Bugzilla – Bug 1215420
VUL-0: CVE-2023-4244: kernel-source-rt,kernel-source-azure,kernel-source: netfilter: nf_tables UAF
Last modified: 2025-06-18 23:42:27 UTC
CVE-2023-4244 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4244 https://bugzilla.redhat.com/show_bug.cgi?id=2235306 https://bugzilla.redhat.com/show_bug.cgi?id=2237755 https://www.cve.org/CVERecord?id=CVE-2023-4244 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8 https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
dup of bug 1214727 likely. can you add this CVE to all the references please as this is now the primary CVE.
bsc#1214727 bsc#1215420 CVE-2023-4563 CVE-2023-4244 introduced cfed7e1b1f8e 4.1-rc1 fixed 5f68718b34a5 6.5-rc6 SLE15-SP6 6.4.11 SLE15-SP4 7ff6f04055b9 (merged) cve/linux-5.3 * cve/linux-4.12 * cve/linux-4.4 * The backports into 5.3, 4.12 and 4.4 based branches will be more tricky because of significant rewrites of the nftables code (not to mention that even the 5.14 backport required 5 follow-up patches and a kabi hack).
SUSE-SU-2023:4732-1: An update that solves 15 vulnerabilities, contains three features and has 39 security fixes can now be installed. Category: security (important) Bug References: 1207948, 1210447, 1212649, 1214286, 1214700, 1214840, 1214976, 1215095, 1215123, 1215124, 1215292, 1215420, 1215458, 1215710, 1215802, 1215931, 1216058, 1216105, 1216259, 1216527, 1216584, 1216621, 1216687, 1216693, 1216759, 1216761, 1216788, 1216844, 1216861, 1216909, 1216959, 1216965, 1216976, 1217036, 1217068, 1217086, 1217095, 1217124, 1217140, 1217147, 1217195, 1217196, 1217200, 1217205, 1217332, 1217366, 1217511, 1217515, 1217598, 1217599, 1217609, 1217687, 1217731, 1217780 CVE References: CVE-2023-2006, CVE-2023-25775, CVE-2023-3777, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45863, CVE-2023-45871, CVE-2023-46813, CVE-2023-46862, CVE-2023-5158, CVE-2023-5633, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 Jira References: PED-3184, PED-5021, PED-7237 Sources used: openSUSE Leap 15.5 (src): kernel-source-rt-5.14.21-150500.13.27.2, kernel-syms-rt-5.14.21-150500.13.27.1, kernel-livepatch-SLE15-SP5-RT_Update_8-1-150500.11.3.2 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_8-1-150500.11.3.2 SUSE Real Time Module 15-SP5 (src): kernel-source-rt-5.14.21-150500.13.27.2, kernel-syms-rt-5.14.21-150500.13.27.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4731-1: An update that solves 12 vulnerabilities, contains three features and has 28 security fixes can now be installed. Category: security (important) Bug References: 1084909, 1189998, 1210447, 1214286, 1214976, 1215124, 1215292, 1215420, 1215458, 1215710, 1216058, 1216105, 1216259, 1216584, 1216693, 1216759, 1216761, 1216844, 1216861, 1216909, 1216959, 1216965, 1216976, 1217036, 1217068, 1217086, 1217124, 1217140, 1217195, 1217200, 1217205, 1217332, 1217366, 1217515, 1217598, 1217599, 1217609, 1217687, 1217731, 1217780 CVE References: CVE-2023-2006, CVE-2023-25775, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45863, CVE-2023-45871, CVE-2023-46862, CVE-2023-5158, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 Jira References: PED-3184, PED-5021, PED-7237 Sources used: openSUSE Leap 15.4 (src): kernel-source-rt-5.14.21-150400.15.62.1, kernel-syms-rt-5.14.21-150400.15.62.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_16-1-150400.1.3.1 SUSE Real Time Module 15-SP4 (src): kernel-source-rt-5.14.21-150400.15.62.1, kernel-syms-rt-5.14.21-150400.15.62.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4734-1: An update that solves 13 vulnerabilities, contains three features and has 38 security fixes can now be installed. Category: security (important) Bug References: 1084909, 1207948, 1210447, 1214286, 1214700, 1214840, 1214976, 1215123, 1215124, 1215292, 1215420, 1215458, 1215710, 1215802, 1215931, 1216058, 1216105, 1216259, 1216527, 1216584, 1216687, 1216693, 1216759, 1216788, 1216844, 1216861, 1216909, 1216959, 1216965, 1216976, 1217036, 1217068, 1217086, 1217095, 1217124, 1217140, 1217147, 1217195, 1217196, 1217200, 1217205, 1217332, 1217366, 1217511, 1217515, 1217598, 1217599, 1217609, 1217687, 1217731, 1217780 CVE References: CVE-2023-2006, CVE-2023-25775, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45863, CVE-2023-45871, CVE-2023-46862, CVE-2023-5158, CVE-2023-5633, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 Jira References: PED-3184, PED-5021, PED-7237 Sources used: openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.26.1, kernel-source-azure-5.14.21-150500.33.26.1 Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.26.1, kernel-source-azure-5.14.21-150500.33.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4730-1: An update that solves 13 vulnerabilities, contains three features and has 38 security fixes can now be installed. Category: security (important) Bug References: 1084909, 1207948, 1210447, 1214286, 1214700, 1214840, 1214976, 1215123, 1215124, 1215292, 1215420, 1215458, 1215710, 1215802, 1215931, 1216058, 1216105, 1216259, 1216527, 1216584, 1216687, 1216693, 1216759, 1216788, 1216844, 1216861, 1216909, 1216959, 1216965, 1216976, 1217036, 1217068, 1217086, 1217095, 1217124, 1217140, 1217147, 1217195, 1217196, 1217200, 1217205, 1217332, 1217366, 1217511, 1217515, 1217598, 1217599, 1217609, 1217687, 1217731, 1217780 CVE References: CVE-2023-2006, CVE-2023-25775, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45863, CVE-2023-45871, CVE-2023-46862, CVE-2023-5158, CVE-2023-5633, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 Jira References: PED-3184, PED-5021, PED-7237 Sources used: openSUSE Leap 15.5 (src): kernel-syms-5.14.21-150500.55.39.1, kernel-source-5.14.21-150500.55.39.1, kernel-livepatch-SLE15-SP5_Update_8-1-150500.11.3.1, kernel-obs-build-5.14.21-150500.55.39.1, kernel-obs-qa-5.14.21-150500.55.39.1, kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.39.1, kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.39.1, kernel-syms-5.14.21-150500.55.39.1, kernel-obs-build-5.14.21-150500.55.39.