From null at suse.de Mon Dec 2 12:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:30:07 -0000 Subject: SUSE-SU-2024:4129-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) Message-ID: <173314260720.4144.14721074589002185782@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:4129-1 Release Date: 2024-12-02T09:15:33Z Rating: important References: * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_8 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4129=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_8-rt-debuginfo-6-150600.3.2 * kernel-livepatch-6_4_0-150600_8-rt-6-150600.3.2 * kernel-livepatch-SLE15-SP6-RT_Update_0-debugsource-6-150600.3.2 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:30:15 -0000 Subject: SUSE-SU-2024:4128-1: important: Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) Message-ID: <173314261582.4144.17605313085367779118@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4128-1 Release Date: 2024-12-02T09:15:26Z Rating: important References: * bsc#1225429 * bsc#1227471 * bsc#1228349 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2024-35949 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_61 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4128=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4128=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_17-debugsource-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-debuginfo-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-4-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_17-debugsource-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-debuginfo-4-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_61-rt-4-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:30:27 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:30:27 -0000 Subject: SUSE-SU-2024:4127-1: important: Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) Message-ID: <173314262755.4144.5978936479004775453@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4127-1 Release Date: 2024-12-02T09:15:21Z Rating: important References: * bsc#1223683 * bsc#1225099 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1227471 * bsc#1228349 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26923 * CVE-2024-35949 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_58 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4127=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4127=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-6-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-6-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-6-150500.11.6.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_16-debugsource-6-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-debuginfo-6-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_58-rt-6-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:30:45 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:30:45 -0000 Subject: SUSE-SU-2024:4125-1: important: Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) Message-ID: <173314264511.4144.10957947487015826503@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4125-1 Release Date: 2024-12-02T09:15:16Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225311 * bsc#1225312 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 20 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_55 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4125=1 SUSE-2024-4126=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4125=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-4126=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_55-rt-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_14-debugsource-7-150500.11.8.1 * kernel-livepatch-SLE15-SP5-RT_Update_15-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_52-rt-7-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_55-rt-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_52-rt-debuginfo-7-150500.11.8.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_55-rt-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_14-debugsource-7-150500.11.8.1 * kernel-livepatch-SLE15-SP5-RT_Update_15-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_52-rt-7-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_55-rt-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_52-rt-debuginfo-7-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:31:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:31:05 -0000 Subject: SUSE-SU-2024:4124-1: important: Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) Message-ID: <173314266575.4144.15424116407562717031@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4124-1 Release Date: 2024-12-02T09:15:06Z Rating: important References: * bsc#1221302 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 25 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_47 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2022-48662: Update for 'really move i915_gem_context.link under ref protection' (bsc#1223521) * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4124=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4124=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_47-rt-debuginfo-9-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_13-debugsource-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-9-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_47-rt-debuginfo-9-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_13-debugsource-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_47-rt-9-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:31:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:31:29 -0000 Subject: SUSE-SU-2024:4123-1: important: Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) Message-ID: <173314268954.4144.4314593677376407251@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4123-1 Release Date: 2024-12-02T09:15:01Z Rating: important References: * bsc#1220145 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52502 * CVE-2023-52752 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 30 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_38 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2022-48662: Update for 'really move i915_gem_context.link under ref protection' (bsc#1223521) * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4123=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4123=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_11-debugsource-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-debuginfo-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-9-150500.11.6.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_11-debugsource-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-debuginfo-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_38-rt-9-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:32:00 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:32:00 -0000 Subject: SUSE-SU-2024:4122-1: important: Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) Message-ID: <173314272038.4144.12962832071173301140@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4122-1 Release Date: 2024-12-02T09:14:56Z Rating: important References: * bsc#1219296 * bsc#1220145 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-52752 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 34 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_35 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2022-48662: Update for 'really move i915_gem_context.link under ref protection' (bsc#1223521) * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4122=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4122=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-11-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-11-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-11-150500.11.8.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-11-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-11-150500.11.8.1 * kernel-livepatch-5_14_21-150500_13_35-rt-11-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:32:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:32:05 -0000 Subject: SUSE-SU-2024:4120-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) Message-ID: <173314272590.4144.5460772937750100699@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4120-1 Release Date: 2024-12-02T09:14:50Z Rating: important References: * bsc#1225429 * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_30 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4120=1 SUSE-2024-4121=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4120=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-4121=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-14-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-13-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-14-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 12:34:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 12:34:12 -0000 Subject: SUSE-SU-2024:4131-1: important: Security update for the Linux Kernel Message-ID: <173314285220.4144.16933249611113398949@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4131-1 Release Date: 2024-12-02T10:00:25Z Rating: important References: * bsc#1204171 * bsc#1205796 * bsc#1206188 * bsc#1206344 * bsc#1209290 * bsc#1210449 * bsc#1210627 * bsc#1213034 * bsc#1216223 * bsc#1216813 * bsc#1218562 * bsc#1220382 * bsc#1223384 * bsc#1223524 * bsc#1223824 * bsc#1225189 * bsc#1225336 * bsc#1225611 * bsc#1226666 * bsc#1228743 * bsc#1229345 * bsc#1229452 * bsc#1229454 * bsc#1229456 * bsc#1229556 * bsc#1230429 * bsc#1230442 * bsc#1230454 * bsc#1230600 * bsc#1230620 * bsc#1230715 * bsc#1230903 * bsc#1231016 * bsc#1231073 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231203 * bsc#1231293 * bsc#1231375 * bsc#1231502 * bsc#1231673 * bsc#1231861 * bsc#1231883 * bsc#1231885 * bsc#1231887 * bsc#1231888 * bsc#1231890 * bsc#1231892 * bsc#1231893 * bsc#1231895 * bsc#1231896 * bsc#1231897 * bsc#1231929 * bsc#1231936 * bsc#1231937 * bsc#1231938 * bsc#1231939 * bsc#1231940 * bsc#1231941 * bsc#1231942 * bsc#1231958 * bsc#1231960 * bsc#1231961 * bsc#1231962 * bsc#1231972 * bsc#1231976 * bsc#1231979 * bsc#1231987 * bsc#1231988 * bsc#1231991 * bsc#1231992 * bsc#1231995 * bsc#1231996 * bsc#1231997 * bsc#1232001 * bsc#1232005 * bsc#1232006 * bsc#1232007 * bsc#1232025 * bsc#1232026 * bsc#1232033 * bsc#1232035 * bsc#1232036 * bsc#1232037 * bsc#1232038 * bsc#1232039 * bsc#1232067 * bsc#1232069 * bsc#1232070 * bsc#1232071 * bsc#1232097 * bsc#1232108 * bsc#1232119 * bsc#1232120 * bsc#1232123 * bsc#1232133 * bsc#1232136 * bsc#1232145 * bsc#1232150 * bsc#1232163 * bsc#1232165 * bsc#1232170 * bsc#1232172 * bsc#1232174 * bsc#1232224 * bsc#1232229 * bsc#1232237 * bsc#1232260 * bsc#1232262 * bsc#1232281 * bsc#1232282 * bsc#1232286 * bsc#1232304 * bsc#1232383 * bsc#1232395 * bsc#1232418 * bsc#1232424 * bsc#1232432 * bsc#1232436 * bsc#1232519 * bsc#1233117 * jsc#SLE-24682 Cross-References: * CVE-2021-47416 * CVE-2021-47534 * CVE-2022-3435 * CVE-2022-45934 * CVE-2022-48664 * CVE-2022-48879 * CVE-2022-48946 * CVE-2022-48947 * CVE-2022-48948 * CVE-2022-48949 * CVE-2022-48951 * CVE-2022-48953 * CVE-2022-48954 * CVE-2022-48955 * CVE-2022-48956 * CVE-2022-48959 * CVE-2022-48960 * CVE-2022-48961 * CVE-2022-48962 * CVE-2022-48967 * CVE-2022-48968 * CVE-2022-48969 * CVE-2022-48970 * CVE-2022-48971 * CVE-2022-48972 * CVE-2022-48973 * CVE-2022-48975 * CVE-2022-48977 * CVE-2022-48978 * CVE-2022-48981 * CVE-2022-48985 * CVE-2022-48987 * CVE-2022-48988 * CVE-2022-48991 * CVE-2022-48992 * CVE-2022-48994 * CVE-2022-48995 * CVE-2022-48997 * CVE-2022-48999 * CVE-2022-49000 * CVE-2022-49002 * CVE-2022-49003 * CVE-2022-49005 * CVE-2022-49006 * CVE-2022-49007 * CVE-2022-49010 * CVE-2022-49011 * CVE-2022-49012 * CVE-2022-49014 * CVE-2022-49015 * CVE-2022-49016 * CVE-2022-49019 * CVE-2022-49021 * CVE-2022-49022 * CVE-2022-49023 * CVE-2022-49024 * CVE-2022-49025 * CVE-2022-49026 * CVE-2022-49027 * CVE-2022-49028 * CVE-2022-49029 * CVE-2022-49031 * CVE-2022-49032 * CVE-2023-2166 * CVE-2023-28327 * CVE-2023-52766 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52919 * CVE-2023-6270 * CVE-2024-27043 * CVE-2024-42145 * CVE-2024-43854 * CVE-2024-44947 * CVE-2024-45013 * CVE-2024-45016 * CVE-2024-45026 * CVE-2024-46716 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46849 * CVE-2024-47668 * CVE-2024-47674 * CVE-2024-47684 * CVE-2024-47706 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-49860 * CVE-2024-49867 * CVE-2024-49925 * CVE-2024-49930 * CVE-2024-49936 * CVE-2024-49945 * CVE-2024-49960 * CVE-2024-49969 * CVE-2024-49974 * CVE-2024-49982 * CVE-2024-49991 * CVE-2024-49995 * CVE-2024-50047 * CVE-2024-50208 CVSS scores: * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47534 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-45934 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-45934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48879 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48948 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48949 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48954 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48954 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48955 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48956 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48959 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48959 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48960 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48960 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48962 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48962 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2022-48962 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48967 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48967 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-48967 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-48968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48973 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48973 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-48973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48975 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48977 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48978 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48978 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-48978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48981 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48981 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-48981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48987 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48987 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48988 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48988 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48988 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48991 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48992 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48994 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-48994 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-48994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48995 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48995 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48997 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48997 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2022-48997 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49000 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49002 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49002 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49003 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49003 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49005 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-49005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49006 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49010 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49015 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49023 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 105 vulnerabilities, contains one feature and has 19 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556). * CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893). * CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976). * CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979). * CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286). * CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070). * CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938). * CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454). * CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193). * CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200). * CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203). * CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073). * CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174). * CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861). * CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). The following non-security bugs were fixed: * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666). * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (bsc#1232036). * bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375). * dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813). * initramfs: avoid filename buffer overrun (bsc#1232436). * ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813). * ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813). * net: mana: Fix the extra HZ in mana_hwc_send_request (bsc#1232033). * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). * xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4131=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4131=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4131=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4131=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4131=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4131=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-4131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4131=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4131=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4131=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4131=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4131=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4131=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_141-default-1-150400.9.5.