to nft_verdict_init() (bsc#1219435).
Patchnames
SUSE-2024-1582,SUSE-2024-1583,SUSE-2024-1584,SUSE-2024-1586,SUSE-2024-1589,SUSE-2024-1594,SUSE-SLE-Module-Live-Patching-15-SP3-2024-1594,SUSE-SLE-Module-Live-Patching-15-SP4-2024-1585,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1589
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)", title: "Title of the patch", }, { category: "description", text: "This update for the Linux Kernel 5.14.21-150500_53 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2024-0775: Fixed a use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 (bsc#1219079).\n- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability perf component (bsc#1216644).\n- CVE-2024-26622: Fixed a use-after-free bug in tomoyo_write_control() (bsc#1220828).\n- CVE-2024-1086: Fixed a use-after-free vulnerability related to nft_verdict_init() (bsc#1219435).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2024-1582,SUSE-2024-1583,SUSE-2024-1584,SUSE-2024-1586,SUSE-2024-1589,SUSE-2024-1594,SUSE-SLE-Module-Live-Patching-15-SP3-2024-1594,SUSE-SLE-Module-Live-Patching-15-SP4-2024-1585,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1589", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1582-1.json", }, { category: "self", summary: "URL for SUSE-SU-2024:1582-1", url: "https://www.suse.com/support/update/announcement/2024/suse-su-20241582-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2024:1582-1", url: "https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html", }, { category: "self", summary: "SUSE Bug 1216644", url: "https://bugzilla.suse.com/1216644", }, { category: "self", summary: "SUSE Bug 1219079", url: "https://bugzilla.suse.com/1219079", }, { category: "self", summary: "SUSE Bug 1219435", url: "https://bugzilla.suse.com/1219435", }, { category: "self", summary: "SUSE Bug 1220828", url: "https://bugzilla.suse.com/1220828", }, { category: "self", summary: "SUSE CVE CVE-2023-5717 page", url: "https://www.suse.com/security/cve/CVE-2023-5717/", }, { category: "self", summary: "SUSE CVE CVE-2024-0775 page", url: "https://www.suse.com/security/cve/CVE-2024-0775/", }, { category: "self", summary: "SUSE CVE CVE-2024-1086 page", url: "https://www.suse.com/security/cve/CVE-2024-1086/", }, { category: "self", summary: "SUSE CVE CVE-2024-26622 page", url: "https://www.suse.com/security/cve/CVE-2024-26622/", }, ], title: "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5)", tracking: { current_release_date: "2024-05-10T07:19:19Z", generator: { date: "2024-05-10T07:19:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2024:1582-1", initial_release_date: "2024-05-10T07:19:19Z", revision_history: [ { date: "2024-05-10T07:19:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", product_id: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", product: { name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", product_id: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", product: { name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", product_id: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", product: { name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", product_id: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", product: { name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", product_id: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_118-default-13-150300.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_118-preempt-13-150300.2.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_118-preempt-13-150300.2.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_118-preempt-13-150300.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_55-default-14-150400.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_66-default-11-150400.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_60-default-13-150400.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", product_id: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-150300_59_121-preempt-13-150300.2.1.x86_64", product: { name: "kernel-livepatch-5_3_18-150300_59_121-preempt-13-150300.2.1.x86_64", product_id: "kernel-livepatch-5_3_18-150300_59_121-preempt-13-150300.2.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", product: { name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", product_id: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP3", product: { name: "SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP4", product: { name: "SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP5", product: { name: "SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", product_id: "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", }, product_reference: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", product_id: "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", }, product_reference: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP5", product_id: "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", }, product_reference: "kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2023-5717", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2023-5717", }, ], notes: [ { category: "general", text: "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2023-5717", url: "https://www.suse.com/security/cve/CVE-2023-5717", }, { category: "external", summary: "SUSE Bug 1216584 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216584", }, { category: "external", summary: "SUSE Bug 1216644 for CVE-2023-5717", url: "https://bugzilla.suse.com/1216644", }, { category: "external", summary: "SUSE Bug 1217557 for CVE-2023-5717", url: "https://bugzilla.suse.com/1217557", }, { category: "external", summary: "SUSE Bug 1219697 for CVE-2023-5717", url: "https://bugzilla.suse.com/1219697", }, { category: "external", summary: "SUSE Bug 1220191 for CVE-2023-5717", url: "https://bugzilla.suse.com/1220191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:19:19Z", details: "important", }, ], title: "CVE-2023-5717", }, { cve: "CVE-2024-0775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-0775", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-0775", url: "https://www.suse.com/security/cve/CVE-2024-0775", }, { category: "external", summary: "SUSE Bug 1219053 for CVE-2024-0775", url: "https://bugzilla.suse.com/1219053", }, { category: "external", summary: "SUSE Bug 1219082 for CVE-2024-0775", url: "https://bugzilla.suse.com/1219082", }, { category: "external", summary: "SUSE Bug 1224298 for CVE-2024-0775", url: "https://bugzilla.suse.com/1224298", }, { category: "external", summary: "SUSE Bug 1224878 for CVE-2024-0775", url: "https://bugzilla.suse.com/1224878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:19:19Z", details: "important", }, ], title: "CVE-2024-0775", }, { cve: "CVE-2024-1086", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-1086", }, ], notes: [ { category: "general", text: "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-1086", url: "https://www.suse.com/security/cve/CVE-2024-1086", }, { category: "external", summary: "SUSE Bug 1219434 for CVE-2024-1086", url: "https://bugzilla.suse.com/1219434", }, { category: "external", summary: "SUSE Bug 1219435 for CVE-2024-1086", url: "https://bugzilla.suse.com/1219435", }, { category: "external", summary: "SUSE Bug 1224298 for CVE-2024-1086", url: "https://bugzilla.suse.com/1224298", }, { category: "external", summary: "SUSE Bug 1224878 for CVE-2024-1086", url: "https://bugzilla.suse.com/1224878", }, { category: "external", summary: "SUSE Bug 1226066 for CVE-2024-1086", url: "https://bugzilla.suse.com/1226066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:19:19Z", details: "important", }, ], title: "CVE-2024-1086", }, { cve: "CVE-2024-26622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-26622", }, ], notes: [ { category: "general", text: "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head->write_buf when write()\nof long lines is requested, we need to fetch head->write_buf after\nhead->io_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-26622", url: "https://www.suse.com/security/cve/CVE-2024-26622", }, { category: "external", summary: "SUSE Bug 1220825 for CVE-2024-26622", url: "https://bugzilla.suse.com/1220825", }, { category: "external", summary: "SUSE Bug 1220828 for CVE-2024-26622", url: "https://bugzilla.suse.com/1220828", }, { category: "external", summary: "SUSE Bug 1224298 for CVE-2024-26622", url: "https://bugzilla.suse.com/1224298", }, { category: "external", summary: "SUSE Bug 1224878 for CVE-2024-26622", url: "https://bugzilla.suse.com/1224878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_121-default-13-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_69-default-10-150400.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_53-default-11-150500.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-05-10T07:19:19Z", details: "important", }, ], title: "CVE-2024-26622", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.