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_8-1-150500.11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4782-1: An update that solves 12 vulnerabilities, contains three features and has 25 security fixes can now be installed. Category: security (important) Bug References: 1210447, 1214286, 1214976, 1215124, 1215292, 1215420, 1215458, 1215710, 1216058, 1216105, 1216259, 1216584, 1216693, 1216759, 1216844, 1216861, 1216909, 1216959, 1216965, 1216976, 1217036, 1217068, 1217086, 1217124, 1217140, 1217195, 1217200, 1217205, 1217332, 1217366, 1217515, 1217598, 1217599, 1217609, 1217687, 1217731, 1217780 CVE References: CVE-2023-2006, CVE-2023-25775, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45863, CVE-2023-45871, CVE-2023-46862, CVE-2023-5158, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 Jira References: PED-3184, PED-5021, PED-7237 Sources used: openSUSE Leap 15.4 (src): kernel-source-azure-5.14.21-150400.14.75.1, kernel-syms-azure-5.14.21-150400.14.75.1 Public Cloud Module 15-SP4 (src): kernel-source-azure-5.14.21-150400.14.75.1, kernel-syms-azure-5.14.21-150400.14.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4810-1: An update that solves 12 vulnerabilities, contains three features and has 26 security fixes can now be installed. Category: security (important) Bug References: 1084909, 1210447, 1214286, 1214976, 1215124, 1215292, 1215420, 1215458, 1215710, 1216058, 1216105, 1216259, 1216584, 1216693, 1216759, 1216844, 1216861, 1216909, 1216959, 1216965, 1216976, 1217036, 1217068, 1217086, 1217124, 1217140, 1217195, 1217200, 1217205, 1217332, 1217366, 1217515, 1217598, 1217599, 1217609, 1217687, 1217731, 1217780 CVE References: CVE-2023-2006, CVE-2023-25775, CVE-2023-39197, CVE-2023-39198, CVE-2023-4244, CVE-2023-45863, CVE-2023-45871, CVE-2023-46862, CVE-2023-5158, CVE-2023-5717, CVE-2023-6039, CVE-2023-6176 Jira References: PED-3184, PED-5021, PED-7237 Sources used: openSUSE Leap 15.4 (src): kernel-obs-qa-5.14.21-150400.24.100.1, kernel-obs-build-5.14.21-150400.24.100.2, kernel-syms-5.14.21-150400.24.100.1, kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2, kernel-source-5.14.21-150400.24.100.2, kernel-livepatch-SLE15-SP4_Update_21-1-150400.9.3.2 openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 openSUSE Leap Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 Basesystem Module 15-SP4 (src): kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2, kernel-source-5.14.21-150400.24.100.2 Development Tools Module 15-SP4 (src): kernel-source-5.14.21-150400.24.100.2, kernel-obs-build-5.14.21-150400.24.100.2, kernel-syms-5.14.21-150400.24.100.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_21-1-150400.9.3.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Should be done next week. It taken time since we have CVEs flood
So, here's the plan: a) Detail out what the real issue is (ie how the vuln comes about). The commit details are ever so sketchy, so it would be good to have something with the actual function names etc. b) Check if this scenario still applies for a 4.4 based kernel. c) See if we can come up with a simpler solution for a 4.4 based kernel, seeing that most of the infrastructure for the upstream fix is not available. Michal, can you give us a hand with a) ?
Created attachment 875370 [details] 0001-netfilter-implement-reference-counting-for-nft_sets.patch netfilter: implement reference counting for nft_sets
Created attachment 875371 [details] 0002-netfilter-take-a-reference-when-looking-up-nft_sets.patch netfilter: take a reference when looking up nft_sets.
A slightly different approach: There actually is a hole in the nft_set structure due to cacheline alignment, so we can shove in a reference counter there. And if we now take a reference everytime we're looking up a nft_set (and releasing it afterwards) we should be insulated against UAFs. Michal, what do you think?
SUSE-SU-2024:2010-1: An update that solves 186 vulnerabilities and has 27 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1151927, 1152472, 1154353, 1156395, 1174585, 1176447, 1176774, 1176869, 1178134, 1181147, 1184631, 1185589, 1185902, 1186885, 1188616, 1188772, 1189883, 1190795, 1191452, 1192107, 1194288, 1194591, 1196956, 1197760, 1198029, 1199304, 1200619, 1203389, 1206646, 1209657, 1210335, 1210629, 1213476, 1215420, 1216702, 1217169, 1220137, 1220144, 1220754, 1220877, 1220960, 1221044, 1221113, 1221829, 1222251, 1222619, 1222838, 1222867, 1223084, 1223138, 1223384, 1223390, 1223512, 1223626, 1223715, 1223932, 1223934, 1224099, 1224174, 1224438, 1224482, 1224511, 1224592, 1224816, 1224826, 1224830, 1224831, 1224832, 1224834, 1224841, 1224842, 1224843, 1224844, 1224846, 1224849, 1224852, 1224853, 1224854, 1224859, 1224882, 1224886, 1224888, 1224889, 1224891, 1224892, 1224893, 1224899, 1224904, 1224907, 1224909, 1224916, 1224917, 1224922, 1224923, 1224924, 1224926, 1224928, 1224953, 1224954, 1224955, 1224957, 1224961, 1224963, 1224965, 1224966, 1224968, 1224981, 1224982, 