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-1-150400.9.5.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.141.1 * kernel-devel-5.14.21-150400.24.141.1 * kernel-source-vanilla-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.141.1 * kernel-debug-devel-5.14.21-150400.24.141.1 * kernel-debug-debuginfo-5.14.21-150400.24.141.1 * kernel-debug-debugsource-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-default-base-rebuild-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-kvmsmall-debugsource-5.14.21-150400.24.141.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.141.1 * kernel-kvmsmall-devel-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-obs-build-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.141.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-syms-5.14.21-150400.24.141.1 * kselftests-kmp-default-5.14.21-150400.24.141.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.141.1 * reiserfs-kmp-default-5.14.21-150400.24.141.1 * dlm-kmp-default-5.14.21-150400.24.141.1 * kernel-obs-qa-5.14.21-150400.24.141.1 * kernel-default-extra-5.14.21-150400.24.141.1 * kernel-default-livepatch-devel-5.14.21-150400.24.141.1 * kernel-default-livepatch-5.14.21-150400.24.141.1 * ocfs2-kmp-default-5.14.21-150400.24.141.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-optional-5.14.21-150400.24.141.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.141.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.141.1 * cluster-md-kmp-default-5.14.21-150400.24.141.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.141.1 * gfs2-kmp-default-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.141.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (aarch64) * dtb-mediatek-5.14.21-150400.24.141.1 * kernel-64kb-debuginfo-5.14.21-150400.24.141.1 * dtb-arm-5.14.21-150400.24.141.1 * dtb-allwinner-5.14.21-150400.24.141.1 * dtb-amlogic-5.14.21-150400.24.141.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.141.1 * dtb-broadcom-5.14.21-150400.24.141.1 * dtb-rockchip-5.14.21-150400.24.141.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.141.1 * kernel-64kb-optional-5.14.21-150400.24.141.1 * dtb-freescale-5.14.21-150400.24.141.1 * dtb-nvidia-5.14.21-150400.24.141.1 * dtb-exynos-5.14.21-150400.24.141.1 * reiserfs-kmp-64kb-5.14.21-150400.24.141.1 * dtb-cavium-5.14.21-150400.24.141.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.141.1 * kselftests-kmp-64kb-5.14.21-150400.24.141.1 * dtb-hisilicon-5.14.21-150400.24.141.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.141.1 * dtb-apm-5.14.21-150400.24.141.1 * kernel-64kb-debugsource-5.14.21-150400.24.141.1 * ocfs2-kmp-64kb-5.14.21-150400.24.141.1 * dtb-altera-5.14.21-150400.24.141.1 * dtb-sprd-5.14.21-150400.24.141.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.141.1 * dlm-kmp-64kb-5.14.21-150400.24.141.1 * kernel-64kb-extra-5.14.21-150400.24.141.1 * dtb-qcom-5.14.21-150400.24.141.1 * kernel-64kb-devel-5.14.21-150400.24.141.1 * dtb-amd-5.14.21-150400.24.141.1 * dtb-marvell-5.14.21-150400.24.141.1 * dtb-socionext-5.14.21-150400.24.141.1 * dtb-xilinx-5.14.21-150400.24.141.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.141.1 * dtb-amazon-5.14.21-150400.24.141.1 * cluster-md-kmp-64kb-5.14.21-150400.24.141.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.141.1 * dtb-renesas-5.14.21-150400.24.141.1 * gfs2-kmp-64kb-5.14.21-150400.24.141.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.141.1 * dtb-lg-5.14.21-150400.24.141.1 * dtb-apple-5.14.21-150400.24.141.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-livepatch-5.14.21-150400.24.141.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_141-default-1-150400.9.5.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-livepatch-devel-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * ocfs2-kmp-default-5.14.21-150400.24.141.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.141.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.141.1 * gfs2-kmp-default-5.14.21-150400.24.141.1 * dlm-kmp-default-5.14.21-150400.24.141.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-5.14.21-150400.24.141.1 * kernel-64kb-debugsource-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-obs-build-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-obs-build-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-5.14.21-150400.24.141.1 * kernel-64kb-debugsource-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-obs-build-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-obs-build-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (nosrc x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-obs-build-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-obs-build-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * kernel-default-extra-5.14.21-150400.24.141.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-64kb-devel-5.14.21-150400.24.141.1 * kernel-64kb-debugsource-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-obs-build-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-obs-build-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.141.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-obs-build-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-obs-build-debugsource-5.14.21-150400.24.141.1 * reiserfs-kmp-default-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.141.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.141.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.141.1 * kernel-default-debugsource-5.14.21-150400.24.141.1 * kernel-default-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.141.1 * kernel-default-devel-5.14.21-150400.24.141.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.141.1 * kernel-macros-5.14.21-150400.24.141.1 * kernel-source-5.14.21-150400.24.141.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.141.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.141.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.141.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2022-3435.html * https://www.suse.com/security/cve/CVE-2022-45934.html * https://www.suse.com/security/cve/CVE-2022-48664.html * https://www.suse.com/security/cve/CVE-2022-48879.html * https://www.suse.com/security/cve/CVE-2022-48946.html * https://www.suse.com/security/cve/CVE-2022-48947.html * https://www.suse.com/security/cve/CVE-2022-48948.html * https://www.suse.com/security/cve/CVE-2022-48949.html * https://www.suse.com/security/cve/CVE-2022-48951.html * https://www.suse.com/security/cve/CVE-2022-48953.html * https://www.suse.com/security/cve/CVE-2022-48954.html * https://www.suse.com/security/cve/CVE-2022-48955.html * https://www.suse.com/security/cve/CVE-2022-48956.html * https://www.suse.com/security/cve/CVE-2022-48959.html * https://www.suse.com/security/cve/CVE-2022-48960.html * https://www.suse.com/security/cve/CVE-2022-48961.html * https://www.suse.com/security/cve/CVE-2022-48962.html * https://www.suse.com/security/cve/CVE-2022-48967.html * https://www.suse.com/security/cve/CVE-2022-48968.html * https://www.suse.com/security/cve/CVE-2022-48969.html * https://www.suse.com/security/cve/CVE-2022-48970.html * https://www.suse.com/security/cve/CVE-2022-48971.html * https://www.suse.com/security/cve/CVE-2022-48972.html * https://www.suse.com/security/cve/CVE-2022-48973.html * https://www.suse.com/security/cve/CVE-2022-48975.html * https://www.suse.com/security/cve/CVE-2022-48977.html * https://www.suse.com/security/cve/CVE-2022-48978.html * https://www.suse.com/security/cve/CVE-2022-48981.html * https://www.suse.com/security/cve/CVE-2022-48985.html * https://www.suse.com/security/cve/CVE-2022-48987.html * https://www.suse.com/security/cve/CVE-2022-48988.html * https://www.suse.com/security/cve/CVE-2022-48991.html * https://www.suse.com/security/cve/CVE-2022-48992.html * https://www.suse.com/security/cve/CVE-2022-48994.html * https://www.suse.com/security/cve/CVE-2022-48995.html * https://www.suse.com/security/cve/CVE-2022-48997.html * https://www.suse.com/security/cve/CVE-2022-48999.html * https://www.suse.com/security/cve/CVE-2022-49000.html * https://www.suse.com/security/cve/CVE-2022-49002.html * https://www.suse.com/security/cve/CVE-2022-49003.html * https://www.suse.com/security/cve/CVE-2022-49005.html * https://www.suse.com/security/cve/CVE-2022-49006.html * https://www.suse.com/security/cve/CVE-2022-49007.html * https://www.suse.com/security/cve/CVE-2022-49010.html * https://www.suse.com/security/cve/CVE-2022-49011.html * https://www.suse.com/security/cve/CVE-2022-49012.html * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49015.html * https://www.suse.com/security/cve/CVE-2022-49016.html * https://www.suse.com/security/cve/CVE-2022-49019.html * https://www.suse.com/security/cve/CVE-2022-49021.html * https://www.suse.com/security/cve/CVE-2022-49022.html * https://www.suse.com/security/cve/CVE-2022-49023.html * https://www.suse.com/security/cve/CVE-2022-49024.html * https://www.suse.com/security/cve/CVE-2022-49025.html * https://www.suse.com/security/cve/CVE-2022-49026.html * https://www.suse.com/security/cve/CVE-2022-49027.html * https://www.suse.com/security/cve/CVE-2022-49028.html * https://www.suse.com/security/cve/CVE-2022-49029.html * https://www.suse.com/security/cve/CVE-2022-49031.html * https://www.suse.com/security/cve/CVE-2022-49032.html * https://www.suse.com/security/cve/CVE-2023-2166.html * https://www.suse.com/security/cve/CVE-2023-28327.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-45013.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://bugzilla.suse.com/show_bug.cgi?id=1204171 * https://bugzilla.suse.com/show_bug.cgi?id=1205796 * https://bugzilla.suse.com/show_bug.cgi?id=1206188 * https://bugzilla.suse.com/show_bug.cgi?id=1206344 * https://bugzilla.suse.com/show_bug.cgi?id=1209290 * https://bugzilla.suse.com/show_bug.cgi?id=1210449 * https://bugzilla.suse.com/show_bug.cgi?id=1210627 * https://bugzilla.suse.com/show_bug.cgi?id=1213034 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223524 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1226666 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229452 * https://bugzilla.suse.com/show_bug.cgi?id=1229454 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229556 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230442 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230903 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231883 * https://bugzilla.suse.com/show_bug.cgi?id=1231885 * https://bugzilla.suse.com/show_bug.cgi?id=1231887 * https://bugzilla.suse.com/show_bug.cgi?id=1231888 * https://bugzilla.suse.com/show_bug.cgi?id=1231890 * https://bugzilla.suse.com/show_bug.cgi?id=1231892 * https://bugzilla.suse.com/show_bug.cgi?id=1231893 * https://bugzilla.suse.com/show_bug.cgi?id=1231895 * https://bugzilla.suse.com/show_bug.cgi?id=1231896 * https://bugzilla.suse.com/show_bug.cgi?id=1231897 * https://bugzilla.suse.com/show_bug.cgi?id=1231929 * https://bugzilla.suse.com/show_bug.cgi?id=1231936 * https://bugzilla.suse.com/show_bug.cgi?id=1231937 * https://bugzilla.suse.com/show_bug.cgi?id=1231938 * https://bugzilla.suse.com/show_bug.cgi?id=1231939 * https://bugzilla.suse.com/show_bug.cgi?id=1231940 * https://bugzilla.suse.com/show_bug.cgi?id=1231941 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231958 * https://bugzilla.suse.com/show_bug.cgi?id=1231960 * https://bugzilla.suse.com/show_bug.cgi?id=1231961 * https://bugzilla.suse.com/show_bug.cgi?id=1231962 * https://bugzilla.suse.com/show_bug.cgi?id=1231972 * https://bugzilla.suse.com/show_bug.cgi?id=1231976 * https://bugzilla.suse.com/show_bug.cgi?id=1231979 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231991 * https://bugzilla.suse.com/show_bug.cgi?id=1231992 * https://bugzilla.suse.com/show_bug.cgi?id=1231995 * https://bugzilla.suse.com/show_bug.cgi?id=1231996 * https://bugzilla.suse.com/show_bug.cgi?id=1231997 * https://bugzilla.suse.com/show_bug.cgi?id=1232001 * https://bugzilla.suse.com/show_bug.cgi?id=1232005 * https://bugzilla.suse.com/show_bug.cgi?id=1232006 * https://bugzilla.suse.com/show_bug.cgi?id=1232007 * https://bugzilla.suse.com/show_bug.cgi?id=1232025 * https://bugzilla.suse.com/show_bug.cgi?id=1232026 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232035 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232037 * https://bugzilla.suse.com/show_bug.cgi?id=1232038 * https://bugzilla.suse.com/show_bug.cgi?id=1232039 * https://bugzilla.suse.com/show_bug.cgi?id=1232067 * https://bugzilla.suse.com/show_bug.cgi?id=1232069 * https://bugzilla.suse.com/show_bug.cgi?id=1232070 * https://bugzilla.suse.com/show_bug.cgi?id=1232071 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232108 * https://bugzilla.suse.com/show_bug.cgi?id=1232119 * https://bugzilla.suse.com/show_bug.cgi?id=1232120 * https://bugzilla.suse.com/show_bug.cgi?id=1232123 * https://bugzilla.suse.com/show_bug.cgi?id=1232133 * https://bugzilla.suse.com/show_bug.cgi?id=1232136 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232150 * https://bugzilla.suse.com/show_bug.cgi?id=1232163 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232170 * https://bugzilla.suse.com/show_bug.cgi?id=1232172 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232229 * https://bugzilla.suse.com/show_bug.cgi?id=1232237 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232281 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232286 * https://bugzilla.suse.com/show_bug.cgi?id=1232304 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://jira.suse.com/browse/SLE-24682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:30:10 -0000 Subject: SUSE-SU-2024:4141-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Message-ID: <173315701037.13558.14447363823334395288@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4141-1 Release Date: 2024-12-02T15:35:45Z Rating: important References: * bsc#1225429 * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_24 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4141=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4141=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-15-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-15-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-15-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-15-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-15-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-15-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:30:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:30:18 -0000 Subject: SUSE-SU-2024:4139-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) Message-ID: <173315701896.13558.1231616011534432368@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:4139-1 Release Date: 2024-12-02T12:35:47Z Rating: important References: * bsc#1225819 * bsc#1228349 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2023-52752 * CVE-2024-35949 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-43861 CVSS scores: * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_5 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4139=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo-5-150600.1.8.2 * kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource-5-150600.1.8.2 * kernel-livepatch-6_4_0-150600_10_5-rt-5-150600.1.8.2 ## References: * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:31:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:31:20 -0000 Subject: SUSE-SU-2024:4140-1: important: Security update for the Linux Kernel Message-ID: <173315708060.13558.13307367339148581579@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4140-1 Release Date: 2024-12-02T14:37:27Z Rating: important References: * bsc#1195775 * bsc#1204171 * bsc#1205796 * bsc#1206344 * bsc#1209290 * bsc#1216223 * bsc#1218562 * bsc#1219125 * bsc#1223384 * bsc#1223524 * bsc#1223824 * bsc#1225189 * bsc#1225336 * bsc#1225611 * bsc#1226211 * bsc#1226212 * bsc#1226557 * bsc#1228743 * bsc#1229042 * bsc#1229454 * bsc#1229456 * bsc#1230429 * bsc#1230454 * bsc#1231073 * bsc#1231191 * bsc#1231193 * bsc#1231197 * bsc#1231200 * bsc#1231203 * bsc#1231293 * bsc#1231375 * bsc#1231502 * bsc#1231673 * bsc#1231861 * bsc#1231887 * bsc#1231890 * bsc#1231893 * bsc#1231895 * bsc#1231936 * bsc#1231938 * bsc#1231942 * bsc#1231960 * bsc#1231961 * bsc#1231979 * bsc#1231987 * bsc#1231988 * bsc#1232033 * bsc#1232069 * bsc#1232070 * bsc#1232097 * bsc#1232136 * bsc#1232145 * bsc#1232262 * bsc#1232280 * bsc#1232282 * bsc#1232286 * bsc#1232304 * bsc#1232383 * bsc#1232418 * bsc#1232424 * bsc#1232432 * bsc#1232519 Cross-References: * CVE-2021-47416 * CVE-2021-47589 * CVE-2022-3435 * CVE-2022-45934 * CVE-2022-48664 * CVE-2022-48947 * CVE-2022-48956 * CVE-2022-48960 * CVE-2022-48962 * CVE-2022-48967 * CVE-2022-48970 * CVE-2022-48988 * CVE-2022-48991 * CVE-2022-48999 * CVE-2022-49003 * CVE-2022-49014 * CVE-2022-49015 * CVE-2022-49023 * CVE-2022-49025 * CVE-2023-28327 * CVE-2023-46343 * CVE-2023-52881 * CVE-2023-52919 * CVE-2023-6270 * CVE-2024-27043 * CVE-2024-42145 * CVE-2024-44947 * CVE-2024-45016 * CVE-2024-45026 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46849 * CVE-2024-47668 * CVE-2024-47674 * CVE-2024-47684 * CVE-2024-47706 * CVE-2024-47747 * CVE-2024-49860 * CVE-2024-49867 * CVE-2024-49936 * CVE-2024-49969 * CVE-2024-49974 * CVE-2024-49982 * CVE-2024-49991 * CVE-2024-49995 * CVE-2024-50047 CVSS scores: * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47589 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-45934 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-45934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48956 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48960 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48960 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48962 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48962 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2022-48962 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48967 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48967 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-48967 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-48970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48988 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48988 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48988 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48991 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49003 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49003 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49015 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49023 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 49 vulnerabilities and has 13 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47589: igbvf: fix double free in `igbvf_probe` (bsc#1226557). * CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893). * CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979). * CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286). * CVE-2022-48967: NFC: nci: Bounds check struct nfc_target arrays (bsc#1232304). * CVE-2022-48988: memcg: Fix possible use-after-free in memcg_write_event_control() (bsc#1232069). * CVE-2022-48991: khugepaged: retract_page_tables() remember to test exit (bsc#1232070 prerequisity). * CVE-2022-49003: nvme: fix SRCU protection of nvme_ns_head list (bsc#1232136). * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1231890). * CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938). * CVE-2022-49023: wifi: cfg80211: fix buffer overflow in elem comparison (bsc#1231961). * CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1231960). