RHSA-2024:8856: Low: SUSE Liberty Linux security update for kernel
Update Advisories for SUSE Liberty Linux
suse-liberty-linux-updates at lists.suse.com
Fri Nov 8 16:05:59 UTC 2024
# security update for kernel
Announcement ID: RHSA-2024:8856
Rating: Low
Cross-References:
* CVE-2022-48773
* CVE-2022-48936
* CVE-2023-52492
* CVE-2024-24857
* CVE-2024-26851
* CVE-2024-26924
* CVE-2024-26976
* CVE-2024-27017
* CVE-2024-27062
* CVE-2024-35839
* CVE-2024-35898
* CVE-2024-35939
* CVE-2024-38540
* CVE-2024-38541
* CVE-2024-38586
* CVE-2024-38608
* CVE-2024-39503
* CVE-2024-40924
* CVE-2024-40961
* CVE-2024-40983
* CVE-2024-40984
* CVE-2024-41009
* CVE-2024-41042
* CVE-2024-41066
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-42070
* CVE-2024-42079
* CVE-2024-42244
* CVE-2024-42284
* CVE-2024-42292
* CVE-2024-42301
* CVE-2024-43854
* CVE-2024-43880
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-44935
* CVE-2024-44989
* CVE-2024-44990
* CVE-2024-45018
* CVE-2024-46826
* CVE-2024-47668
CVSS scores:
* CVE-2022-48773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24857 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38608 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-39503 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-41066 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42079 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-47668 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Affected Products:
* SUSE Liberty Linux 8
An update that solves 42 vulnerabilities can now be installed.
## Description:
This security update provides a functional equivalent of RHSA-2024:8856.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8856.
## Package List:
* SUSE Liberty Linux 8:
* bpftool 4.18.0-553.27.1.el8_10
* kernel 4.18.0-553.27.1.el8_10
* kernel-abi-stablelists 4.18.0-553.27.1.el8_10
* kernel-core 4.18.0-553.27.1.el8_10
* kernel-cross-headers 4.18.0-553.27.1.el8_10
* kernel-debug 4.18.0-553.27.1.el8_10
* kernel-debug-core 4.18.0-553.27.1.el8_10
* kernel-debug-devel 4.18.0-553.27.1.el8_10
* kernel-debug-modules 4.18.0-553.27.1.el8_10
* kernel-debug-modules-extra 4.18.0-553.27.1.el8_10
* kernel-devel 4.18.0-553.27.1.el8_10
* kernel-doc 4.18.0-553.27.1.el8_10
* kernel-headers 4.18.0-553.27.1.el8_10
* kernel-modules 4.18.0-553.27.1.el8_10
* kernel-modules-extra 4.18.0-553.27.1.el8_10
* kernel-tools 4.18.0-553.27.1.el8_10
* kernel-tools-libs 4.18.0-553.27.1.el8_10
* kernel-tools-libs-devel 4.18.0-553.27.1.el8_10
* perf 4.18.0-553.27.1.el8_10
* python3-perf 4.18.0-553.27.1.el8_10
## References:
* https://www.suse.com/security/cve/CVE-2022-48773.html
* https://www.suse.com/security/cve/CVE-2022-48936.html
* https://www.suse.com/security/cve/CVE-2023-52492.html
* https://www.suse.com/security/cve/CVE-2024-24857.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-26924.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-35839.html
* https://www.suse.com/security/cve/CVE-2024-35898.html
* https://www.suse.com/security/cve/CVE-2024-35939.html
* https://www.suse.com/security/cve/CVE-2024-38540.html
* https://www.suse.com/security/cve/CVE-2024-38541.html
* https://www.suse.com/security/cve/CVE-2024-38586.html
* https://www.suse.com/security/cve/CVE-2024-38608.html
* https://www.suse.com/security/cve/CVE-2024-39503.html
* https://www.suse.com/security/cve/CVE-2024-40924.html
* https://www.suse.com/security/cve/CVE-2024-40961.html
* https://www.suse.com/security/cve/CVE-2024-40983.html
* https://www.suse.com/security/cve/CVE-2024-40984.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41042.html
* https://www.suse.com/security/cve/CVE-2024-41066.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-42070.html
* https://www.suse.com/security/cve/CVE-2024-42079.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-44935.html
* https://www.suse.com/security/cve/CVE-2024-44989.html
* https://www.suse.com/security/cve/CVE-2024-44990.html
* https://www.suse.com/security/cve/CVE-2024-45018.html
* https://www.suse.com/security/cve/CVE-2024-46826.html
* https://www.suse.com/security/cve/CVE-2024-47668.html
More information about the suse-liberty-linux-updates
mailing list