1224983, 1224984, 1224987, 1224990, 1224993, 1224996, 1224997, 1225026, 1225030, 1225058, 1225060, 1225083, 1225084, 1225091, 1225112, 1225113, 1225128, 1225140, 1225143, 1225148, 1225155, 1225164, 1225177, 1225178, 1225181, 1225192, 1225193, 1225198, 1225201, 1225206, 1225207, 1225208, 1225214, 1225223, 1225224, 1225230, 1225232, 1225233, 1225237, 1225238, 1225243, 1225244, 1225247, 1225251, 1225252, 1225256, 1225261, 1225262, 1225263, 1225301, 1225303, 1225316, 1225318, 1225320, 1225321, 1225322, 1225326, 1225327, 1225328, 1225330, 1225333, 1225336, 1225341, 1225346, 1225351, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225369, 1225370, 1225372, 1225374, 1225384, 1225386, 1225387, 1225390, 1225393, 1225400, 1225404, 1225405, 1225409, 1225411, 1225424, 1225427, 1225435, 1225437, 1225438, 1225439, 1225446, 1225447, 1225448, 1225450, 1225453, 1225455, 1225468, 1225499, 1225500, 1225508, 1225534 CVE References: CVE-2020-36788, CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47192, CVE-2021-47200, CVE-2021-47220, CVE-2021-47227, CVE-2021-47228, CVE-2021-47229, CVE-2021-47230, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47239, CVE-2021-47240, CVE-2021-47241, CVE-2021-47246, CVE-2021-47252, CVE-2021-47253, CVE-2021-47254, CVE-2021-47255, CVE-2021-47258, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47263, CVE-2021-47265, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47329, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47337, CVE-2021-47338, CVE-2021-47340, CVE-2021-47341, CVE-2021-47343, CVE-2021-47344, CVE-2021-47347, CVE-2021-47348, CVE-2021-47350, CVE-2021-47353, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47387, CVE-2021-47388, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47409, CVE-2021-47413, CVE-2021-47416, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47428, CVE-2021-47431, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47451, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47509, CVE-2021-47511, CVE-2021-47512, CVE-2021-47516, CVE-2021-47518, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47527, CVE-2021-47535, CVE-2021-47536, CVE-2021-47538, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47549, CVE-2021-47557, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-1195, CVE-2022-20132, CVE-2022-48636, CVE-2022-48673, CVE-2022-48704, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26921, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914 Maintenance Incident: [SUSE:Maintenance:34219](https://smelt.suse.de/incident/34219/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): kernel-source-rt-5.3.18-150300.172.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-source-rt-5.3.18-150300.172.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-source-rt-5.3.18-150300.172.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
(In reply to Hannes Reinecke from comment #70) > Created attachment 875371 [details] > 0002-netfilter-take-a-reference-when-looking-up-nft_sets.patch > > netfilter: take a reference when looking up nft_sets. What is the result of this patch? Was it at least functionality-tested against regression?
Denis, can you setup a simple testbed for netfilters to check the patch?
(In reply to Hannes Reinecke from comment #77) > Denis, can you setup a simple testbed for netfilters to check the patch? Sure, going to test it shortly
SUSE-SU-2024:2183-1: An update that solves 131 vulnerabilities and has 13 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1151927, 1154353, 1156395, 1174585, 1176869, 1184631, 1185589, 1185902, 1188616, 1188772, 1189883, 1190795, 1191452, 1192107, 1194288, 1196956, 1200619, 1208813, 1209657, 1210335, 1210629, 1215356, 1215420, 1216702, 1217169, 1220137, 1220144, 1220754, 1220877, 1220960, 1221044, 1221829, 1222251, 1222619, 1223084, 1223384, 1223390, 1223934, 1224099, 1224174, 1224438, 1224482, 1224511, 1224592, 1224831, 1224832, 1224834, 1224841, 1224843, 1224846, 1224849, 1224854, 1224859, 1224882, 1224888, 1224889, 1224891, 1224892, 1224893, 1224904, 1224907, 1224909, 1224916, 1224917, 1224922, 1224923, 1224924, 1224928, 1224953, 1224954, 1224961, 1224963, 1224965, 1224966, 1224968, 1224981, 1224982, 1224984, 1224987, 1224990, 1224993, 1224996, 1224997, 1225026, 1225030, 1225058, 1225060, 1225084, 1225091, 1225112, 1225113, 1225140, 1225143, 1225164, 1225177, 1225181, 1225192, 1225193, 1225201, 1225206, 1225207, 1225208, 1225214, 1225223, 1225224, 1225232, 1225238, 1225244, 1225251, 1225256, 1225261, 1225262, 1225263, 1225301, 1225303, 1225318, 1225321, 1225326, 1225327, 1225328, 1225336, 1225341, 1225346, 1225351, 1225354, 1225355, 1225360, 1225366, 1225367, 1225384, 1225390, 1225393, 1225400, 1225404, 1225411, 1225427, 1225437, 1225448, 1225453, 1225455, 1225499, 1225500, 1225534 CVE References: CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47220, CVE-2021-47229, CVE-2021-47231, CVE-2021-47236, CVE-2021-47239, CVE-2021-47240, CVE-2021-47246, CVE-2021-47252, CVE-2021-47254, CVE-2021-47255, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47338, CVE-2021-47341, CVE-2021-47344, CVE-2021-47347, CVE-2021-47350, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47388, CVE-2021-47391, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47416, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47431, CVE-2021-47434, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47445, CVE-2021-47456, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47500, CVE-2021-47505, CVE-2021-47506, CVE-2021-47511, CVE-2021-47516, CVE-2021-47522, CVE-2021-47527, CVE-2021-47538, CVE-2021-47541, CVE-2021-47542, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-20132, CVE-2022-48673, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-424, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914 Maintenance Incident: [SUSE:Maintenance:34159](https://smelt.suse.de/incident/34159/) Sources used: SUSE Linux Enterprise Live Patching 15-SP2 (src): kernel-livepatch-SLE15-SP2_Update_49-1-150200.5.3.