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200). * CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203). * CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073). * CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). The following non-security bugs were fixed: * bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375). * kernel-binary: generate and install compile_commands.json (bsc#1228971) * kernel-binary: vdso: Own module_dir * mkspec-dtb: add toplevel symlinks also on arm * net: mana: Fix the extra HZ in mana_hwc_send_request (bsc#1232033). * scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4140=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4140=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4140=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4140=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4140=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4140=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4140=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4140=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4140=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4140=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.182.2 * openSUSE Leap 15.3 (noarch) * kernel-docs-html-5.3.18-150300.59.182.2 * kernel-source-5.3.18-150300.59.182.1 * kernel-source-vanilla-5.3.18-150300.59.182.1 * kernel-devel-5.3.18-150300.59.182.1 * kernel-macros-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-debug-5.3.18-150300.59.182.1 * kernel-kvmsmall-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-debug-debugsource-5.3.18-150300.59.182.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-debug-debuginfo-5.3.18-150300.59.182.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.182.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.182.1 * kernel-kvmsmall-devel-5.3.18-150300.59.182.1 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.182.1 * kernel-debug-livepatch-devel-5.3.18-150300.59.182.1 * kernel-debug-devel-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kselftests-kmp-default-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-livepatch-5.3.18-150300.59.182.1 * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-livepatch-devel-5.3.18-150300.59.182.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.182.1 * reiserfs-kmp-default-5.3.18-150300.59.182.1 * kernel-default-extra-5.3.18-150300.59.182.1 * gfs2-kmp-default-5.3.18-150300.59.182.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.182.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-optional-5.3.18-150300.59.182.1 * kernel-obs-build-5.3.18-150300.59.182.1 * kernel-obs-qa-5.3.18-150300.59.182.1 * cluster-md-kmp-default-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * dlm-kmp-default-5.3.18-150300.59.182.1 * kernel-obs-build-debugsource-5.3.18-150300.59.182.1 * kernel-default-base-rebuild-5.3.18-150300.59.182.1.150300.18.107.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-5.3.18-150300.59.182.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.182.1 * ocfs2-kmp-default-5.3.18-150300.59.182.1 * kernel-syms-5.3.18-150300.59.182.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-1-150300.7.3.1 * kernel-livepatch-SLE15-SP3_Update_50-debugsource-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_182-default-1-150300.7.3.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_182-preempt-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * kselftests-kmp-preempt-5.3.18-150300.59.182.1 * gfs2-kmp-preempt-5.3.18-150300.59.182.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.182.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.182.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.182.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.182.1 * dlm-kmp-preempt-5.3.18-150300.59.182.1 * ocfs2-kmp-preempt-5.3.18-150300.59.182.1 * cluster-md-kmp-preempt-5.3.18-150300.59.182.1 * kernel-preempt-optional-5.3.18-150300.59.182.1 * reiserfs-kmp-preempt-5.3.18-150300.59.182.1 * kernel-preempt-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-livepatch-devel-5.3.18-150300.59.182.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.182.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-debugsource-5.3.18-150300.59.182.1 * kernel-preempt-extra-5.3.18-150300.59.182.1 * kernel-preempt-devel-5.3.18-150300.59.182.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.182.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (aarch64) * dtb-exynos-5.3.18-150300.59.182.1 * dlm-kmp-64kb-5.3.18-150300.59.182.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-optional-5.3.18-150300.59.182.1 * kselftests-kmp-64kb-5.3.18-150300.59.182.1 * dtb-apm-5.3.18-150300.59.182.1 * dtb-zte-5.3.18-150300.59.182.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.182.1 * dtb-amlogic-5.3.18-150300.59.182.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.182.1 * dtb-renesas-5.3.18-150300.59.182.1 * dtb-arm-5.3.18-150300.59.182.1 * dtb-amd-5.3.18-150300.59.182.1 * dtb-broadcom-5.3.18-150300.59.182.1 * dtb-xilinx-5.3.18-150300.59.182.1 * kernel-64kb-devel-5.3.18-150300.59.182.1 * dtb-marvell-5.3.18-150300.59.182.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.182.1 * dtb-nvidia-5.3.18-150300.59.182.1 * reiserfs-kmp-64kb-5.3.18-150300.59.182.1 * gfs2-kmp-64kb-5.3.18-150300.59.182.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.182.1 * dtb-allwinner-5.3.18-150300.59.182.1 * dtb-socionext-5.3.18-150300.59.182.1 * dtb-al-5.3.18-150300.59.182.1 * cluster-md-kmp-64kb-5.3.18-150300.59.182.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.182.1 * dtb-altera-5.3.18-150300.59.182.1 * dtb-hisilicon-5.3.18-150300.59.182.1 * kernel-64kb-debuginfo-5.3.18-150300.59.182.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.182.1 * dtb-lg-5.3.18-150300.59.182.1 * kernel-64kb-extra-5.3.18-150300.59.182.1 * dtb-cavium-5.3.18-150300.59.182.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-debugsource-5.3.18-150300.59.182.1 * dtb-freescale-5.3.18-150300.59.182.1 * dtb-sprd-5.3.18-150300.59.182.1 * dtb-qcom-5.3.18-150300.59.182.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.182.1 * ocfs2-kmp-64kb-5.3.18-150300.59.182.1 * dtb-rockchip-5.3.18-150300.59.182.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.182.1 * dtb-mediatek-5.3.18-150300.59.182.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-livepatch-5_3_18-150300_59_182-default-1-150300.7.3.1 * kernel-default-livepatch-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.182.1 * cluster-md-kmp-default-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * dlm-kmp-default-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * ocfs2-kmp-default-5.3.18-150300.59.182.1 * gfs2-kmp-default-5.3.18-150300.59.182.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.182.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.182.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-devel-5.3.18-150300.59.182.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-debugsource-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.182.1 * kernel-preempt-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-syms-5.3.18-150300.59.182.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-5.3.18-150300.59.182.1 * kernel-obs-build-debugsource-5.3.18-150300.59.182.1 * reiserfs-kmp-default-5.3.18-150300.59.182.1 * kernel-preempt-debugsource-5.3.18-150300.59.182.1 * kernel-preempt-devel-5.3.18-150300.59.182.1 * kernel-obs-build-5.3.18-150300.59.182.1 * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * kernel-preempt-debuginfo-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.182.1 * kernel-macros-5.3.18-150300.59.182.1 * kernel-devel-5.3.18-150300.59.182.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.182.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-devel-5.3.18-150300.59.182.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-debugsource-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-5.3.18-150300.59.182.1 * kernel-obs-build-debugsource-5.3.18-150300.59.182.1 * reiserfs-kmp-default-5.3.18-150300.59.182.1 * kernel-obs-build-5.3.18-150300.59.182.1 * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * kernel-syms-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * kernel-source-5.3.18-150300.59.182.1 * kernel-macros-5.3.18-150300.59.182.1 * kernel-devel-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc) * kernel-docs-5.3.18-150300.59.182.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * kernel-preempt-devel-5.3.18-150300.59.182.1 * kernel-preempt-debugsource-5.3.18-150300.59.182.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-debuginfo-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.182.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-5.3.18-150300.59.182.1 * kernel-obs-build-debugsource-5.3.18-150300.59.182.1 * reiserfs-kmp-default-5.3.18-150300.59.182.1 * kernel-obs-build-5.3.18-150300.59.182.1 * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * kernel-syms-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.182.1 * kernel-macros-5.3.18-150300.59.182.1 * kernel-devel-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.182.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-5.3.18-150300.59.182.1 * kernel-preempt-debugsource-5.3.18-150300.59.182.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-debuginfo-5.3.18-150300.59.182.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.182.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-devel-5.3.18-150300.59.182.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-64kb-debugsource-5.3.18-150300.59.182.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.182.1 * kernel-preempt-5.3.18-150300.59.182.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-syms-5.3.18-150300.59.182.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-devel-5.3.18-150300.59.182.1 * kernel-obs-build-debugsource-5.3.18-150300.59.182.1 * reiserfs-kmp-default-5.3.18-150300.59.182.1 * kernel-preempt-debugsource-5.3.18-150300.59.182.1 * kernel-preempt-devel-5.3.18-150300.59.182.1 * kernel-obs-build-5.3.18-150300.59.182.1 * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * kernel-preempt-debuginfo-5.3.18-150300.59.182.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.182.1 * kernel-macros-5.3.18-150300.59.182.1 * kernel-devel-5.3.18-150300.59.182.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.182.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.182.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.182.1 * kernel-default-debugsource-5.3.18-150300.59.182.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47589.html * https://www.suse.com/security/cve/CVE-2022-3435.html * https://www.suse.com/security/cve/CVE-2022-45934.html * https://www.suse.com/security/cve/CVE-2022-48664.html * https://www.suse.com/security/cve/CVE-2022-48947.html * https://www.suse.com/security/cve/CVE-2022-48956.html * https://www.suse.com/security/cve/CVE-2022-48960.html * https://www.suse.com/security/cve/CVE-2022-48962.html * https://www.suse.com/security/cve/CVE-2022-48967.html * https://www.suse.com/security/cve/CVE-2022-48970.html * https://www.suse.com/security/cve/CVE-2022-48988.html * https://www.suse.com/security/cve/CVE-2022-48991.html * https://www.suse.com/security/cve/CVE-2022-48999.html * https://www.suse.com/security/cve/CVE-2022-49003.html * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49015.html * https://www.suse.com/security/cve/CVE-2022-49023.html * https://www.suse.com/security/cve/CVE-2022-49025.html * https://www.suse.com/security/cve/CVE-2023-28327.html * https://www.suse.com/security/cve/CVE-2023-46343.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45026.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://bugzilla.suse.com/show_bug.cgi?id=1195775 * https://bugzilla.suse.com/show_bug.cgi?id=1204171 * https://bugzilla.suse.com/show_bug.cgi?id=1205796 * https://bugzilla.suse.com/show_bug.cgi?id=1206344 * https://bugzilla.suse.com/show_bug.cgi?id=1209290 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1219125 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223524 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1226211 * https://bugzilla.suse.com/show_bug.cgi?id=1226212 * https://bugzilla.suse.com/show_bug.cgi?id=1226557 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1229042 * https://bugzilla.suse.com/show_bug.cgi?id=1229454 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230454 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231887 * https://bugzilla.suse.com/show_bug.cgi?id=1231890 * https://bugzilla.suse.com/show_bug.cgi?id=1231893 * https://bugzilla.suse.com/show_bug.cgi?id=1231895 * https://bugzilla.suse.com/show_bug.cgi?id=1231936 * https://bugzilla.suse.com/show_bug.cgi?id=1231938 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231960 * https://bugzilla.suse.com/show_bug.cgi?id=1231961 * https://bugzilla.suse.com/show_bug.cgi?id=1231979 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232069 * https://bugzilla.suse.com/show_bug.cgi?id=1232070 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232136 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232280 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232286 * https://bugzilla.suse.com/show_bug.cgi?id=1232304 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:31:23 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:31:23 -0000 Subject: SUSE-SU-2024:4138-1: moderate: Security update for wget Message-ID: <173315708351.13558.11210879404030635436@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2024:4138-1 Release Date: 2024-12-02T12:30:09Z Rating: moderate References: * bsc#1233773 Cross-References: * CVE-2024-10524 CVSS scores: * CVE-2024-10524 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10524 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N * CVE-2024-10524 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-10524: Fixed SSRF via shorthand HTTP URL (bsc#1233773) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4138=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4138=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4138=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * wget-1.20.3-150000.3.26.1 * wget-debuginfo-1.20.3-150000.3.26.1 * wget-debugsource-1.20.3-150000.3.26.1 * openSUSE Leap 15.5 (noarch) * wget-lang-1.20.3-150000.3.26.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * wget-1.20.3-150000.3.26.1 * wget-debuginfo-1.20.3-150000.3.26.1 * wget-debugsource-1.20.3-150000.3.26.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wget-1.20.3-150000.3.26.1 * wget-debuginfo-1.20.3-150000.3.26.1 * wget-debugsource-1.20.3-150000.3.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10524.html * https://bugzilla.suse.com/show_bug.cgi?id=1233773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:31:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:31:26 -0000 Subject: SUSE-SU-2024:4137-1: moderate: Security update for python-tornado6 Message-ID: <173315708666.13558.1319631131914228676@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2024:4137-1 Release Date: 2024-12-02T12:28:46Z Rating: moderate References: * bsc#1233668 Cross-References: * CVE-2024-52804 CVSS scores: * CVE-2024-52804 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-52804 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-52804 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Python 3 Module 15-SP5 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2024-52804: Fixed a denial of service caused by quadratic performance of cookie parsing (bsc#1233668) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4137=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4137=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4137=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-4137=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4137=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python-tornado6-debugsource-6.3.2-150400.9.6.1 * python311-tornado6-6.3.2-150400.9.6.1 * python311-tornado6-debuginfo-6.3.2-150400.9.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.3.2-150400.9.6.1 * python311-tornado6-6.3.2-150400.9.6.1 * python311-tornado6-debuginfo-6.3.2-150400.9.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.3.2-150400.9.6.1 * python311-tornado6-6.3.2-150400.9.6.1 * python311-tornado6-debuginfo-6.3.2-150400.9.6.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.3.2-150400.9.6.1 * python311-tornado6-6.3.2-150400.9.6.1 * python311-tornado6-debuginfo-6.3.2-150400.9.6.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.3.2-150400.9.6.1 * python311-tornado6-6.3.2-150400.9.6.1 * python311-tornado6-debuginfo-6.3.2-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52804.html * https://bugzilla.suse.com/show_bug.cgi?id=1233668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:31:30 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:31:30 -0000 Subject: SUSE-SU-2024:4136-1: moderate: Security update for php8 Message-ID: <173315709049.13558.9523215116137117296@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:4136-1 Release Date: 2024-12-02T12:26:55Z Rating: moderate References: * bsc#1233651 * bsc#1233702 * bsc#1233703 Cross-References: * CVE-2024-11233 * CVE-2024-11234 * CVE-2024-11236 * CVE-2024-8929 * CVE-2024-8932 CVSS scores: * CVE-2024-11233 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-11233 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-11233 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-11233 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-11234 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-11234 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-11234 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-11234 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-11236 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-11236 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-11236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-11236 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8929 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-8929 ( NVD ): 5.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-8932 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-8932 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for php8 fixes the following issues: * CVE-2024-11233: Single byte overread with convert.quoted-printable-decode filter (bsc#1233702). * CVE-2024-11234: Configuring a proxy in a stream context might allow for CRLF injection in URIs (bsc#1233703). * CVE-2024-8929: Leak partial content of the heap through heap buffer over- read (bsc#1233651). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4136=1 openSUSE-SLE-15.6-2024-4136=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4136=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * php8-sockets-8.2.26-150600.3.9.1 * php8-xmlreader-8.2.26-150600.3.9.1 * php8-xsl-8.2.26-150600.3.9.1 * php8-enchant-8.2.26-150600.3.9.1 * php8-iconv-debuginfo-8.2.26-150600.3.9.1 * php8-ffi-8.2.26-150600.3.9.1 * php8-gettext-debuginfo-8.2.26-150600.3.9.1 * php8-fileinfo-8.2.26-150600.3.9.1 * php8-ffi-debuginfo-8.2.26-150600.3.9.1 * php8-phar-8.2.26-150600.3.9.1 * php8-opcache-debuginfo-8.2.26-150600.3.9.1 * php8-enchant-debuginfo-8.2.26-150600.3.9.1 * php8-fpm-debuginfo-8.2.26-150600.3.9.1 * php8-openssl-debuginfo-8.2.26-150600.3.9.1 * php8-ftp-8.2.26-150600.3.9.1 * php8-gd-8.2.26-150600.3.9.1 * php8-dom-8.2.26-150600.3.9.1 * php8-odbc-debuginfo-8.2.26-150600.3.9.1 * php8-gettext-8.2.26-150600.3.9.1 * php8-posix-debuginfo-8.2.26-150600.3.9.1 * php8-fastcgi-8.2.26-150600.3.9.1 * php8-calendar-8.2.26-150600.3.9.1 * php8-snmp-debuginfo-8.2.26-150600.3.9.1 * php8-dba-8.2.26-150600.3.9.1 * php8-tidy-8.2.26-150600.3.9.1 * php8-sysvsem-debuginfo-8.2.26-150600.3.9.1 * php8-snmp-8.2.26-150600.3.9.1 * php8-pdo-debuginfo-8.2.26-150600.3.9.1 * php8-zip-debuginfo-8.2.26-150600.3.9.1 * php8-sysvsem-8.2.26-150600.3.9.1 * php8-tidy-debuginfo-8.2.26-150600.3.9.1 * php8-ldap-debuginfo-8.2.26-150600.3.9.1 * php8-openssl-8.2.26-150600.3.9.1 * php8-embed-8.2.26-150600.3.9.1 * php8-mysql-8.2.26-150600.3.9.1 * php8-shmop-8.2.26-150600.3.9.1 * php8-embed-debuginfo-8.2.26-150600.3.9.1 * php8-curl-debuginfo-8.2.26-150600.3.9.1 * php8-sqlite-8.2.26-150600.3.9.1 * php8-opcache-8.2.26-150600.3.9.1 * php8-embed-debugsource-8.2.26-150600.3.9.1 * php8-ldap-8.2.26-150600.3.9.1 * php8-pgsql-debuginfo-8.2.26-150600.3.9.1 * php8-sysvmsg-debuginfo-8.2.26-150600.3.9.1 * php8-bz2-debuginfo-8.2.26-150600.3.9.1 * php8-ftp-debuginfo-8.2.26-150600.3.9.1 * php8-soap-8.2.26-150600.3.9.1 * php8-xmlwriter-8.2.26-150600.3.9.1 * php8-bcmath-8.2.26-150600.3.9.1 * php8-fpm-8.2.26-150600.3.9.1 * php8-debugsource-8.2.26-150600.3.9.1 * php8-exif-8.2.26-150600.3.9.1 * php8-cli-debuginfo-8.2.26-150600.3.9.1 * apache2-mod_php8-debuginfo-8.2.26-150600.3.9.1 * php8-zip-8.2.26-150600.3.9.1 * php8-tokenizer-debuginfo-8.2.26-150600.3.9.1 * php8-pgsql-8.2.26-150600.3.9.1 * php8-sysvshm-debuginfo-8.2.26-150600.3.9.1 * php8-8.2.26-150600.3.9.1 * php8-bz2-8.2.26-150600.3.9.1 * php8-sysvmsg-8.2.26-150600.3.9.1 * php8-dom-debuginfo-8.2.26-150600.3.9.1 * php8-intl-debuginfo-8.2.26-150600.3.9.1 * php8-mbstring-8.2.26-150600.3.9.1 * php8-phar-debuginfo-8.2.26-150600.3.9.1 * php8-curl-8.2.26-150600.3.9.1 * php8-pcntl-debuginfo-8.2.26-150600.3.9.1 * php8-xsl-debuginfo-8.2.26-150600.3.9.1 * php8-gmp-8.2.26-150600.3.9.1 * php8-sockets-debuginfo-8.2.26-150600.3.9.1 * php8-mbstring-debuginfo-8.2.26-150600.3.9.1 * php8-bcmath-debuginfo-8.2.26-150600.3.9.1 * php8-ctype-8.2.26-150600.3.9.1 * php8-sysvshm-8.2.26-150600.3.9.1 * php8-zlib-debuginfo-8.2.26-150600.3.9.1 * php8-odbc-8.2.26-150600.3.9.1 * php8-intl-8.2.26-150600.3.9.1 * php8-soap-debuginfo-8.2.26-150600.3.9.1 * php8-tokenizer-8.2.26-150600.3.9.1 * php8-ctype-debuginfo-8.2.26-150600.3.9.1 * apache2-mod_php8-debugsource-8.2.26-150600.3.9.1 * php8-xmlreader-debuginfo-8.2.26-150600.3.9.1 * php8-zlib-8.2.26-150600.3.9.1 * php8-sodium-debuginfo-8.2.26-150600.3.9.1 * php8-debuginfo-8.2.26-150600.3.9.1 * php8-sqlite-debuginfo-8.2.26-150600.3.9.1 * php8-xmlwriter-debuginfo-8.2.26-150600.3.9.1 * apache2-mod_php8-8.2.26-150600.3.9.1 * php8-fpm-debugsource-8.2.26-150600.3.9.1 * php8-sodium-8.2.26-150600.3.9.1 * php8-fileinfo-debuginfo-8.2.26-150600.3.9.1 * php8-gmp-debuginfo-8.2.26-150600.3.9.1 * php8-devel-8.2.26-150600.3.9.1 * php8-shmop-debuginfo-8.2.26-150600.3.9.1 * php8-readline-8.2.26-150600.3.9.1 * php8-calendar-debuginfo-8.2.26-150600.3.9.1 * php8-dba-debuginfo-8.2.26-150600.3.9.1 * php8-test-8.2.26-150600.3.9.1 * php8-pdo-8.2.26-150600.3.9.1 * php8-exif-debuginfo-8.2.26-150600.3.9.1 * php8-mysql-debuginfo-8.2.26-150600.3.9.1 * php8-pcntl-8.2.26-150600.3.9.1 * php8-cli-8.2.26-150600.3.9.1 * php8-gd-debuginfo-8.2.26-150600.3.9.1 * php8-posix-8.2.26-150600.3.9.1 * php8-iconv-8.2.26-150600.3.9.1 * php8-fastcgi-debuginfo-8.2.26-150600.3.9.1 * php8-readline-debuginfo-8.2.26-150600.3.9.1 * php8-fastcgi-debugsource-8.2.26-150600.3.9.1 * openSUSE Leap 15.6 (noarch) * php8-fpm-apache-8.2.26-150600.3.9.1 * Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64) * php8-sockets-8.2.26-150600.3.9.1 * php8-xmlreader-8.2.26-150600.3.9.1 * php8-xsl-8.2.26-150600.3.9.1 * php8-enchant-8.2.26-150600.3.9.1 * php8-iconv-debuginfo-8.2.26-150600.3.9.1 * php8-gettext-debuginfo-8.2.26-150600.3.9.1 * php8-fileinfo-8.2.26-150600.3.9.1 * php8-phar-8.2.26-150600.3.9.1 * php8-opcache-debuginfo-8.2.26-150600.3.9.1 * php8-enchant-debuginfo-8.2.26-150600.3.9.1 * php8-fpm-debuginfo-8.2.26-150600.3.9.1 * php8-openssl-debuginfo-8.2.26-150600.3.9.1 * php8-ftp-8.2.26-150600.3.9.1 * php8-gd-8.2.26-150600.3.9.1 * php8-dom-8.2.26-150600.3.9.1 * php8-odbc-debuginfo-8.2.26-150600.3.9.1 * php8-gettext-8.2.26-150600.3.9.1 * php8-fastcgi-8.2.26-150600.3.9.1 * php8-posix-debuginfo-8.2.26-150600.3.9.1 * php8-calendar-8.2.26-150600.3.9.1 * php8-snmp-debuginfo-8.2.26-150600.3.9.1 * php8-dba-8.2.26-150600.3.9.1 * php8-tidy-8.2.26-150600.3.9.1 * php8-sysvsem-debuginfo-8.2.26-150600.3.9.1 * php8-snmp-8.2.26-150600.3.9.1 * php8-pdo-debuginfo-8.2.26-150600.3.9.1 * php8-zip-debuginfo-8.2.26-150600.3.9.1 * php8-sysvsem-8.2.26-150600.3.9.1 * php8-tidy-debuginfo-8.2.26-150600.3.9.1 * php8-ldap-debuginfo-8.2.26-150600.3.9.1 * php8-embed-8.2.26-150600.3.9.1 * php8-openssl-8.2.26-150600.3.9.1 * php8-mysql-8.2.26-150600.3.9.1 * php8-shmop-8.2.26-150600.3.9.1 * php8-embed-debuginfo-8.2.26-150600.3.9.1 * php8-curl-debuginfo-8.2.26-150600.3.9.1 * php8-sqlite-8.2.26-150600.3.9.1 * php8-opcache-8.2.26-150600.3.9.1 * php8-embed-debugsource-8.2.26-150600.3.9.1 * php8-ldap-8.2.26-150600.3.9.1 * php8-pgsql-debuginfo-8.2.26-150600.3.9.1 * php8-sysvmsg-debuginfo-8.2.26-150600.3.9.1 * php8-bz2-debuginfo-8.2.26-150600.3.9.1 * php8-ftp-debuginfo-8.2.26-150600.3.9.1 * php8-soap-8.2.26-150600.3.9.1 * php8-xmlwriter-8.2.26-150600.3.9.1 * php8-bcmath-8.2.26-150600.3.9.1 * php8-fpm-8.2.26-150600.3.9.1 * php8-debugsource-8.2.26-150600.3.9.1 * php8-exif-8.2.26-150600.3.9.1 * php8-cli-debuginfo-8.2.26-150600.3.9.1 * apache2-mod_php8-debuginfo-8.2.26-150600.3.9.1 * php8-zip-8.2.26-150600.3.9.1 * php8-tokenizer-debuginfo-8.2.26-150600.3.9.1 * php8-pgsql-8.2.26-150600.3.9.1 * php8-sysvshm-debuginfo-8.2.26-150600.3.9.1 * php8-8.2.26-150600.3.9.1 * php8-bz2-8.2.26-150600.3.9.1 * php8-sysvmsg-8.2.26-150600.3.9.1 * php8-dom-debuginfo-8.2.26-150600.3.9.1 * php8-intl-debuginfo-8.2.26-150600.3.9.1 * php8-mbstring-8.2.26-150600.3.9.1 * php8-phar-debuginfo-8.2.26-150600.3.9.1 * php8-curl-8.2.26-150600.3.9.1 * php8-pcntl-debuginfo-8.2.26-150600.3.9.1 * php8-xsl-debuginfo-8.2.26-150600.3.9.1 * php8-gmp-8.2.26-150600.3.9.1 * php8-sockets-debuginfo-8.2.26-150600.3.9.1 * php8-mbstring-debuginfo-8.2.26-150600.3.9.1 * php8-bcmath-debuginfo-8.2.26-150600.3.9.1 * php8-ctype-8.2.26-150600.3.9.1 * php8-sysvshm-8.2.26-150600.3.9.1 * php8-zlib-debuginfo-8.2.26-150600.3.9.1 * php8-odbc-8.2.26-150600.3.9.1 * php8-intl-8.2.26-150600.3.9.1 * php8-soap-debuginfo-8.2.26-150600.3.9.1 * php8-ctype-debuginfo-8.2.26-150600.3.9.1 * php8-tokenizer-8.2.26-150600.3.9.1 * apache2-mod_php8-debugsource-8.2.26-150600.3.9.1 * php8-xmlreader-debuginfo-8.2.26-150600.3.9.1 * php8-zlib-8.2.26-150600.3.9.1 * php8-sodium-debuginfo-8.2.26-150600.3.9.1 * php8-debuginfo-8.2.26-150600.3.9.1 * php8-sqlite-debuginfo-8.2.26-150600.3.9.1 * php8-xmlwriter-debuginfo-8.2.26-150600.3.9.1 * apache2-mod_php8-8.2.26-150600.3.9.1 * php8-fpm-debugsource-8.2.26-150600.3.9.1 * php8-sodium-8.2.26-150600.3.9.1 * php8-fileinfo-debuginfo-8.2.26-150600.3.9.1 * php8-gmp-debuginfo-8.2.26-150600.3.9.1 * php8-devel-8.2.26-150600.3.9.1 * php8-shmop-debuginfo-8.2.26-150600.3.9.1 * php8-readline-8.2.26-150600.3.9.1 * php8-calendar-debuginfo-8.2.26-150600.3.9.1 * php8-dba-debuginfo-8.2.26-150600.3.9.1 * php8-test-8.2.26-150600.3.9.1 * php8-pdo-8.2.26-150600.3.9.1 * php8-exif-debuginfo-8.2.26-150600.3.9.1 * php8-mysql-debuginfo-8.2.26-150600.3.9.1 * php8-pcntl-8.2.26-150600.3.9.1 * php8-cli-8.2.26-150600.3.9.1 * php8-gd-debuginfo-8.2.26-150600.3.9.1 * php8-posix-8.2.26-150600.3.9.1 * php8-iconv-8.2.26-150600.3.9.1 * php8-fastcgi-debuginfo-8.2.26-150600.3.9.1 * php8-readline-debuginfo-8.2.26-150600.3.9.1 * php8-fastcgi-debugsource-8.2.26-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11233.html * https://www.suse.com/security/cve/CVE-2024-11234.html * https://www.suse.com/security/cve/CVE-2024-11236.html * https://www.suse.com/security/cve/CVE-2024-8929.html * https://www.suse.com/security/cve/CVE-2024-8932.html * https://bugzilla.suse.com/show_bug.cgi?id=1233651 * https://bugzilla.suse.com/show_bug.cgi?id=1233702 * https://bugzilla.suse.com/show_bug.cgi?id=1233703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 16:31:33 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 16:31:33 -0000 Subject: SUSE-SU-2024:4135-1: moderate: Security update for python39 Message-ID: <173315709365.13558.9403027960737255722@smelt2.prg2.suse.org> # Security update for python39 Announcement ID: SUSE-SU-2024:4135-1 Release Date: 2024-12-02T12:21:20Z Rating: moderate References: * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python39 fixes the following issues: * CVE-2024-11168: Improper validation of IPv6 and IPvFuture addresses (bsc#1233307). Bug fixes: * Remove -IVendor/ from python-config (bsc#1231795). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4135=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4135=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4135=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4135=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python39-core-debugsource-3.9.20-150300.4.58.1 * libpython3_9-1_0-debuginfo-3.9.20-150300.4.58.1 * python39-debuginfo-3.9.20-150300.4.58.1 * python39-tools-3.9.20-150300.4.58.1 * python39-tk-debuginfo-3.9.20-150300.4.58.1 * python39-dbm-debuginfo-3.9.20-150300.4.58.1 * python39-base-debuginfo-3.9.20-150300.4.58.1 * python39-tk-3.9.20-150300.4.58.1 * python39-doc-3.9.20-150300.4.58.1 * python39-testsuite-debuginfo-3.9.20-150300.4.58.1 * libpython3_9-1_0-3.9.20-150300.4.58.1 * python39-debugsource-3.9.20-150300.4.58.1 * python39-curses-debuginfo-3.9.20-150300.4.58.1 * python39-testsuite-3.9.20-150300.4.58.1 * python39-base-3.9.20-150300.4.58.1 * python39-devel-3.9.20-150300.4.58.1 * python39-curses-3.9.20-150300.4.58.1 * python39-doc-devhelp-3.9.20-150300.4.58.1 * python39-3.9.20-150300.4.58.1 * python39-idle-3.9.20-150300.4.58.1 * python39-dbm-3.9.20-150300.4.58.1 * openSUSE Leap 15.3 (x86_64) * libpython3_9-1_0-32bit-3.9.20-150300.4.58.1 * python39-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-32bit-3.9.20-150300.4.58.1 * libpython3_9-1_0-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-32bit-3.9.20-150300.4.58.1 * openSUSE Leap 15.3 (aarch64_ilp32) * python39-64bit-3.9.20-150300.4.58.1 * python39-64bit-debuginfo-3.9.20-150300.4.58.1 * libpython3_9-1_0-64bit-3.9.20-150300.4.58.1 * libpython3_9-1_0-64bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-64bit-3.9.20-150300.4.58.1 * python39-base-64bit-debuginfo-3.9.20-150300.4.58.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python39-core-debugsource-3.9.20-150300.4.58.1 * libpython3_9-1_0-debuginfo-3.9.20-150300.4.58.1 * python39-debuginfo-3.9.20-150300.4.58.1 * python39-tools-3.9.20-150300.4.58.1 * python39-tk-debuginfo-3.9.20-150300.4.58.1 * python39-dbm-debuginfo-3.9.20-150300.4.58.1 * python39-tk-3.9.20-150300.4.58.1 * python39-base-debuginfo-3.9.20-150300.4.58.1 * python39-doc-3.9.20-150300.4.58.1 * python39-testsuite-debuginfo-3.9.20-150300.4.58.1 * libpython3_9-1_0-3.9.20-150300.4.58.1 * python39-debugsource-3.9.20-150300.4.58.1 * python39-curses-debuginfo-3.9.20-150300.4.58.1 * python39-testsuite-3.9.20-150300.4.58.1 * python39-base-3.9.20-150300.4.58.1 * python39-devel-3.9.20-150300.4.58.1 * python39-curses-3.9.20-150300.4.58.1 * python39-doc-devhelp-3.9.20-150300.4.58.1 * python39-3.9.20-150300.4.58.1 * python39-idle-3.9.20-150300.4.58.1 * python39-dbm-3.9.20-150300.4.58.1 * openSUSE Leap 15.5 (x86_64) * libpython3_9-1_0-32bit-3.9.20-150300.4.58.1 * python39-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-32bit-3.9.20-150300.4.58.1 * libpython3_9-1_0-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-32bit-3.9.20-150300.4.58.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python39-core-debugsource-3.9.20-150300.4.58.1 * libpython3_9-1_0-debuginfo-3.9.20-150300.4.58.1 * python39-debuginfo-3.9.20-150300.4.58.1 * python39-tools-3.9.20-150300.4.58.1 * python39-tk-debuginfo-3.9.20-150300.4.58.1 * python39-dbm-debuginfo-3.9.20-150300.4.58.1 * python39-tk-3.9.20-150300.4.58.1 * python39-base-debuginfo-3.9.20-150300.4.58.1 * python39-doc-3.9.20-150300.4.58.1 * python39-testsuite-debuginfo-3.9.20-150300.4.58.1 * libpython3_9-1_0-3.9.20-150300.4.58.1 * python39-debugsource-3.9.20-150300.4.58.1 * python39-curses-debuginfo-3.9.20-150300.4.58.1 * python39-testsuite-3.9.20-150300.4.58.1 * python39-base-3.9.20-150300.4.58.1 * python39-devel-3.9.20-150300.4.58.1 * python39-curses-3.9.20-150300.4.58.1 * python39-doc-devhelp-3.9.20-150300.4.58.1 * python39-3.9.20-150300.4.58.1 * python39-idle-3.9.20-150300.4.58.1 * python39-dbm-3.9.20-150300.4.58.1 * openSUSE Leap 15.6 (x86_64) * libpython3_9-1_0-32bit-3.9.20-150300.4.58.1 * python39-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-32bit-3.9.20-150300.4.58.1 * libpython3_9-1_0-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-base-32bit-debuginfo-3.9.20-150300.4.58.1 * python39-32bit-3.9.20-150300.4.58.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python39-base-3.9.20-150300.4.58.1 * python39-curses-3.9.20-150300.4.58.1 * libpython3_9-1_0-3.9.20-150300.4.58.1 * python39-3.9.20-150300.4.58.1 * python39-dbm-3.9.20-150300.4.58.