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): kernel-obs-build-5.3.18-150200.24.194.1, kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1, kernel-source-5.3.18-150200.24.194.1, kernel-syms-5.3.18-150200.24.194.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): kernel-obs-build-5.3.18-150200.24.194.1, kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1, kernel-source-5.3.18-150200.24.194.1, kernel-syms-5.3.18-150200.24.194.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-obs-build-5.3.18-150200.24.194.1, kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1, kernel-source-5.3.18-150200.24.194.1, kernel-syms-5.3.18-150200.24.194.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2185-1: An update that solves 187 vulnerabilities and has 26 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1151927, 1152472, 1154353, 1156395, 1174585, 1176447, 1176774, 1176869, 1178134, 1181147, 1184631, 1185570, 1185589, 1185902, 1186885, 1187357, 1188616, 1188772, 1189883, 1190795, 1191452, 1192107, 1194288, 1194591, 1196956, 1197760, 1198029, 1199304, 1200619, 1203389, 1206646, 1209657, 1210335, 1210629, 1213476, 1215420, 1216702, 1217169, 1220137, 1220144, 1220754, 1220877, 1220960, 1221044, 1221113, 1221829, 1222251, 1222619, 1222838, 1222867, 1223084, 1223138, 1223384, 1223390, 1223512, 1223932, 1223934, 1224099, 1224174, 1224438, 1224482, 1224511, 1224592, 1224816, 1224826, 1224830, 1224831, 1224832, 1224834, 1224841, 1224842, 1224843, 1224844, 1224846, 1224849, 1224852, 1224853, 1224854, 1224859, 1224882, 1224886, 1224888, 1224889, 1224891, 1224892, 1224893, 1224899, 1224904, 1224907, 1224909, 1224916, 1224917, 1224922, 1224923, 1224924, 1224926, 1224928, 1224953, 1224954, 1224955, 1224957, 1224961, 1224963, 1224965, 1224966, 1224968, 1224981, 1224982, 1224983, 1224984, 1224987, 1224990, 1224993, 1224996, 1224997, 1225026, 1225030, 1225058, 1225060, 1225083, 1225084, 1225091, 1225112, 1225113, 1225128, 1225140, 1225143, 1225148, 1225155, 1225164, 1225177, 1225178, 1225181, 1225192, 1225193, 1225198, 1225201, 1225206, 1225207, 1225208, 1225214, 1225223, 1225224, 1225230, 1225232, 1225233, 1225237, 1225238, 1225243, 1225244, 1225247, 1225251, 1225252, 1225256, 1225261, 1225262, 1225263, 1225301, 1225303, 1225316, 1225318, 1225320, 1225321, 1225322, 1225326, 1225327, 1225328, 1225330, 1225333, 1225336, 1225341, 1225346, 1225351, 1225354, 1225355, 1225357, 1225358, 1225360, 1225361, 1225366, 1225367, 1225369, 1225370, 1225372, 1225374, 1225384, 1225386, 1225387, 1225390, 1225393, 1225400, 1225404, 1225405, 1225409, 1225411, 1225424, 1225427, 1225435, 1225437, 1225438, 1225439, 1225446, 1225447, 1225448, 1225450, 1225453, 1225455, 1225468, 1225499, 1225500, 1225508, 1225534 CVE References: CVE-2020-36788, CVE-2021-3743, CVE-2021-39698, CVE-2021-43056, CVE-2021-47104, CVE-2021-47192, CVE-2021-47200, CVE-2021-47220, CVE-2021-47227, CVE-2021-47228, CVE-2021-47229, CVE-2021-47230, CVE-2021-47231, CVE-2021-47235, CVE-2021-47236, CVE-2021-47237, CVE-2021-47239, CVE-2021-47240, CVE-2021-47241, CVE-2021-47246, CVE-2021-47252, CVE-2021-47253, CVE-2021-47254, CVE-2021-47255, CVE-2021-47258, CVE-2021-47259, CVE-2021-47260, CVE-2021-47261, CVE-2021-47263, CVE-2021-47265, CVE-2021-47267, CVE-2021-47269, CVE-2021-47270, CVE-2021-47274, CVE-2021-47275, CVE-2021-47276, CVE-2021-47280, CVE-2021-47281, CVE-2021-47284, CVE-2021-47285, CVE-2021-47288, CVE-2021-47289, CVE-2021-47296, CVE-2021-47301, CVE-2021-47302, CVE-2021-47305, CVE-2021-47307, CVE-2021-47308, CVE-2021-47314, CVE-2021-47315, CVE-2021-47320, CVE-2021-47321, CVE-2021-47323, CVE-2021-47324, CVE-2021-47329, CVE-2021-47330, CVE-2021-47332, CVE-2021-47333, CVE-2021-47334, CVE-2021-47337, CVE-2021-47338, CVE-2021-47340, CVE-2021-47341, CVE-2021-47343, CVE-2021-47344, CVE-2021-47347, CVE-2021-47348, CVE-2021-47350, CVE-2021-47353, CVE-2021-47354, CVE-2021-47356, CVE-2021-47369, CVE-2021-47375, CVE-2021-47378, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47387, CVE-2021-47388, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47395, CVE-2021-47396, CVE-2021-47399, CVE-2021-47402, CVE-2021-47404, CVE-2021-47405, CVE-2021-47409, CVE-2021-47413, CVE-2021-47416, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47428, CVE-2021-47431, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47451, CVE-2021-47456, CVE-2021-47458, CVE-2021-47460, CVE-2021-47464, CVE-2021-47465, CVE-2021-47468, CVE-2021-47473, CVE-2021-47478, CVE-2021-47480, CVE-2021-47482, CVE-2021-47483, CVE-2021-47485, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47509, CVE-2021-47511, CVE-2021-47512, CVE-2021-47516, CVE-2021-47518, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47527, CVE-2021-47535, CVE-2021-47536, CVE-2021-47538, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47549, CVE-2021-47557, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2022-1195, CVE-2022-20132, CVE-2022-48636, CVE-2022-48673, CVE-2022-48704, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-2176, CVE-2023-424, CVE-2023-4244, CVE-2023-47233, CVE-2023-52433, CVE-2023-52581, CVE-2023-52591, CVE-2023-52654, CVE-2023-52655, CVE-2023-52686, CVE-2023-52840, CVE-2023-52871, CVE-2023-52880, CVE-2023-6531, CVE-2024-26581, CVE-2024-26643, CVE-2024-26828, CVE-2024-26921, CVE-2024-26925, CVE-2024-26929, CVE-2024-26930, CVE-2024-27398, CVE-2024-27413, CVE-2024-35811, CVE-2024-35895, CVE-2024-35914 Maintenance Incident: [SUSE:Maintenance:34168](https://smelt.suse.de/incident/34168/) Sources used: openSUSE Leap 15.3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-syms-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-livepatch-SLE15-SP3_Update_45-1-150300.7.3.1, kernel-source-5.3.18-150300.59.164.1, kernel-obs-qa-5.3.18-150300.59.164.