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 20:30:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 20:30:05 -0000 Subject: SUSE-SU-2024:4143-1: important: Security update for python3-virtualenv Message-ID: <173317140572.13380.4222944944291026435@smelt2.prg2.suse.org> # Security update for python3-virtualenv Announcement ID: SUSE-SU-2024:4143-1 Release Date: 2024-12-02T19:50:36Z Rating: important References: * bsc#1232072 * bsc#1233706 Cross-References: * CVE-2024-53899 CVSS scores: * CVE-2024-53899 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53899 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-53899 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53899 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python3-virtualenv fixes the following issues: Security issue fixed: * CVE-2024-53899: Fixed a command injection through activation scripts (bsc#1233706) Non-security issue fixed: * Relax version requirements that cannot be provided (bsc#1232072) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4143=1 openSUSE-SLE-15.6-2024-4143=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4143=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python3-virtualenv-20.17.1-150600.3.5.1 * Development Tools Module 15-SP6 (noarch) * python3-virtualenv-20.17.1-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53899.html * https://bugzilla.suse.com/show_bug.cgi?id=1232072 * https://bugzilla.suse.com/show_bug.cgi?id=1233706 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 2 20:30:09 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 02 Dec 2024 20:30:09 -0000 Subject: SUSE-SU-2024:4142-1: important: Security update for wireshark Message-ID: <173317140934.13380.10340382336251707038@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:4142-1 Release Date: 2024-12-02T19:48:58Z Rating: important References: * bsc#1233593 * bsc#1233594 Cross-References: * CVE-2024-11595 * CVE-2024-11596 CVSS scores: * CVE-2024-11595 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-11596 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * CVE-2024-11595: FiveCo RAP dissector infinite loop (bsc#1233594). * CVE-2024-11596: ECMP dissector crash (bsc#1233593). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4142=1 SUSE-2024-4142=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4142=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4142=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wireshark-debuginfo-4.2.9-150600.18.17.1 * wireshark-debugsource-4.2.9-150600.18.17.1 * libwireshark17-debuginfo-4.2.9-150600.18.17.1 * libwsutil15-debuginfo-4.2.9-150600.18.17.1 * wireshark-4.2.9-150600.18.17.1 * libwsutil15-4.2.9-150600.18.17.1 * libwireshark17-4.2.9-150600.18.17.1 * libwiretap14-debuginfo-4.2.9-150600.18.17.1 * libwiretap14-4.2.9-150600.18.17.1 * wireshark-devel-4.2.9-150600.18.17.1 * wireshark-ui-qt-debuginfo-4.2.9-150600.18.17.1 * wireshark-ui-qt-4.2.9-150600.18.17.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-4.2.9-150600.18.17.1 * wireshark-debugsource-4.2.9-150600.18.17.1 * libwireshark17-debuginfo-4.2.9-150600.18.17.1 * libwsutil15-debuginfo-4.2.9-150600.18.17.1 * wireshark-4.2.9-150600.18.17.1 * libwsutil15-4.2.9-150600.18.17.1 * libwireshark17-4.2.9-150600.18.17.1 * libwiretap14-debuginfo-4.2.9-150600.18.17.1 * libwiretap14-4.2.9-150600.18.17.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wireshark-debuginfo-4.2.9-150600.18.17.1 * wireshark-debugsource-4.2.9-150600.18.17.1 * wireshark-devel-4.2.9-150600.18.17.1 * wireshark-ui-qt-debuginfo-4.2.9-150600.18.17.1 * wireshark-ui-qt-4.2.9-150600.18.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11595.html * https://www.suse.com/security/cve/CVE-2024-11596.html * https://bugzilla.suse.com/show_bug.cgi?id=1233593 * https://bugzilla.suse.com/show_bug.cgi?id=1233594 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 12:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 12:30:06 -0000 Subject: SUSE-SU-2024:4153-1: moderate: Security update for python310 Message-ID: <173322900681.12776.18040585235163313862@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2024:4153-1 Release Date: 2024-12-03T11:12:53Z Rating: moderate References: * bsc#1231795 * bsc#1232750 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2024-11168: improper validation of IPv6 and IPvFuture addresses. (bsc#1233307) Bug fixes: * Remove -IVendor/ from python-config. (bsc#1231795) * Include renaming :noindex: option to :no-index: in Sphinx 7.2. (bsc#1232750) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4153=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4153=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4153=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-curses-debuginfo-3.10.15-150400.4.63.1 * python310-devel-3.10.15-150400.4.63.1 * python310-debugsource-3.10.15-150400.4.63.1 * python310-curses-3.10.15-150400.4.63.1 * libpython3_10-1_0-debuginfo-3.10.15-150400.4.63.1 * python310-base-3.10.15-150400.4.63.1 * python310-3.10.15-150400.4.63.1 * python310-doc-3.10.15-150400.4.63.1 * python310-core-debugsource-3.10.15-150400.4.63.1 * python310-debuginfo-3.10.15-150400.4.63.1 * python310-dbm-debuginfo-3.10.15-150400.4.63.1 * python310-dbm-3.10.15-150400.4.63.1 * python310-tk-3.10.15-150400.4.63.1 * python310-tools-3.10.15-150400.4.63.1 * python310-doc-devhelp-3.10.15-150400.4.63.1 * python310-testsuite-debuginfo-3.10.15-150400.4.63.1 * python310-testsuite-3.10.15-150400.4.63.1 * python310-tk-debuginfo-3.10.15-150400.4.63.1 * python310-base-debuginfo-3.10.15-150400.4.63.1 * python310-idle-3.10.15-150400.4.63.1 * libpython3_10-1_0-3.10.15-150400.4.63.1 * openSUSE Leap 15.4 (x86_64) * python310-base-32bit-3.10.15-150400.4.63.1 * python310-32bit-debuginfo-3.10.15-150400.4.63.1 * libpython3_10-1_0-32bit-3.10.15-150400.4.63.1 * python310-base-32bit-debuginfo-3.10.15-150400.4.63.1 * python310-32bit-3.10.15-150400.4.63.1 * libpython3_10-1_0-32bit-debuginfo-3.10.15-150400.4.63.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-64bit-3.10.15-150400.4.63.1 * python310-base-64bit-debuginfo-3.10.15-150400.4.63.1 * libpython3_10-1_0-64bit-3.10.15-150400.4.63.1 * libpython3_10-1_0-64bit-debuginfo-3.10.15-150400.4.63.1 * python310-base-64bit-3.10.15-150400.4.63.1 * python310-64bit-debuginfo-3.10.15-150400.4.63.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python310-curses-debuginfo-3.10.15-150400.4.63.1 * python310-devel-3.10.15-150400.4.63.1 * python310-debugsource-3.10.15-150400.4.63.1 * python310-curses-3.10.15-150400.4.63.1 * libpython3_10-1_0-debuginfo-3.10.15-150400.4.63.1 * python310-base-3.10.15-150400.4.63.1 * python310-3.10.15-150400.4.63.1 * python310-doc-3.10.15-150400.4.63.1 * python310-core-debugsource-3.10.15-150400.4.63.1 * python310-debuginfo-3.10.15-150400.4.63.1 * python310-dbm-debuginfo-3.10.15-150400.4.63.1 * python310-dbm-3.10.15-150400.4.63.1 * python310-tk-3.10.15-150400.4.63.1 * python310-tools-3.10.15-150400.4.63.1 * python310-doc-devhelp-3.10.15-150400.4.63.1 * python310-testsuite-debuginfo-3.10.15-150400.4.63.1 * python310-testsuite-3.10.15-150400.4.63.1 * python310-tk-debuginfo-3.10.15-150400.4.63.1 * python310-base-debuginfo-3.10.15-150400.4.63.1 * python310-idle-3.10.15-150400.4.63.1 * libpython3_10-1_0-3.10.15-150400.4.63.1 * openSUSE Leap 15.5 (x86_64) * python310-base-32bit-3.10.15-150400.4.63.1 * python310-32bit-debuginfo-3.10.15-150400.4.63.1 * libpython3_10-1_0-32bit-3.10.15-150400.4.63.1 * python310-base-32bit-debuginfo-3.10.15-150400.4.63.1 * python310-32bit-3.10.15-150400.4.63.1 * libpython3_10-1_0-32bit-debuginfo-3.10.15-150400.4.63.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python310-curses-debuginfo-3.10.15-150400.4.63.1 * python310-devel-3.10.15-150400.4.63.1 * python310-debugsource-3.10.15-150400.4.63.1 * python310-curses-3.10.15-150400.4.63.1 * libpython3_10-1_0-debuginfo-3.10.15-150400.4.63.1 * python310-base-3.10.15-150400.4.63.1 * python310-3.10.15-150400.4.63.1 * python310-doc-3.10.15-150400.4.63.1 * python310-core-debugsource-3.10.15-150400.4.63.1 * python310-debuginfo-3.10.15-150400.4.63.1 * python310-dbm-debuginfo-3.10.15-150400.4.63.1 * python310-dbm-3.10.15-150400.4.63.1 * python310-tk-3.10.15-150400.4.63.1 * python310-tools-3.10.15-150400.4.63.1 * python310-doc-devhelp-3.10.15-150400.4.63.1 * python310-testsuite-debuginfo-3.10.15-150400.4.63.1 * python310-testsuite-3.10.15-150400.4.63.1 * python310-tk-debuginfo-3.10.15-150400.4.63.1 * python310-base-debuginfo-3.10.15-150400.4.63.1 * python310-idle-3.10.15-150400.4.63.1 * libpython3_10-1_0-3.10.15-150400.4.63.1 * openSUSE Leap 15.6 (x86_64) * python310-base-32bit-3.10.15-150400.4.63.1 * python310-32bit-debuginfo-3.10.15-150400.4.63.1 * libpython3_10-1_0-32bit-3.10.15-150400.4.63.1 * python310-base-32bit-debuginfo-3.10.15-150400.4.63.1 * python310-32bit-3.10.15-150400.4.63.1 * libpython3_10-1_0-32bit-debuginfo-3.10.15-150400.4.63.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1232750 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 12:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 12:30:10 -0000 Subject: SUSE-SU-2024:4152-1: important: Security update for editorconfig-core-c Message-ID: <173322901060.12776.7945159431313006512@smelt2.prg2.suse.org> # Security update for editorconfig-core-c Announcement ID: SUSE-SU-2024:4152-1 Release Date: 2024-12-03T11:10:58Z Rating: important References: * bsc#1233815 Cross-References: * CVE-2024-53849 CVSS scores: * CVE-2024-53849 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-53849 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for editorconfig-core-c fixes the following issues: * CVE-2024-53849: stack buffer overflow and pointer overflow when handling escaped characters. (bsc#1233815) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4152=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4152=1 openSUSE-SLE-15.6-2024-4152=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * editorconfig-core-c-debugsource-0.12.6-150600.3.3.1 * libeditorconfig0-0.12.6-150600.3.3.1 * libeditorconfig0-debuginfo-0.12.6-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libeditorconfig0-debuginfo-0.12.6-150600.3.3.1 * editorconfig-debuginfo-0.12.6-150600.3.3.1 * editorconfig-0.12.6-150600.3.3.1 * libeditorconfig-devel-0.12.6-150600.3.3.1 * editorconfig-core-c-debugsource-0.12.6-150600.3.3.1 * libeditorconfig0-0.12.6-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libeditorconfig0-32bit-0.12.6-150600.3.3.1 * libeditorconfig0-32bit-debuginfo-0.12.6-150600.3.3.1 * libeditorconfig-devel-32bit-0.12.6-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libeditorconfig-devel-64bit-0.12.6-150600.3.3.1 * libeditorconfig0-64bit-debuginfo-0.12.6-150600.3.3.1 * libeditorconfig0-64bit-0.12.6-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53849.html * https://bugzilla.suse.com/show_bug.cgi?id=1233815 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 12:30:14 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 12:30:14 -0000 Subject: SUSE-SU-2024:4151-1: low: Security update for python Message-ID: <173322901478.12776.5946512970383041536@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2024:4151-1 Release Date: 2024-12-03T10:39:25Z Rating: low References: * bsc#1227378 * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for python fixes the following issues: * CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307) Other fixes: \- Add ipaddress module from https://github.com/phihag/ipaddress \- Remove -IVendor/ from python-config (bsc#1231795) \- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4151=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4151=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4151=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4151=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-curses-2.7.18-150000.68.1 * libpython2_7-1_0-2.7.18-150000.68.1 * python-base-debugsource-2.7.18-150000.68.1 * python-base-2.7.18-150000.68.1 * python-xml-debuginfo-2.7.18-150000.68.1 * python-debugsource-2.7.18-150000.68.1 * python-base-debuginfo-2.7.18-150000.68.1 * python-devel-2.7.18-150000.68.1 * python-debuginfo-2.7.18-150000.68.1 * python-idle-2.7.18-150000.68.1 * python-tk-2.7.18-150000.68.1 * python-tk-debuginfo-2.7.18-150000.68.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.68.1 * python-gdbm-2.7.18-150000.68.1 * python-curses-debuginfo-2.7.18-150000.68.1 * python-xml-2.7.18-150000.68.1 * python-gdbm-debuginfo-2.7.18-150000.68.1 * python-2.7.18-150000.68.1 * python-demo-2.7.18-150000.68.1 * openSUSE Leap 15.5 (x86_64) * python-32bit-2.7.18-150000.68.1 * python-base-32bit-debuginfo-2.7.18-150000.68.1 * python-base-32bit-2.7.18-150000.68.1 * libpython2_7-1_0-32bit-2.7.18-150000.68.1 * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.68.1 * python-32bit-debuginfo-2.7.18-150000.68.1 * openSUSE Leap 15.5 (noarch) * python-doc-pdf-2.7.18-150000.68.1 * python-doc-2.7.18-150000.68.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-curses-2.7.18-150000.68.1 * libpython2_7-1_0-2.7.18-150000.68.1 * python-base-debugsource-2.7.18-150000.68.1 * python-base-2.7.18-150000.68.1 * python-xml-debuginfo-2.7.18-150000.68.1 * python-debugsource-2.7.18-150000.68.1 * python-base-debuginfo-2.7.18-150000.68.1 * python-devel-2.7.18-150000.68.1 * python-debuginfo-2.7.18-150000.68.1 * python-idle-2.7.18-150000.68.1 * python-tk-2.7.18-150000.68.1 * python-tk-debuginfo-2.7.18-150000.68.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.68.1 * python-gdbm-2.7.18-150000.68.1 * python-curses-debuginfo-2.7.18-150000.68.1 * python-xml-2.7.18-150000.68.1 * python-gdbm-debuginfo-2.7.18-150000.68.1 * python-2.7.18-150000.68.1 * python-demo-2.7.18-150000.68.1 * openSUSE Leap 15.6 (x86_64) * python-32bit-2.7.18-150000.68.1 * python-base-32bit-debuginfo-2.7.18-150000.68.1 * python-base-32bit-2.7.18-150000.68.1 * libpython2_7-1_0-32bit-2.7.18-150000.68.1 * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.68.1 * python-32bit-debuginfo-2.7.18-150000.68.1 * openSUSE Leap 15.6 (noarch) * python-doc-pdf-2.7.18-150000.68.1 * python-doc-2.7.18-150000.68.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python-curses-2.7.18-150000.68.1 * libpython2_7-1_0-2.7.18-150000.68.1 * python-base-debugsource-2.7.18-150000.68.1 * python-base-2.7.18-150000.68.1 * python-xml-debuginfo-2.7.18-150000.68.1 * python-debugsource-2.7.18-150000.68.1 * python-base-debuginfo-2.7.18-150000.68.1 * python-devel-2.7.18-150000.68.1 * python-debuginfo-2.7.18-150000.68.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.68.1 * python-gdbm-2.7.18-150000.68.1 * python-curses-debuginfo-2.7.18-150000.68.1 * python-xml-2.7.18-150000.68.1 * python-gdbm-debuginfo-2.7.18-150000.68.1 * python-2.7.18-150000.68.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python-curses-2.7.18-150000.68.1 * libpython2_7-1_0-2.7.18-150000.68.1 * python-base-debugsource-2.7.18-150000.68.1 * python-base-2.7.18-150000.68.1 * python-xml-debuginfo-2.7.18-150000.68.1 * python-debugsource-2.7.18-150000.68.1 * python-base-debuginfo-2.7.18-150000.68.1 * python-debuginfo-2.7.18-150000.68.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.68.1 * python-gdbm-2.7.18-150000.68.1 * python-curses-debuginfo-2.7.18-150000.68.1 * python-xml-2.7.18-150000.68.1 * python-gdbm-debuginfo-2.7.18-150000.68.1 * python-2.7.18-150000.68.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 12:30:27 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 12:30:27 -0000 Subject: SUSE-SU-2024:4148-1: important: Security update for MozillaThunderbird Message-ID: <173322902717.12776.8777340362456352245@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:4148-1 Release Date: 2024-12-03T09:10:23Z Rating: important References: * bsc#1233650 * bsc#1233695 Cross-References: * CVE-2024-11691 * CVE-2024-11692 * CVE-2024-11693 * CVE-2024-11694 * CVE-2024-11695 * CVE-2024-11696 * CVE-2024-11697 * CVE-2024-11698 * CVE-2024-11699 CVSS scores: * CVE-2024-11691 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-11692 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-11693 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-11694 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2024-11695 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-11696 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-11697 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-11698 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-11699 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves nine vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: * Mozilla Thunderbird 128.5 * fixed: IMAP could crash when reading cached messages * fixed: Enabling "Show Folder Size" on Maildir profile could render Thunderbird unusable * fixed: Messages corrupted by folder compaction were only fixed by user intervention * fixed: Reading a message from past the end of an mbox file did not cause an error * fixed: View -> Folders had duplicate F access keys * fixed: Add-ons adding columns to the message list could fail and cause display issue * fixed: "Empty trash on exit" and "Expunge inbox on exit" did not always work * fixed: Selecting a display option in View -> Tasks did not apply in the Task interface * fixed: Security fixes MFSA 2024-68 (bsc#1233695) * CVE-2024-11691 Out-of-bounds write in Apple GPU drivers via WebGL * CVE-2024-11692 Select list elements could be shown over another site * CVE-2024-11693 Download Protections were bypassed by .library-ms files on Windows * CVE-2024-11694 CSP Bypass and XSS Exposure via Web Compatibility Shims * CVE-2024-11695 URL Bar Spoofing via Manipulated Punycode and Whitespace Characters * CVE-2024-11696 Unhandled Exception in Add-on Signature Verification * CVE-2024-11697 Improper Keypress Handling in Executable File Confirmation Dialog * CVE-2024-11698 Fullscreen Lock-Up When Modal Dialog Interrupts Transition on macOS * CVE-2024-11699 Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 * Handle upstream changes with esr-prefix of desktop-file (bsc#1233650) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4148=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4148=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4148=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4148=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-4148=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-4148=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 * MozillaThunderbird-128.5.0-150200.8.191.1 * MozillaThunderbird-debugsource-128.5.0-150200.8.191.1 * MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 * MozillaThunderbird-debuginfo-128.5.0-150200.8.191.