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_45-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Enterprise Storage 7.1 (src): kernel-obs-build-5.3.18-150300.59.164.1, kernel-source-5.3.18-150300.59.164.1, kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1, kernel-syms-5.3.18-150300.59.164.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Created attachment 875824 [details] nft set test
(In reply to Denis Kirjanov from comment #87) > Created attachment 875824 [details] > nft set test Pushed to cve/4.4
SUSE-SU-2024:2493-1: An update that solves 28 vulnerabilities and has three security fixes can now be installed. Category: security (important) Bug References: 1215420, 1220833, 1221656, 1221659, 1222005, 1222792, 1223021, 1223188, 1224622, 1224627, 1224647, 1224683, 1224686, 1224743, 1224965, 1225229, 1225357, 1225431, 1225478, 1225505, 1225530, 1225532, 1225569, 1225593, 1225835, 1226757, 1226861, 1226994, 1227407, 1227435, 1227487 CVE References: CVE-2021-47145, CVE-2021-47201, CVE-2021-47275, CVE-2021-47438, CVE-2021-47498, CVE-2021-47520, CVE-2021-47547, CVE-2023-4244, CVE-2023-52507, CVE-2023-52683, CVE-2023-52693, CVE-2023-52753, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2024-26635, CVE-2024-26636, CVE-2024-26880, CVE-2024-35805, CVE-2024-35819, CVE-2024-35828, CVE-2024-35947, CVE-2024-36014, CVE-2024-36941, CVE-2024-38598, CVE-2024-38619, CVE-2024-39301, CVE-2024-39475 Maintenance Incident: [SUSE:Maintenance:34763](https://smelt.suse.de/incident/34763/) Sources used: SUSE Linux Enterprise Real Time 12 SP5 (src): kernel-syms-rt-4.12.14-10.194.1, kernel-source-rt-4.12.14-10.194.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2561-1: An update that solves 176 vulnerabilities and has 17 security fixes can now be installed. Category: security (important) Bug References: 1119113, 1171988, 1191958, 1195065, 1195254, 1195775, 1204514, 1215420, 1216062, 1217912, 1218148, 1219224, 1220833, 1221010, 1221647, 1221654, 1221656, 1221659, 1221791, 1221958, 1222005, 1222015, 1222080, 1222364, 1222385, 1222435, 1222792, 1222809, 1222866, 1222879, 1222893, 1223013, 1223018, 1223021, 1223043, 1223188, 1223384, 1223532, 1223641, 1224177, 1224432, 1224504, 1224549, 1224552, 1224572, 1224575, 1224583, 1224588, 1224605, 1224622, 1224627, 1224647, 1224651, 1224660, 1224661, 1224662, 1224664, 1224668, 1224670, 1224672, 1224674, 1224677, 1224678, 1224683, 1224686, 1224703, 1224735, 1224739, 1224743, 1224763, 1224764, 1224765, 1224946, 1224951, 1224965, 1224967, 1224976, 1224977, 1224978, 1224993, 1224997, 1225047, 1225140, 1225184, 1225203, 1225229, 1225232, 1225261, 1225306, 1225337, 1225357, 1225372, 1225431, 1225463, 1225478, 1225484, 1225487, 1225490, 1225505, 1225514, 1225518, 1225530, 1225532, 1225548, 1225555, 1225556, 1225559, 1225569, 1225571, 1225573, 1225577, 1225583, 1225585, 1225593, 1225599, 1225602, 1225611, 1225642, 1225681, 1225704, 1225722, 1225749, 1225758, 1225760, 1225761, 1225767, 1225770, 1225815, 1225835, 1225840, 1225848, 1225866, 1225872, 1225894, 1225895, 1225898, 1226211, 1226212, 1226537, 1226554, 1226557, 1226562, 1226567, 1226575, 1226577, 1226593, 1226595, 1226597, 1226610, 1226614, 1226619, 1226621, 1226634, 1226637, 1226670, 1226672, 1226692, 1226698, 1226699, 1226701, 1226705, 1226708, 1226711, 1226712, 1226716, 1226718, 1226732, 1226735, 1226744, 1226746, 1226747, 1226749, 1226754, 1226757, 1226767, 1226769, 1226857, 1226861, 1226876, 1226883, 1226886, 1226895, 1226948, 1226949, 1226950, 1226962, 1226976, 1226994, 1226996, 1227101, 1227407, 1227435, 1227487 CVE References: CVE-2020-10135, CVE-2021-43389, CVE-2021-4439, CVE-2021-47103, CVE-2021-47145, CVE-2021-47191, CVE-2021-47193, CVE-2021-47201, CVE-2021-47267, CVE-2021-47270, CVE-2021-47275, CVE-2021-47293, CVE-2021-47294, CVE-2021-47297, CVE-2021-47309, CVE-2021-47328, CVE-2021-47354, CVE-2021-47372, CVE-2021-47379, CVE-2021-47407, CVE-2021-47418, CVE-2021-47434, CVE-2021-47438, CVE-2021-47445, CVE-2021-47498, CVE-2021-47518, CVE-2021-47520, CVE-2021-47544, CVE-2021-47547, CVE-2021-47566, CVE-2021-47571, CVE-2021-47576, CVE-2021-47587, CVE-2021-47589, CVE-2021-47600, CVE-2021-47602, CVE-2021-47603, CVE-2021-47609, CVE-2021-47617, CVE-2022-0435, CVE-2022-22942, CVE-2022-48711, CVE-2022-48715, CVE-2022-48722, CVE-2022-48732, CVE-2022-48733, CVE-2022-48740, CVE-2022-48743, CVE-2022-48754, CVE-2022-48756, CVE-2022-48758, CVE-2022-48759, CVE-2022-48760, CVE-2022-48761, CVE-2022-48771, CVE-2022-48772, CVE-2023-24023, CVE-2023-4244, CVE-2023-52507, CVE-2023-52622, CVE-2023-52675, CVE-2023-52683, CVE-2023-52693, CVE-2023-52737, CVE-2023-52752, CVE-2023-52753, CVE-2023-52754, CVE-2023-52757, CVE-2023-52762, CVE-2023-52764, CVE-2023-52784, CVE-2023-52808, CVE-2023-52809, CVE-2023-5281, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52832, CVE-2023-52834, CVE-2023-52835, CVE-2023-52843, CVE-2023-52845, CVE-2023-52855, CVE-2023-52881, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26679, CVE-2024-26687, CVE-2024-26720, CVE-2024-26813, CVE-2024-26845, CVE-2024-26863, CVE-2024-26880, CVE-2024-26894, CVE-2024-26923, CVE-2024-26928, CVE-2024-26973, CVE-2024-27399, CVE-2024-27410, CVE-2024-35247, CVE-2024-35805, CVE-2024-35807, CVE-2024-35819, CVE-2024-35822, CVE-2024-35828, CVE-2024-35835, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35867, CVE-2024-35868, CVE-2024-35870, CVE-2024-35886, CVE-2024-35896, CVE-2024-35922, CVE-2024-35925, CVE-2024-35930, CVE-2024-35947, CVE-2024-35950, CVE-2024-35956, CVE-2024-35958, CVE-2024-35960, CVE-2024-35962, CVE-2024-35976, CVE-2024-35979, CVE-2024-35997, CVE-2024-35998, CVE-2024-36014, CVE-2024-36016, CVE-2024-36017, CVE-2024-36025, CVE-2024-36479, CVE-2024-36880, CVE-2024-36894, CVE-2024-36915, CVE-2024-36917, CVE-2024-36919, CVE-2024-36923, CVE-2024-36934, CVE-2024-36938, CVE-2024-36940, CVE-2024-36941, CVE-2024-36949, CVE-2024-36950, CVE-2024-36952, CVE-2024-36960, CVE-2024-36964, CVE-2024-37021, CVE-2024-37354, CVE-2024-38544, CVE-2024-38545, CVE-2024-38546, CVE-2024-38549, CVE-2024-38552, CVE-2024-38553, CVE-2024-38565, CVE-2024-38567, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38597, CVE-2024-38598, CVE-2024-38601, CVE-2024-38608, CVE-2024-38618, CVE-2024-38619, CVE-2024-38621, CVE-2024-38627, CVE-2024-38659, CVE-2024-38661, CVE-2024-38780, CVE-2024-39301, CVE-2024-39475 Maintenance Incident: [SUSE:Maintenance:34719](https://smelt.suse.de/incident/34719/) Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kgraft-patch-SLE12-SP5_Update_58-1-8.3.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): kernel-obs-build-4.12.14-122.222.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-syms-4.12.14-122.222.1, kernel-source-4.12.14-122.222.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-syms-4.12.14-122.222.1, kernel-source-4.12.14-122.222.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-syms-4.12.14-122.222.1, kernel-source-4.12.14-122.222.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2901-1: An update that solves 178 vulnerabilities and has seven security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1 Category: security (important) Bug References: 1065729, 1088701, 1149446, 1179610, 1186463, 1196018, 1202346, 1215420, 1216834, 1220138, 1220833, 1220942, 1221045, 1221614, 1221616, 1221618, 1221656, 1221659, 1222005, 1222060, 1222317, 1222326, 1222372, 1222625, 1222776, 1222792, 1222824, 1222829, 1222866, 1223012, 1223021, 1223188, 1223778, 1223813, 1223815, 1224500, 1224512, 1224545, 1224557, 1224571, 1224576, 1224587, 1224622, 1224627, 1224637, 1224641, 1224647, 1224663, 1224683, 1224686, 1224699, 1224700, 1224743, 1224965, 1224975, 1225003, 1225214, 1225224, 1225229, 1225238, 1225241, 1225326, 1225328, 1225346, 1225357, 1225361, 1225396, 1225427, 1225431, 1225455, 1225478, 1225505, 1225530, 1225532, 1225569, 1225593, 1225711, 1225719, 1225767, 1225820, 1225835, 1225838, 1225898, 1226550, 1226553, 1226555, 1226559, 1226568, 1226571, 1226645, 1226757, 1226783, 1226786, 1226834, 1226861, 1226908, 1226994, 1227191, 1227213, 1227407, 1227435, 1227487, 1227573, 1227618, 1227626, 1227716, 1227725, 1227729, 1227730, 1227733, 1227750, 1227754, 1227762, 1227770, 1227771, 1227772, 1227774, 1227786, 1227790, 1227806, 1227824, 1227828, 1227830, 1227836, 1227849, 1227865, 1227866, 1227884, 1227886, 1227891, 1227913, 1227924, 1227928, 1227929, 1227936, 1227957, 1227968, 1227969, 1227975, 1227985, 1227989, 1228003, 1228005, 1228008, 1228013, 1228025, 1228030, 1228037, 1228045, 1228054, 1228055, 1228063, 1228071, 1228235, 1228237, 1228327, 1228328, 1228408, 1228409, 1228410, 1228470, 1228530, 1228561, 1228565, 1228567, 1228580, 1228581, 1228584, 1228588, 1228599, 1228617, 1228625, 1228626, 1228633, 1228640, 1228649, 1228655, 1228658, 1228662, 1228680, 1228705, 1228723, 1228726, 1228743, 1228850 CVE References: CVE-2020-26558, CVE-2021-0129, CVE-2021-47145, CVE-2021-47191, CVE-2021-47194, CVE-2021-47197, CVE-2021-47201, CVE-2021-47219, CVE-2021-47275, CVE-2021-47295, CVE-2021-47388, CVE-2021-47395, CVE-2021-47399, CVE-2021-47403, CVE-2021-47405, CVE-2021-47438, CVE-2021-47441, CVE-2021-47468, CVE-2021-47498, CVE-2021-47501, CVE-2021-47516, CVE-2021-47520, CVE-2021-47542, CVE-2021-47547, CVE-2021-47559, CVE-2021-47580, CVE-2021-47582, CVE-2021-47588, CVE-2021-47597, CVE-2021-47599, CVE-2021-47606, CVE-2021-47619, CVE-2022-20368, CVE-2022-28748, CVE-2022-2964, CVE-2022-48775, CVE-2022-48792, CVE-2022-48794, CVE-2022-48804, CVE-2022-48805, CVE-2022-48810, CVE-2022-48811, CVE-2022-48823, CVE-2022-48826, CVE-2022-48827, CVE-2022-48828, CVE-2022-48829, CVE-2022-48836, CVE-2022-48839, CVE-2022-48850, CVE-2022-48855, CVE-2022-48857, CVE-2022-48860, CVE-2022-48863, CVE-2023-4244, CVE-2023-52435, CVE-2023-52507, CVE-2023-52594, CVE-2023-52612, CVE-2023-52615, CVE-2023-52619, CVE-2023-52623, CVE-2023-52669, CVE-2023-52683, CVE-2023-52693, CVE-2023-52743, CVE-2023-52753, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52885, CVE-2024-26615, CVE-2024-26635, CVE-2024-26636, CVE-2024-26659, CVE-2024-26663, CVE-2024-26735, CVE-2024-26830, CVE-2024-26863, CVE-2024-26880, CVE-2024-26920, CVE-2024-26924, CVE-2024-27019, CVE-2024-27020, CVE-2024-27025, CVE-2024-27437, CVE-2024-35805, CVE-2024-35806, CVE-2024-35819, CVE-2024-35828, CVE-2024-35837, CVE-2024-35887, CVE-2