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 * MozillaThunderbird-128.5.0-150200.8.191.1 * MozillaThunderbird-debugsource-128.5.0-150200.8.191.1 * MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 * MozillaThunderbird-debuginfo-128.5.0-150200.8.191.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 * MozillaThunderbird-128.5.0-150200.8.191.1 * MozillaThunderbird-debugsource-128.5.0-150200.8.191.1 * MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 * MozillaThunderbird-debuginfo-128.5.0-150200.8.191.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 * MozillaThunderbird-128.5.0-150200.8.191.1 * MozillaThunderbird-debugsource-128.5.0-150200.8.191.1 * MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 * MozillaThunderbird-debuginfo-128.5.0-150200.8.191.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 * MozillaThunderbird-128.5.0-150200.8.191.1 * MozillaThunderbird-debugsource-128.5.0-150200.8.191.1 * MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 * MozillaThunderbird-debuginfo-128.5.0-150200.8.191.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 * MozillaThunderbird-128.5.0-150200.8.191.1 * MozillaThunderbird-debugsource-128.5.0-150200.8.191.1 * MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 * MozillaThunderbird-debuginfo-128.5.0-150200.8.191.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11691.html * https://www.suse.com/security/cve/CVE-2024-11692.html * https://www.suse.com/security/cve/CVE-2024-11693.html * https://www.suse.com/security/cve/CVE-2024-11694.html * https://www.suse.com/security/cve/CVE-2024-11695.html * https://www.suse.com/security/cve/CVE-2024-11696.html * https://www.suse.com/security/cve/CVE-2024-11697.html * https://www.suse.com/security/cve/CVE-2024-11698.html * https://www.suse.com/security/cve/CVE-2024-11699.html * https://bugzilla.suse.com/show_bug.cgi?id=1233650 * https://bugzilla.suse.com/show_bug.cgi?id=1233695 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 12:30:32 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 12:30:32 -0000 Subject: SUSE-SU-2024:4146-1: moderate: Security update for php7 Message-ID: <173322903220.12776.1629589176881727923@smelt2.prg2.suse.org> # Security update for php7 Announcement ID: SUSE-SU-2024:4146-1 Release Date: 2024-12-03T09:08:38Z Rating: moderate References: * bsc#1233651 * bsc#1233702 * bsc#1233703 Cross-References: * CVE-2024-11233 * CVE-2024-11234 * CVE-2024-8929 CVSS scores: * CVE-2024-11233 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-11233 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-11233 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-11233 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-11234 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-11234 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-11234 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-11234 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-8929 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-8929 ( NVD ): 5.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Legacy Module 15-SP5 * Legacy Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for php7 fixes the following issues: * CVE-2024-11233: Single byte overread with convert.quoted-printable-decode filter (bsc#1233702). * CVE-2024-11234: Configuring a proxy in a stream context might allow for CRLF injection in URIs (bsc#1233703). * CVE-2024-8929: Leak partial content of the heap through heap buffer over- read (bsc#1233651). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4146=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4146=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4146=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4146=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4146=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4146=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4146=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php7-tokenizer-7.4.33-150400.4.43.1 * php7-snmp-7.4.33-150400.4.43.1 * php7-zlib-debuginfo-7.4.33-150400.4.43.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.43.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.43.1 * php7-intl-7.4.33-150400.4.43.1 * php7-enchant-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.43.1 * php7-sysvshm-7.4.33-150400.4.43.1 * php7-iconv-debuginfo-7.4.33-150400.4.43.1 * php7-sqlite-debuginfo-7.4.33-150400.4.43.1 * php7-embed-7.4.33-150400.4.43.1 * php7-pdo-debuginfo-7.4.33-150400.4.43.1 * php7-readline-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-7.4.33-150400.4.43.1 * php7-zip-7.4.33-150400.4.43.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.43.1 * php7-opcache-debuginfo-7.4.33-150400.4.43.1 * php7-xmlrpc-7.4.33-150400.4.43.1 * php7-tidy-debuginfo-7.4.33-150400.4.43.1 * php7-cli-7.4.33-150400.4.43.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-7.4.33-150400.4.43.1 * php7-fileinfo-7.4.33-150400.4.43.1 * php7-ftp-7.4.33-150400.4.43.1 * php7-calendar-7.4.33-150400.4.43.1 * php7-phar-7.4.33-150400.4.43.1 * php7-gd-debuginfo-7.4.33-150400.4.43.1 * php7-sqlite-7.4.33-150400.4.43.1 * php7-fpm-7.4.33-150400.4.43.1 * php7-embed-debugsource-7.4.33-150400.4.43.1 * php7-gettext-7.4.33-150400.4.43.1 * php7-sysvmsg-7.4.33-150400.4.43.1 * php7-curl-debuginfo-7.4.33-150400.4.43.1 * php7-dom-7.4.33-150400.4.43.1 * php7-intl-debuginfo-7.4.33-150400.4.43.1 * php7-json-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-7.4.33-150400.4.43.1 * php7-tidy-7.4.33-150400.4.43.1 * php7-sockets-7.4.33-150400.4.43.1 * php7-enchant-7.4.33-150400.4.43.1 * php7-dba-7.4.33-150400.4.43.1 * php7-ctype-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-7.4.33-150400.4.43.1 * php7-exif-7.4.33-150400.4.43.1 * php7-xsl-debuginfo-7.4.33-150400.4.43.1 * php7-posix-7.4.33-150400.4.43.1 * php7-odbc-7.4.33-150400.4.43.1 * php7-xmlwriter-7.4.33-150400.4.43.1 * php7-sysvsem-7.4.33-150400.4.43.1 * php7-ctype-7.4.33-150400.4.43.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.43.1 * php7-iconv-7.4.33-150400.4.43.1 * php7-debuginfo-7.4.33-150400.4.43.1 * php7-exif-debuginfo-7.4.33-150400.4.43.1 * php7-cli-debuginfo-7.4.33-150400.4.43.1 * php7-calendar-debuginfo-7.4.33-150400.4.43.1 * php7-posix-debuginfo-7.4.33-150400.4.43.1 * php7-snmp-debuginfo-7.4.33-150400.4.43.1 * php7-bcmath-debuginfo-7.4.33-150400.4.43.1 * apache2-mod_php7-7.4.33-150400.4.43.1 * php7-devel-7.4.33-150400.4.43.1 * php7-bcmath-7.4.33-150400.4.43.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-debuginfo-7.4.33-150400.4.43.1 * php7-json-7.4.33-150400.4.43.1 * php7-xsl-7.4.33-150400.4.43.1 * php7-7.4.33-150400.4.43.1 * php7-pcntl-7.4.33-150400.4.43.1 * php7-openssl-7.4.33-150400.4.43.1 * php7-fpm-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-debuginfo-7.4.33-150400.4.43.1 * php7-zlib-7.4.33-150400.4.43.1 * php7-gettext-debuginfo-7.4.33-150400.4.43.1 * php7-embed-debuginfo-7.4.33-150400.4.43.1 * php7-phar-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-7.4.33-150400.4.43.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.43.1 * php7-soap-7.4.33-150400.4.43.1 * php7-fpm-debugsource-7.4.33-150400.4.43.1 * php7-openssl-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-debuginfo-7.4.33-150400.4.43.1 * php7-pcntl-debuginfo-7.4.33-150400.4.43.1 * php7-gd-7.4.33-150400.4.43.1 * php7-ldap-7.4.33-150400.4.43.1 * php7-dom-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-debuginfo-7.4.33-150400.4.43.1 * php7-mysql-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-7.4.33-150400.4.43.1 * php7-zip-debuginfo-7.4.33-150400.4.43.1 * php7-opcache-7.4.33-150400.4.43.1 * php7-soap-debuginfo-7.4.33-150400.4.43.1 * php7-ldap-debuginfo-7.4.33-150400.4.43.1 * php7-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-7.4.33-150400.4.43.1 * php7-mysql-7.4.33-150400.4.43.1 * php7-ftp-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-7.4.33-150400.4.43.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.43.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.43.1 * php7-test-7.4.33-150400.4.43.1 * php7-dba-debuginfo-7.4.33-150400.4.43.1 * php7-curl-7.4.33-150400.4.43.1 * php7-odbc-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-7.4.33-150400.4.43.1 * php7-sockets-debuginfo-7.4.33-150400.4.43.1 * php7-readline-7.4.33-150400.4.43.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.43.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * php7-tokenizer-7.4.33-150400.4.43.1 * php7-snmp-7.4.33-150400.4.43.1 * php7-zlib-debuginfo-7.4.33-150400.4.43.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.43.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.43.1 * php7-intl-7.4.33-150400.4.43.1 * php7-enchant-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.43.1 * php7-sysvshm-7.4.33-150400.4.43.1 * php7-iconv-debuginfo-7.4.33-150400.4.43.1 * php7-sqlite-debuginfo-7.4.33-150400.4.43.1 * php7-embed-7.4.33-150400.4.43.1 * php7-pdo-debuginfo-7.4.33-150400.4.43.1 * php7-readline-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-7.4.33-150400.4.43.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.43.1 * php7-zip-7.4.33-150400.4.43.1 * php7-opcache-debuginfo-7.4.33-150400.4.43.1 * php7-xmlrpc-7.4.33-150400.4.43.1 * php7-tidy-debuginfo-7.4.33-150400.4.43.1 * php7-cli-7.4.33-150400.4.43.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-7.4.33-150400.4.43.1 * php7-fileinfo-7.4.33-150400.4.43.1 * php7-ftp-7.4.33-150400.4.43.1 * php7-calendar-7.4.33-150400.4.43.1 * php7-fpm-7.4.33-150400.4.43.1 * php7-gd-debuginfo-7.4.33-150400.4.43.1 * php7-phar-7.4.33-150400.4.43.1 * php7-sqlite-7.4.33-150400.4.43.1 * php7-embed-debugsource-7.4.33-150400.4.43.1 * php7-gettext-7.4.33-150400.4.43.1 * php7-sysvmsg-7.4.33-150400.4.43.1 * php7-curl-debuginfo-7.4.33-150400.4.43.1 * php7-dom-7.4.33-150400.4.43.1 * php7-intl-debuginfo-7.4.33-150400.4.43.1 * php7-json-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-7.4.33-150400.4.43.1 * php7-tidy-7.4.33-150400.4.43.1 * php7-sockets-7.4.33-150400.4.43.1 * php7-enchant-7.4.33-150400.4.43.1 * php7-dba-7.4.33-150400.4.43.1 * php7-ctype-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-7.4.33-150400.4.43.1 * php7-exif-7.4.33-150400.4.43.1 * php7-xsl-debuginfo-7.4.33-150400.4.43.1 * php7-posix-7.4.33-150400.4.43.1 * php7-odbc-7.4.33-150400.4.43.1 * php7-xmlwriter-7.4.33-150400.4.43.1 * php7-ctype-7.4.33-150400.4.43.1 * php7-sysvsem-7.4.33-150400.4.43.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.43.1 * php7-iconv-7.4.33-150400.4.43.1 * php7-debuginfo-7.4.33-150400.4.43.1 * php7-exif-debuginfo-7.4.33-150400.4.43.1 * php7-cli-debuginfo-7.4.33-150400.4.43.1 * php7-calendar-debuginfo-7.4.33-150400.4.43.1 * php7-posix-debuginfo-7.4.33-150400.4.43.1 * php7-snmp-debuginfo-7.4.33-150400.4.43.1 * php7-bcmath-debuginfo-7.4.33-150400.4.43.1 * apache2-mod_php7-7.4.33-150400.4.43.1 * php7-devel-7.4.33-150400.4.43.1 * php7-bcmath-7.4.33-150400.4.43.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-debuginfo-7.4.33-150400.4.43.1 * php7-json-7.4.33-150400.4.43.1 * php7-xsl-7.4.33-150400.4.43.1 * php7-7.4.33-150400.4.43.1 * php7-pcntl-7.4.33-150400.4.43.1 * php7-openssl-7.4.33-150400.4.43.1 * php7-fpm-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-debuginfo-7.4.33-150400.4.43.1 * php7-zlib-7.4.33-150400.4.43.1 * php7-gettext-debuginfo-7.4.33-150400.4.43.1 * php7-embed-debuginfo-7.4.33-150400.4.43.1 * php7-phar-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-7.4.33-150400.4.43.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.43.1 * php7-soap-7.4.33-150400.4.43.1 * php7-fpm-debugsource-7.4.33-150400.4.43.1 * php7-openssl-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-debuginfo-7.4.33-150400.4.43.1 * php7-pcntl-debuginfo-7.4.33-150400.4.43.1 * php7-gd-7.4.33-150400.4.43.1 * php7-ldap-7.4.33-150400.4.43.1 * php7-dom-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-debuginfo-7.4.33-150400.4.43.1 * php7-mysql-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-7.4.33-150400.4.43.1 * php7-zip-debuginfo-7.4.33-150400.4.43.1 * php7-opcache-7.4.33-150400.4.43.1 * php7-soap-debuginfo-7.4.33-150400.4.43.1 * php7-ldap-debuginfo-7.4.33-150400.4.43.1 * php7-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-7.4.33-150400.4.43.1 * php7-mysql-7.4.33-150400.4.43.1 * php7-ftp-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-7.4.33-150400.4.43.1 * php7-test-7.4.33-150400.4.43.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.43.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.43.1 * php7-dba-debuginfo-7.4.33-150400.4.43.1 * php7-curl-7.4.33-150400.4.43.1 * php7-odbc-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-7.4.33-150400.4.43.1 * php7-sockets-debuginfo-7.4.33-150400.4.43.1 * php7-readline-7.4.33-150400.4.43.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.43.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * php7-tokenizer-7.4.33-150400.4.43.1 * php7-snmp-7.4.33-150400.4.43.1 * php7-zlib-debuginfo-7.4.33-150400.4.43.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.43.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.43.1 * php7-intl-7.4.33-150400.4.43.1 * php7-enchant-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.43.1 * php7-sysvshm-7.4.33-150400.4.43.1 * php7-iconv-debuginfo-7.4.33-150400.4.43.1 * php7-sqlite-debuginfo-7.4.33-150400.4.43.1 * php7-embed-7.4.33-150400.4.43.1 * php7-pdo-debuginfo-7.4.33-150400.4.43.1 * php7-readline-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-7.4.33-150400.4.43.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.43.1 * php7-zip-7.4.33-150400.4.43.1 * php7-opcache-debuginfo-7.4.33-150400.4.43.1 * php7-xmlrpc-7.4.33-150400.4.43.1 * php7-tidy-debuginfo-7.4.33-150400.4.43.1 * php7-cli-7.4.33-150400.4.43.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-7.4.33-150400.4.43.1 * php7-fileinfo-7.4.33-150400.4.43.1 * php7-ftp-7.4.33-150400.4.43.1 * php7-calendar-7.4.33-150400.4.43.1 * php7-fpm-7.4.33-150400.4.43.1 * php7-gd-debuginfo-7.4.33-150400.4.43.1 * php7-phar-7.4.33-150400.4.43.1 * php7-sqlite-7.4.33-150400.4.43.1 * php7-embed-debugsource-7.4.33-150400.4.43.1 * php7-gettext-7.4.33-150400.4.43.1 * php7-sysvmsg-7.4.33-150400.4.43.1 * php7-curl-debuginfo-7.4.33-150400.4.43.1 * php7-dom-7.4.33-150400.4.43.1 * php7-intl-debuginfo-7.4.33-150400.4.43.1 * php7-json-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-7.4.33-150400.4.43.1 * php7-tidy-7.4.33-150400.4.43.1 * php7-sockets-7.4.33-150400.4.43.1 * php7-enchant-7.4.33-150400.4.43.1 * php7-dba-7.4.33-150400.4.43.1 * php7-ctype-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-7.4.33-150400.4.43.1 * php7-exif-7.4.33-150400.4.43.1 * php7-xsl-debuginfo-7.4.33-150400.4.43.1 * php7-posix-7.4.33-150400.4.43.1 * php7-odbc-7.4.33-150400.4.43.1 * php7-xmlwriter-7.4.33-150400.4.43.1 * php7-ctype-7.4.33-150400.4.43.1 * php7-sysvsem-7.4.33-150400.4.43.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.43.1 * php7-iconv-7.4.33-150400.4.43.1 * php7-debuginfo-7.4.33-150400.4.43.1 * php7-exif-debuginfo-7.4.33-150400.4.43.1 * php7-cli-debuginfo-7.4.33-150400.4.43.1 * php7-calendar-debuginfo-7.4.33-150400.4.43.1 * php7-posix-debuginfo-7.4.33-150400.4.43.1 * php7-snmp-debuginfo-7.4.33-150400.4.43.1 * php7-bcmath-debuginfo-7.4.33-150400.4.43.1 * apache2-mod_php7-7.4.33-150400.4.43.1 * php7-devel-7.4.33-150400.4.43.1 * php7-bcmath-7.4.33-150400.4.43.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-debuginfo-7.4.33-150400.4.43.1 * php7-json-7.4.33-150400.4.43.1 * php7-xsl-7.4.33-150400.4.43.1 * php7-7.4.33-150400.4.43.1 * php7-pcntl-7.4.33-150400.4.43.1 * php7-openssl-7.4.33-150400.4.43.1 * php7-fpm-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-debuginfo-7.4.33-150400.4.43.1 * php7-zlib-7.4.33-150400.4.43.1 * php7-gettext-debuginfo-7.4.33-150400.4.43.1 * php7-embed-debuginfo-7.4.33-150400.4.43.1 * php7-phar-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-7.4.33-150400.4.43.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.43.1 * php7-soap-7.4.33-150400.4.43.1 * php7-fpm-debugsource-7.4.33-150400.4.43.1 * php7-openssl-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-debuginfo-7.4.33-150400.4.43.1 * php7-pcntl-debuginfo-7.4.33-150400.4.43.1 * php7-gd-7.4.33-150400.4.43.1 * php7-ldap-7.4.33-150400.4.43.1 * php7-dom-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-debuginfo-7.4.33-150400.4.43.1 * php7-mysql-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-7.4.33-150400.4.43.1 * php7-zip-debuginfo-7.4.33-150400.4.43.1 * php7-opcache-7.4.33-150400.4.43.1 * php7-soap-debuginfo-7.4.33-150400.4.43.1 * php7-ldap-debuginfo-7.4.33-150400.4.43.1 * php7-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-7.4.33-150400.4.43.1 * php7-mysql-7.4.33-150400.4.43.1 * php7-ftp-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-7.4.33-150400.4.43.1 * php7-test-7.4.33-150400.4.43.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.43.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.43.1 * php7-dba-debuginfo-7.4.33-150400.4.43.1 * php7-curl-7.4.33-150400.4.43.1 * php7-odbc-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-7.4.33-150400.4.43.1 * php7-sockets-debuginfo-7.4.33-150400.4.43.1 * php7-readline-7.4.33-150400.4.43.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.43.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-tokenizer-7.4.33-150400.4.43.1 * php7-snmp-7.4.33-150400.4.43.1 * php7-zlib-debuginfo-7.4.33-150400.4.43.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.43.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.43.1 * php7-intl-7.4.33-150400.4.43.1 * php7-enchant-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.43.1 * php7-sysvshm-7.4.33-150400.4.43.1 * php7-iconv-debuginfo-7.4.33-150400.4.43.1 * php7-sqlite-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-debuginfo-7.4.33-150400.4.43.1 * php7-readline-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-7.4.33-150400.4.43.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.43.1 * php7-zip-7.4.33-150400.4.43.1 * php7-opcache-debuginfo-7.4.33-150400.4.43.1 * php7-xmlrpc-7.4.33-150400.4.43.1 * php7-tidy-debuginfo-7.4.33-150400.4.43.1 * php7-cli-7.4.33-150400.4.43.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-7.4.33-150400.4.43.1 * php7-fileinfo-7.4.33-150400.4.43.1 * php7-ftp-7.4.33-150400.4.43.1 * php7-calendar-7.4.33-150400.4.43.1 * php7-fpm-7.4.33-150400.4.43.1 * php7-gd-debuginfo-7.4.33-150400.4.43.1 * php7-phar-7.4.33-150400.4.43.1 * php7-sqlite-7.4.33-150400.4.43.1 * php7-gettext-7.4.33-150400.4.43.1 * php7-sysvmsg-7.4.33-150400.4.43.1 * php7-curl-debuginfo-7.4.33-150400.4.43.1 * php7-dom-7.4.33-150400.4.43.1 * php7-intl-debuginfo-7.4.33-150400.4.43.1 * php7-json-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-7.4.33-150400.4.43.1 * php7-tidy-7.4.33-150400.4.43.1 * php7-sockets-7.4.33-150400.4.43.1 * php7-enchant-7.4.33-150400.4.43.1 * php7-dba-7.4.33-150400.4.43.1 * php7-ctype-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-7.4.33-150400.4.43.1 * php7-exif-7.4.33-150400.4.43.1 * php7-xsl-debuginfo-7.4.33-150400.4.43.1 * php7-posix-7.4.33-150400.4.43.1 * php7-odbc-7.4.33-150400.4.43.1 * php7-xmlwriter-7.4.33-150400.4.43.1 * php7-ctype-7.4.33-150400.4.43.1 * php7-sysvsem-7.4.33-150400.4.43.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.43.1 * php7-iconv-7.4.33-150400.4.43.1 * php7-debuginfo-7.4.33-150400.4.43.1 * php7-exif-debuginfo-7.4.33-150400.4.43.1 * php7-cli-debuginfo-7.4.33-150400.4.43.1 * php7-calendar-debuginfo-7.4.33-150400.4.43.1 * php7-posix-debuginfo-7.4.33-150400.4.43.1 * php7-snmp-debuginfo-7.4.33-150400.4.43.1 * php7-bcmath-debuginfo-7.4.33-150400.4.43.1 * apache2-mod_php7-7.4.33-150400.4.43.1 * php7-devel-7.4.33-150400.4.43.1 * php7-bcmath-7.4.33-150400.4.43.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-debuginfo-7.4.33-150400.4.43.1 * php7-json-7.4.33-150400.4.43.1 * php7-xsl-7.4.33-150400.4.43.1 * php7-7.4.33-150400.4.43.1 * php7-pcntl-7.4.33-150400.4.43.1 * php7-openssl-7.4.33-150400.4.43.1 * php7-fpm-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-debuginfo-7.4.33-150400.4.43.1 * php7-zlib-7.4.33-150400.4.43.1 * php7-gettext-debuginfo-7.4.33-150400.4.43.1 * php7-phar-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-7.4.33-150400.4.43.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.43.1 * php7-soap-7.4.33-150400.4.43.1 * php7-fpm-debugsource-7.4.33-150400.4.43.1 * php7-openssl-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-debuginfo-7.4.33-150400.4.43.1 * php7-pcntl-debuginfo-7.4.33-150400.4.43.1 * php7-gd-7.4.33-150400.4.43.1 * php7-ldap-7.4.33-150400.4.43.1 * php7-dom-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-debuginfo-7.4.33-150400.4.43.1 * php7-mysql-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-7.4.33-150400.4.43.1 * php7-zip-debuginfo-7.4.33-150400.4.43.1 * php7-opcache-7.4.33-150400.4.43.1 * php7-soap-debuginfo-7.4.33-150400.4.43.1 * php7-ldap-debuginfo-7.4.33-150400.4.43.1 * php7-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-7.4.33-150400.4.43.1 * php7-mysql-7.4.33-150400.4.43.1 * php7-ftp-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-7.4.33-150400.4.43.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.43.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.43.1 * php7-dba-debuginfo-7.4.33-150400.4.43.1 * php7-curl-7.4.33-150400.4.43.1 * php7-odbc-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-7.4.33-150400.4.43.1 * php7-sockets-debuginfo-7.4.33-150400.4.43.1 * php7-readline-7.4.33-150400.4.43.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.43.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * php7-tokenizer-7.4.33-150400.4.43.1 * php7-snmp-7.4.33-150400.4.43.1 * php7-zlib-debuginfo-7.4.33-150400.4.43.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.43.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.43.1 * php7-intl-7.4.33-150400.4.43.1 * php7-enchant-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.43.1 * php7-sysvshm-7.4.33-150400.4.43.1 * php7-iconv-debuginfo-7.4.33-150400.4.43.1 * php7-sqlite-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-debuginfo-7.4.33-150400.4.43.1 * php7-readline-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-7.4.33-150400.4.43.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.43.1 * php7-zip-7.4.33-150400.4.43.1 * php7-opcache-debuginfo-7.4.33-150400.4.43.1 * php7-xmlrpc-7.4.33-150400.4.43.1 * php7-tidy-debuginfo-7.4.33-150400.4.43.1 * php7-cli-7.4.33-150400.4.43.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-7.4.33-150400.4.43.1 * php7-fileinfo-7.4.33-150400.4.43.1 * php7-ftp-7.4.33-150400.4.43.1 * php7-calendar-7.4.33-150400.4.43.1 * php7-fpm-7.4.33-150400.4.43.1 * php7-gd-debuginfo-7.4.33-150400.4.43.1 * php7-phar-7.4.33-150400.4.43.1 * php7-sqlite-7.4.33-150400.4.43.1 * php7-gettext-7.4.33-150400.4.43.1 * php7-sysvmsg-7.4.33-150400.4.43.1 * php7-curl-debuginfo-7.4.33-150400.4.43.1 * php7-dom-7.4.33-150400.4.43.1 * php7-intl-debuginfo-7.4.33-150400.4.43.1 * php7-json-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-7.4.33-150400.4.43.1 * php7-tidy-7.4.33-150400.4.43.1 * php7-sockets-7.4.33-150400.4.43.1 * php7-enchant-7.4.33-150400.4.43.1 * php7-dba-7.4.33-150400.4.43.1 * php7-ctype-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-7.4.33-150400.4.43.1 * php7-exif-7.4.33-150400.4.43.1 * php7-xsl-debuginfo-7.4.33-150400.4.43.1 * php7-posix-7.4.33-150400.4.43.1 * php7-odbc-7.4.33-150400.4.43.1 * php7-xmlwriter-7.4.33-150400.4.43.1 * php7-ctype-7.4.33-150400.4.43.1 * php7-sysvsem-7.4.33-150400.4.43.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.43.1 * php7-iconv-7.4.33-150400.4.43.1 * php7-debuginfo-7.4.33-150400.4.43.1 * php7-exif-debuginfo-7.4.33-150400.4.43.1 * php7-cli-debuginfo-7.4.33-150400.4.43.1 * php7-calendar-debuginfo-7.4.33-150400.4.43.1 * php7-posix-debuginfo-7.4.33-150400.4.43.1 * php7-snmp-debuginfo-7.4.33-150400.4.43.1 * php7-bcmath-debuginfo-7.4.33-150400.4.43.1 * apache2-mod_php7-7.4.33-150400.4.43.1 * php7-devel-7.4.33-150400.4.43.1 * php7-bcmath-7.4.33-150400.4.43.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.43.1 * php7-gmp-debuginfo-7.4.33-150400.4.43.1 * php7-json-7.4.33-150400.4.43.1 * php7-xsl-7.4.33-150400.4.43.1 * php7-7.4.33-150400.4.43.1 * php7-pcntl-7.4.33-150400.4.43.1 * php7-openssl-7.4.33-150400.4.43.1 * php7-fpm-debuginfo-7.4.33-150400.4.43.1 * php7-pgsql-debuginfo-7.4.33-150400.4.43.1 * php7-zlib-7.4.33-150400.4.43.1 * php7-gettext-debuginfo-7.4.33-150400.4.43.1 * php7-phar-debuginfo-7.4.33-150400.4.43.1 * php7-pdo-7.4.33-150400.4.43.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.43.1 * php7-soap-7.4.33-150400.4.43.1 * php7-fpm-debugsource-7.4.33-150400.4.43.1 * php7-openssl-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-debuginfo-7.4.33-150400.4.43.1 * php7-pcntl-debuginfo-7.4.33-150400.4.43.1 * php7-gd-7.4.33-150400.4.43.1 * php7-ldap-7.4.33-150400.4.43.1 * php7-dom-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-debuginfo-7.4.33-150400.4.43.1 * php7-mysql-debuginfo-7.4.33-150400.4.43.1 * php7-shmop-debuginfo-7.4.33-150400.4.43.1 * php7-xmlreader-7.4.33-150400.4.43.1 * php7-zip-debuginfo-7.4.33-150400.4.43.1 * php7-opcache-7.4.33-150400.4.43.1 * php7-soap-debuginfo-7.4.33-150400.4.43.1 * php7-ldap-debuginfo-7.4.33-150400.4.43.1 * php7-debugsource-7.4.33-150400.4.43.1 * php7-mbstring-debuginfo-7.4.33-150400.4.43.1 * php7-sodium-7.4.33-150400.4.43.1 * php7-mysql-7.4.33-150400.4.43.1 * php7-ftp-debuginfo-7.4.33-150400.4.43.1 * php7-bz2-7.4.33-150400.4.43.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.43.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.43.1 * php7-dba-debuginfo-7.4.33-150400.4.43.1 * php7-curl-7.4.33-150400.4.43.1 * php7-odbc-debuginfo-7.4.33-150400.4.43.1 * php7-fastcgi-7.4.33-150400.4.43.1 * php7-sockets-debuginfo-7.4.33-150400.4.43.1 * php7-readline-7.4.33-150400.4.43.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.43.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-embed-7.4.33-150400.4.43.1 * php7-embed-debuginfo-7.4.33-150400.4.43.1 * php7-embed-debugsource-7.4.33-150400.4.43.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * php7-embed-7.4.33-150400.4.43.1 * php7-embed-debuginfo-7.4.33-150400.4.43.1 * php7-embed-debugsource-7.4.33-150400.4.43.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11233.html * https://www.suse.com/security/cve/CVE-2024-11234.html * https://www.suse.com/security/cve/CVE-2024-8929.html * https://bugzilla.suse.com/show_bug.cgi?id=1233651 * https://bugzilla.suse.com/show_bug.cgi?id=1233702 * https://bugzilla.suse.com/show_bug.cgi?id=1233703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 12:30:35 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 12:30:35 -0000 Subject: SUSE-SU-2024:4145-1: moderate: Security update for wget Message-ID: <173322903506.12776.12120904728503017333@smelt2.prg2.suse.org> # Security update for wget Announcement ID: SUSE-SU-2024:4145-1 Release Date: 2024-12-03T09:07:38Z Rating: moderate References: * bsc#1233773 Cross-References: * CVE-2024-10524 CVSS scores: * CVE-2024-10524 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-10524 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N * CVE-2024-10524 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for wget fixes the following issues: * CVE-2024-10524: Fixed SSRF via shorthand HTTP URL (bsc#1233773) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4145=1 openSUSE-SLE-15.6-2024-4145=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4145=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wget-debuginfo-1.20.3-150600.19.9.1 * wget-1.20.3-150600.19.9.1 * wget-debugsource-1.20.3-150600.19.9.1 * openSUSE Leap 15.6 (noarch) * wget-lang-1.20.3-150600.19.9.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * wget-debuginfo-1.20.3-150600.19.9.1 * wget-1.20.3-150600.19.9.1 * wget-debugsource-1.20.3-150600.19.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10524.html * https://bugzilla.suse.com/show_bug.cgi?id=1233773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 16:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 16:30:07 -0000 Subject: SUSE-SU-2024:4159-1: low: Security update for python3 Message-ID: <173324340753.21479.16680500394338302281@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2024:4159-1 Release Date: 2024-12-03T15:30:11Z Rating: low References: * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307) Other fixes: \- Remove -IVendor/ from python-config (bsc#1231795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4159=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python3-base-3.6.15-150000.3.167.1 * python3-core-debugsource-3.6.15-150000.3.167.1 * python3-3.6.15-150000.3.167.1 * libpython3_6m1_0-3.6.15-150000.3.167.1 * python3-base-debuginfo-3.6.15-150000.3.167.1 * python3-debuginfo-3.6.15-150000.3.167.1 * python3-debugsource-3.6.15-150000.3.167.1 * libpython3_6m1_0-debuginfo-3.6.15-150000.3.167.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 16:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 16:30:15 -0000 Subject: SUSE-SU-2024:4157-1: moderate: Security update for bpftool Message-ID: <173324341525.21479.2225135883856170082@smelt2.prg2.suse.org> # Security update for bpftool Announcement ID: SUSE-SU-2024:4157-1 Release Date: 2024-12-03T14:26:58Z Rating: moderate References: * bsc#1232258 Cross-References: * CVE-2024-49987 CVSS scores: * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for bpftool fixes the following issues: * CVE-2024-49987: Fixed undefined behavior in qsort(NULL, 0, ...) (bsc#1232258) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4157=1 openSUSE-SLE-15.6-2024-4157=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4157=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * bpftool-debugsource-6.4.0-150600.19.6.1 * bpftool-debuginfo-6.4.0-150600.19.6.1 * bpftool-6.4.0-150600.19.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bpftool-debugsource-6.4.0-150600.19.6.1 * bpftool-debuginfo-6.4.0-150600.19.6.1 * bpftool-6.4.0-150600.19.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49987.html * https://bugzilla.suse.com/show_bug.cgi?id=1232258 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 3 20:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 03 Dec 2024 20:30:07 -0000 Subject: SUSE-SU-2024:4160-1: important: Security update for the Linux Kernel RT (Live Patch 18 for SLE 15 SP5) Message-ID: <173325780703.13380.14294217633081663512@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 18 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4160-1 Release Date: 2024-12-03T16:34:18Z Rating: important References: * bsc#1225429 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_64 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4160=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4160=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_64-rt-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo-2-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource-2-150500.11.6.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_64-rt-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo-2-150500.11.6.1 * kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource-2-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 08:32:56 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 08:32:56 -0000 Subject: SUSE-SU-2024:4161-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Message-ID: <173330117641.990.9251631687113762791@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4161-1 Release Date: 2024-12-04T00:03:51Z Rating: important References: * bsc#1227471 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-47291 * CVE-2021-47598 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_167 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4161=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4161=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_167-default-4-150300.7.6.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_167-default-4-150300.7.6.1 * kernel-livepatch-SLE15-SP3_Update_46-debugsource-4-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_167-default-debuginfo-4-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_167-preempt-debuginfo-4-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_167-preempt-4-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 08:33:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 08:33:05 -0000 Subject: SUSE-SU-2024:4163-1: important: Security update for xen Message-ID: <173330118539.990.10852760666214374189@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2024:4163-1 Release Date: 2024-12-04T07:57:17Z Rating: important References: * bsc#1027519 * bsc#1230366 * bsc#1232542 * bsc#1232622 * bsc#1232624 Cross-References: * CVE-2024-45817 * CVE-2024-45818 * CVE-2024-45819 CVSS scores: * CVE-2024-45817 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45817 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45818 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-45818 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-45819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2024-45819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities and has two security fixes can now be installed. ## Description: This update for xen fixes the following issues: Security issues fixed: * CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622) * CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624) * CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366) Non-security issues fixed: * Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542) * Upstream bug fixes (bsc#1027519) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4163=1 openSUSE-SLE-15.6-2024-4163=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4163=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-4163=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64 i586) * xen-tools-domU-debuginfo-4.18.3_06-150600.3.12.1 * xen-libs-debuginfo-4.18.3_06-150600.3.12.1 * xen-libs-4.18.3_06-150600.3.12.1 * xen-debugsource-4.18.3_06-150600.3.12.1 * xen-tools-domU-4.18.3_06-150600.3.12.1 * xen-devel-4.18.3_06-150600.3.12.1 * openSUSE Leap 15.6 (x86_64) * xen-libs-32bit-debuginfo-4.18.3_06-150600.3.12.1 * xen-libs-32bit-4.18.3_06-150600.3.12.1 * openSUSE Leap 15.6 (aarch64 x86_64) * xen-4.18.3_06-150600.3.12.1 * xen-doc-html-4.18.3_06-150600.3.12.1 * xen-tools-4.18.3_06-150600.3.12.1 * xen-tools-debuginfo-4.18.3_06-150600.3.12.1 * openSUSE Leap 15.6 (noarch) * xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1 * openSUSE Leap 15.6 (aarch64_ilp32) * xen-libs-64bit-debuginfo-4.18.3_06-150600.3.12.1 * xen-libs-64bit-4.18.3_06-150600.3.12.1 * Basesystem Module 15-SP6 (x86_64) * xen-tools-domU-debuginfo-4.18.3_06-150600.3.12.1 * xen-libs-debuginfo-4.18.3_06-150600.3.12.1 * xen-libs-4.18.3_06-150600.3.12.1 * xen-debugsource-4.18.3_06-150600.3.12.1 * xen-tools-domU-4.18.3_06-150600.3.12.1 * Server Applications Module 15-SP6 (x86_64) * xen-debugsource-4.18.3_06-150600.3.12.1 * xen-tools-4.18.3_06-150600.3.12.1 * xen-4.18.3_06-150600.3.12.1 * xen-tools-debuginfo-4.18.3_06-150600.3.12.1 * xen-devel-4.18.3_06-150600.3.12.1 * Server Applications Module 15-SP6 (noarch) * xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45817.html * https://www.suse.com/security/cve/CVE-2024-45818.html * https://www.suse.com/security/cve/CVE-2024-45819.html * https://bugzilla.suse.com/show_bug.cgi?id=1027519 * https://bugzilla.suse.com/show_bug.cgi?id=1230366 * https://bugzilla.suse.com/show_bug.cgi?id=1232542 * https://bugzilla.suse.com/show_bug.cgi?id=1232622 * https://bugzilla.suse.com/show_bug.cgi?id=1232624 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 12:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 12:30:06 -0000 Subject: SUSE-SU-2024:4169-1: moderate: Security update for python36 Message-ID: <173331540643.13579.12562645993541148787@smelt2.prg2.suse.org> # Security update for python36 Announcement ID: SUSE-SU-2024:4169-1 Release Date: 2024-12-04T11:02:50Z Rating: moderate References: * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python36 fixes the following issues: * CVE-2024-11168: improper validation of IPv6 and IPvFuture addresses. (bsc#1233307) Bug fixes: * Remove -IVendor/ from python-config. (bsc#1231795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4169=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpython3_6m1_0-debuginfo-3.6.15-73.1 * python36-debuginfo-3.6.15-73.1 * libpython3_6m1_0-32bit-3.6.15-73.1 * libpython3_6m1_0-3.6.15-73.1 * python36-base-3.6.15-73.1 * libpython3_6m1_0-debuginfo-32bit-3.6.15-73.1 * python36-base-debuginfo-3.6.15-73.1 * python36-debugsource-3.6.15-73.1 * python36-3.6.15-73.