024-35893, CVE-2024-35934, CVE-2024-35947, CVE-2024-35949, CVE-2024-35966, CVE-2024-35967, CVE-2024-35978, CVE-2024-35995, CVE-2024-36004, CVE-2024-36014, CVE-2024-36288, CVE-2024-36592, CVE-2024-36901, CVE-2024-36902, CVE-2024-36919, CVE-2024-36924, CVE-2024-36939, CVE-2024-36941, CVE-2024-36952, CVE-2024-38558, CVE-2024-38560, CVE-2024-38598, CVE-2024-38619, CVE-2024-38630, CVE-2024-39301, CVE-2024-39475, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39494, CVE-2024-39499, CVE-2024-39501, CVE-2024-39506, CVE-2024-39507, CVE-2024-39509, CVE-2024-40901, CVE-2024-40904, CVE-2024-40912, CVE-2024-40923, CVE-2024-40929, CVE-2024-40932, CVE-2024-40937, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40953, CVE-2024-40959, CVE-2024-40966, CVE-2024-40967, CVE-2024-40978, CVE-2024-40982, CVE-2024-40987, CVE-2024-40988, CVE-2024-40990, CVE-2024-40995, CVE-2024-40998, CVE-2024-40999, CVE-2024-41014, CVE-2024-41015, CVE-2024-41016, CVE-2024-41044, CVE-2024-41048, CVE-2024-41059, CVE-2024-41060, CVE-2024-41063, CVE-2024-41064, CVE-2024-41066, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41076, CVE-2024-41078, CVE-2024-41081, CVE-2024-41089, CVE-2024-41090, CVE-2024-41091, CVE-2024-41095, CVE-2024-42070, CVE-2024-42093, CVE-2024-42096, CVE-2024-42119, CVE-2024-42120, CVE-2024-42124, CVE-2024-42145, CVE-2024-42223, CVE-2024-42224 Maintenance Incident: [SUSE:Maintenance:35218](https://smelt.suse.de/incident/35218/) Sources used: SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-source-azure-4.12.14-16.194.1, kernel-syms-azure-4.12.14-16.194.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-source-azure-4.12.14-16.194.1, kernel-syms-azure-4.12.14-16.194.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-source-azure-4.12.14-16.194.1, kernel-syms-azure-4.12.14-16.194.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2025:0517-1: An update that solves 16 vulnerabilities and has one security fix can now be installed. URL: https://www.suse.com/support/update/announcement/2025/suse-su-20250517-1 Category: security (important) Bug References: 1215420, 1224763, 1231847, 1233112, 1234025, 1235217, 1235230, 1235249, 1235430, 1235441, 1235466, 1235645, 1235759, 1235814, 1235818, 1235920, 1236104 CVE References: CVE-2023-4244, CVE-2023-52923, CVE-2024-35863, CVE-2024-50199, CVE-2024-53104, CVE-2024-56600, CVE-2024-56601, CVE-2024-56623, CVE-2024-56650, CVE-2024-56658, CVE-2024-56664, CVE-2024-56759, CVE-2024-57791, CVE-2024-57798, CVE-2024-57849, CVE-2024-57893 Maintenance Incident: [SUSE:Maintenance:37380](https://smelt.suse.de/incident/37380/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1 openSUSE Leap 15.3 (src): kernel-source-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1, kernel-obs-qa-5.3.18-150300.59.191.1, kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-syms-5.3.18-150300.59.191.1, kernel-livepatch-SLE15-SP3_Update_53-1-150300.7.3.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_53-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-source-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1, kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-syms-5.3.18-150300.59.191.1 SUSE Linux Enterprise Server 15 SP3 LTSS (src): kernel-source-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1, kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-syms-5.3.18-150300.59.191.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-source-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1, kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-syms-5.3.18-150300.59.191.1 SUSE Enterprise Storage 7.1 (src): kernel-source-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1, kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-syms-5.3.18-150300.59.191.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2025:0517-2: An update that solves 16 vulnerabilities and has one security fix can now be installed. URL: https://www.suse.com/support/update/announcement/2025/suse-su-20250517-2 Category: security (important) Bug References: 1215420, 1224763, 1231847, 1233112, 1234025, 1235217, 1235230, 1235249, 1235430, 1235441, 1235466, 1235645, 1235759, 1235814, 1235818, 1235920, 1236104 CVE References: CVE-2023-4244, CVE-2023-52923, CVE-2024-35863, CVE-2024-50199, CVE-2024-53104, CVE-2024-56600, CVE-2024-56601, CVE-2024-56623, CVE-2024-56650, CVE-2024-56658, CVE-2024-56664, CVE-2024-56759, CVE-2024-57791, CVE-2024-57798, CVE-2024-57849, CVE-2024-57893 Maintenance Incident: [SUSE:Maintenance:37380](https://smelt.suse.de/incident/37380/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1 openSUSE Leap 15.3 (src): kernel-livepatch-SLE15-SP3_Update_53-1-150300.7.3.1, kernel-obs-qa-5.3.18-150300.59.191.1, kernel-syms-5.3.18-150300.59.191.1, kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-source-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_53-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-source-5.3.18-150300.59.191.1, kernel-syms-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1 SUSE Linux Enterprise Server 15 SP3 LTSS (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-source-5.3.18-150300.59.191.1, kernel-syms-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-source-5.3.18-150300.59.191.1, kernel-syms-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1 SUSE Enterprise Storage 7.1 (src): kernel-default-base-5.3.18-150300.59.191.1.150300.18.113.1, kernel-source-5.3.18-150300.59.191.1, kernel-syms-5.3.18-150300.59.191.1, kernel-obs-build-5.3.18-150300.59.191.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2025:0771-1: An update that solves 16 vulnerabilities and has two security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2025/suse-su-20250771-1 Category: security (important) Bug References: 1215420, 1224763, 1231847, 1233112, 1234025, 1235217, 1235230, 1235249, 1235430, 1235441, 1235466, 1235645, 1235759, 1235814, 1235818, 1235920, 1236104, 1237389 CVE References: CVE-2023-4244, CVE-2023-52923, CVE-2024-35863, CVE-2024-50199, CVE-2024-53104, CVE-2024-56600, CVE-2024-56601, CVE-2024-56623, CVE-2024-56650, CVE-2024-56658, CVE-2024-56664, CVE-2024-56759, CVE-2024-57791, CVE-2024-57798, CVE-2024-57849, CVE-2024-57893 Maintenance Incident: [SUSE:Maintenance:37686](https://smelt.suse.de/incident/37686/) Sources used: openSUSE Leap 15.3 (src): kernel-source-5.3.18-150300.59.195.1, kernel-livepatch-SLE15-SP3_Update_54-1-150300.7.3.1, kernel-obs-qa-5.3.18-150300.59.195.1, kernel-syms-5.3.18-150300.59.195.1, kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1, kernel-obs-build-5.3.18-150300.59.195.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_54-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-source-5.3.18-150300.59.195.1, kernel-syms-5.3.18-150300.59.195.1, kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1, kernel-obs-build-5.3.18-150300.59.195.1 SUSE Linux Enterprise Server 15 SP3 LTSS (src): kernel-source-5.3.18-150300.59.195.1, kernel-syms-5.3.18-150300.59.195.1, kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1, kernel-obs-build-5.3.18-150300.59.195.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-source-5.3.18-150300.59.195.1, kernel-syms-5.3.18-150300.59.195.1, kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1, kernel-obs-build-5.3.18-150300.59.195.1 SUSE Enterprise Storage 7.1 (src): kernel-source-5.3.18-150300.59.195.1, kernel-syms-5.3.18-150300.59.195.1, kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1, kernel-obs-build-5.3.18-150300.59.195.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.195.1.150300.18.116.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2025:0855-1: An update that solves 14 vulnerabilities and has four security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2025/suse-su-20250855-1 Category: security (important) Bug References: 1215420, 1224700, 1225742, 1232919, 1234853, 1234891, 1234963, 1235054, 1235061, 1235073, 1236757, 1236761, 1236821, 1237025, 1237028, 1237139, 1237768, 1238033 CVE References: CVE-2021-47633, CVE-2022-49080, CVE-2023-4244, CVE-2023-52924, CVE-2024-35949, CVE-2024-50115, CVE-2024-53173, CVE-2024-53239, CVE-2024-56539, CVE-2024-56548, CVE-2024-56605, CVE-2025-21690, CVE-2025-21692, CVE-2025-21699 Maintenance Incident: [SUSE:Maintenance:37758](https://smelt.suse.de/incident/37758/) Sources used: openSUSE Leap 15.3 (src): kernel-source-5.3.18-150300.59.198.1, kernel-livepatch-SLE15-SP3_Update_55-1-150300.7.3.1, kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1, kernel-syms-5.3.18-150300.59.198.1, kernel-obs-build-5.3.18-150300.59.198.1, kernel-obs-qa-5.3.18-150300.59.198.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_55-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-source-5.3.18-150300.59.198.1, kernel-obs-build-5.3.18-150300.59.198.1, kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1, kernel-syms-5.3.18-150300.59.198.1 SUSE Linux Enterprise Server 15 SP3 LTSS (src): kernel-source-5.3.18-150300.59.198.1, kernel-obs-build-5.3.18-150300.59.198.1, kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1, kernel-syms-5.3.18-150300.59.198.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-source-5.3.18-150300.59.198.1, kernel-obs-build-5.3.18-150300.59.198.1, kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1, kernel-syms-5.3.18-150300.59.198.1 SUSE Enterprise Storage 7.1 (src): kernel-source-5.3.18-150300.59.198.1, kernel-obs-build-5.3.18-150300.59.198.1, kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1, kernel-syms-5.3.18-150300.59.198.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.198.1.150300.18.118.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2025:0867-1: An update that solves 29 vulnerabilities and has seven security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2025/suse-su-20250867-1 Category: security (important) Bug References: 1215420, 1224700, 1224763, 1225742, 1231847, 1232919, 1233112, 1234025, 1234853, 1234891, 1234963, 1235054, 1235061, 1235073, 1235217, 1235230, 1235249, 1235430, 1235441, 1235466, 1235645, 1235759, 1235814, 1235818, 1235920, 1236104, 1236757, 1236761, 1236821, 1237025, 1237028, 1237139, 1237160, 1237389, 1237768, 1238033 CVE References: CVE-2021-47633, CVE-2022-49080, CVE-2023-4244, CVE-2023-52923, CVE-2023-52924, CVE-2024-35863, CVE-2024-35949, CVE-2024-50115, CVE-2024-50199, CVE-2024-53104, CVE-2024-53173, CVE-2024-53239, CVE-2024-56539, CVE-2024-56548, CVE-2024-56600, CVE-2024-56601, CVE-2024-56605, CVE-2024-56623, CVE-2024-56650, CVE-2024-56658, CVE-2024-56664, CVE-2024-56759, CVE-2024-57791, CVE-2024-57798, CVE-2024-57849, CVE-2024-57893, CVE-2025-21690, CVE-2025-21692, CVE-2025-21699 Maintenance Incident: [SUSE:Maintenance:37469](https://smelt.suse.de/incident/37469/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): kernel-source-rt-5.3.18-150300.202.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-source-rt-5.3.18-150300.202.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-source-rt-5.3.18-150300.202.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.