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 12:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 12:30:15 -0000 Subject: SUSE-SU-2024:4167-1: important: Security update for webkit2gtk3 Message-ID: <173331541529.13579.15961053269362493258@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:4167-1 Release Date: 2024-12-04T10:32:21Z Rating: important References: * bsc#1232747 * bsc#1233631 * bsc#1233632 Cross-References: * CVE-2024-44185 * CVE-2024-44296 * CVE-2024-44308 * CVE-2024-44309 * CVE-2044-44244 CVSS scores: * CVE-2024-44185 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44185 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44296 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-44296 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-44296 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-44296 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-44308 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44309 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-44309 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-44309 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.46.3 (bsc#1232747), including fixes for: * CVE-2024-44308: Fixed arbitrary code execution by not allocating DFG register after a slow path (bsc#1233631). * CVE-2024-44309: Fixed a data isolation bypass vulnerability (bsc#1233632). * CVE-2024-44244: Processing maliciously crafted web content may lead to an unexpected process crash. * CVE-2024-44296: Processing maliciously crafted web content may prevent Content Security Policy from being enforced. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4167=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4167=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4167=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4167=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4167=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4167=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4167=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-2.46.3-150200.127.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150200.127.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150200.127.1 * typelib-1_0-WebKit2-4_0-2.46.3-150200.127.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150200.127.1 * webkit2gtk3-debugsource-2.46.3-150200.127.1 * webkit2gtk3-devel-2.46.3-150200.127.1 * libwebkit2gtk-4_0-37-2.46.3-150200.127.1 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.46.3-150200.127.1 ## References: * https://www.suse.com/security/cve/CVE-2024-44185.html * https://www.suse.com/security/cve/CVE-2024-44296.html * https://www.suse.com/security/cve/CVE-2024-44308.html * https://www.suse.com/security/cve/CVE-2024-44309.html * https://www.suse.com/security/cve/CVE-2044-44244.html * https://bugzilla.suse.com/show_bug.cgi?id=1232747 * https://bugzilla.suse.com/show_bug.cgi?id=1233631 * https://bugzilla.suse.com/show_bug.cgi?id=1233632 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 12:30:17 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 12:30:17 -0000 Subject: SUSE-SU-2024:4166-1: low: Security update for python3 Message-ID: <173331541795.13579.11700342080433525438@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2024:4166-1 Release Date: 2024-12-04T10:31:32Z Rating: low References: * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307) Other fixes: \- Remove -IVendor/ from python-config (bsc#1231795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4166=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * python3-base-debuginfo-3.4.10-25.145.1 * libpython3_4m1_0-debuginfo-3.4.10-25.145.1 * python3-base-debugsource-3.4.10-25.145.1 * python3-devel-debuginfo-3.4.10-25.145.1 * libpython3_4m1_0-3.4.10-25.145.1 * libpython3_4m1_0-32bit-3.4.10-25.145.1 * python3-3.4.10-25.145.1 * python3-tk-debuginfo-3.4.10-25.145.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.145.1 * python3-debugsource-3.4.10-25.145.1 * python3-curses-debuginfo-3.4.10-25.145.1 * python3-debuginfo-3.4.10-25.145.1 * python3-devel-3.4.10-25.145.1 * python3-base-debuginfo-32bit-3.4.10-25.145.1 * python3-base-3.4.10-25.145.1 * python3-curses-3.4.10-25.145.1 * python3-tk-3.4.10-25.145.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 12:30:23 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 12:30:23 -0000 Subject: SUSE-SU-2024:4165-1: low: Security update for python Message-ID: <173331542331.13579.14176317877789605746@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2024:4165-1 Release Date: 2024-12-04T10:31:15Z Rating: low References: * bsc#1227378 * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for python fixes the following issues: * CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307) Other fixes: \- Add ipaddress module from https://github.com/phihag/ipaddress \- Remove -IVendor/ from python-config (bsc#1231795) \- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4165=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * python-tk-2.7.18-33.38.1 * python-tk-debuginfo-2.7.18-33.38.1 * python-base-debuginfo-2.7.18-33.38.1 * python-debuginfo-2.7.18-33.38.1 * python-devel-2.7.18-33.38.1 * python-2.7.18-33.38.1 * python-gdbm-debuginfo-2.7.18-33.38.1 * python-base-32bit-2.7.18-33.38.1 * libpython2_7-1_0-debuginfo-2.7.18-33.38.1 * python-curses-2.7.18-33.38.1 * python-gdbm-2.7.18-33.38.1 * python-32bit-2.7.18-33.38.1 * libpython2_7-1_0-debuginfo-32bit-2.7.18-33.38.1 * python-base-2.7.18-33.38.1 * libpython2_7-1_0-32bit-2.7.18-33.38.1 * python-xml-2.7.18-33.38.1 * python-curses-debuginfo-2.7.18-33.38.1 * python-demo-2.7.18-33.38.1 * python-xml-debuginfo-2.7.18-33.38.1 * python-base-debuginfo-32bit-2.7.18-33.38.1 * python-debugsource-2.7.18-33.38.1 * python-idle-2.7.18-33.38.1 * python-base-debugsource-2.7.18-33.38.1 * libpython2_7-1_0-2.7.18-33.38.1 * python-debuginfo-32bit-2.7.18-33.38.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * python-doc-2.7.18-33.38.1 * python-doc-pdf-2.7.18-33.38.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1227378 * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 16:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 16:30:06 -0000 Subject: SUSE-SU-2024:4177-1: important: Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) Message-ID: <173332980634.26376.7253808987346057783@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4177-1 Release Date: 2024-12-04T15:04:27Z Rating: important References: * bsc#1225733 * bsc#1229553 Cross-References: * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_141 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4177=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4177=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_141-default-debuginfo-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-15-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_38-debugsource-15-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_141-preempt-debuginfo-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-preempt-15-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_141-default-15-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 16:30:09 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 16:30:09 -0000 Subject: SUSE-SU-2024:4170-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) Message-ID: <173332980954.26376.6163539959046478153@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4170-1 Release Date: 2024-12-04T12:34:15Z Rating: important References: * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_189 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4170=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_189-default-13-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 16:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 16:30:15 -0000 Subject: SUSE-SU-2024:4176-1: important: Security update for postgresql14 Message-ID: <173332981592.26376.2936753145739769179@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2024:4176-1 Release Date: 2024-12-04T14:54:26Z Rating: important References: * bsc#1233323 * bsc#1233325 * bsc#1233326 * bsc#1233327 Cross-References: * CVE-2024-10976 * CVE-2024-10977 * CVE-2024-10978 * CVE-2024-10979 CVSS scores: * CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10976 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10977 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10978 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-10979 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for postgresql14 fixes the following issues: * CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323). * CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325). * CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326). * CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4176=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4176=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4176=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4176=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4176=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4176=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4176=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4176=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4176=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4176=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4176=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4176=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4176=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4176=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4176=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4176=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4176=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4176=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-test-14.15-150200.5.50.1 * postgresql14-llvmjit-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-llvmjit-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-llvmjit-devel-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * openSUSE Leap 15.5 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-llvmjit-debuginfo-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-llvmjit-devel-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-llvmjit-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * Legacy Module 15-SP5 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-test-14.15-150200.5.50.1 * postgresql14-llvmjit-debuginfo-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-llvmjit-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Manager Server 4.3 (noarch) * postgresql14-docs-14.15-150200.5.50.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql14-server-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-devel-14.15-150200.5.50.1 * postgresql14-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-debuginfo-14.15-150200.5.50.1 * postgresql14-pltcl-14.15-150200.5.50.1 * postgresql14-plperl-14.15-150200.5.50.1 * postgresql14-contrib-14.15-150200.5.50.1 * postgresql14-debugsource-14.15-150200.5.50.1 * postgresql14-14.15-150200.5.50.1 * postgresql14-server-devel-debuginfo-14.15-150200.5.50.1 * postgresql14-contrib-debuginfo-14.15-150200.5.50.1 * postgresql14-plpython-14.15-150200.5.50.1 * postgresql14-plperl-debuginfo-14.15-150200.5.50.1 * postgresql14-server-14.15-150200.5.50.1 * postgresql14-devel-14.15-150200.5.50.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql14-docs-14.15-150200.5.50.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10976.html * https://www.suse.com/security/cve/CVE-2024-10977.html * https://www.suse.com/security/cve/CVE-2024-10978.html * https://www.suse.com/security/cve/CVE-2024-10979.html * https://bugzilla.suse.com/show_bug.cgi?id=1233323 * https://bugzilla.suse.com/show_bug.cgi?id=1233325 * https://bugzilla.suse.com/show_bug.cgi?id=1233326 * https://bugzilla.suse.com/show_bug.cgi?id=1233327 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 16:30:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 16:30:20 -0000 Subject: SUSE-SU-2024:4175-1: important: Security update for postgresql13 Message-ID: <173332982088.26376.4017141146031171278@smelt2.prg2.suse.org> # Security update for postgresql13 Announcement ID: SUSE-SU-2024:4175-1 Release Date: 2024-12-04T14:52:30Z Rating: important References: * bsc#1233323 * bsc#1233325 * bsc#1233326 * bsc#1233327 Cross-References: * CVE-2024-10976 * CVE-2024-10977 * CVE-2024-10978 * CVE-2024-10979 CVSS scores: * CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10976 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10977 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10978 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-10979 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Galera for Ericsson 15 SP5 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves four vulnerabilities can now be installed. ## Description: This update for postgresql13 fixes the following issues: * CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323). * CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325). * CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326). * CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4175=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4175=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4175=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4175=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4175=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4175=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4175=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4175=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4175=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4175=1 * Galera for Ericsson 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-4175=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4175=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4175=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4175=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-llvmjit-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-llvmjit-devel-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-llvmjit-debuginfo-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-13.18-150200.5.64.1 * postgresql13-test-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * openSUSE Leap 15.5 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-llvmjit-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-llvmjit-devel-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-llvmjit-debuginfo-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-13.18-150200.5.64.1 * postgresql13-test-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * openSUSE Leap 15.6 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-llvmjit-debuginfo-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-llvmjit-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-llvmjit-devel-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-llvmjit-debuginfo-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-llvmjit-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-llvmjit-devel-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-llvmjit-debuginfo-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-llvmjit-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-llvmjit-devel-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql13-docs-13.18-150200.5.64.1 * Galera for Ericsson 15 SP5 (x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * Galera for Ericsson 15 SP5 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql13-docs-13.18-150200.5.64.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql13-13.18-150200.5.64.1 * postgresql13-debuginfo-13.18-150200.5.64.1 * postgresql13-plperl-13.18-150200.5.64.1 * postgresql13-plpython-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-debuginfo-13.18-150200.5.64.1 * postgresql13-contrib-debuginfo-13.18-150200.5.64.1 * postgresql13-devel-13.18-150200.5.64.1 * postgresql13-contrib-13.18-150200.5.64.1 * postgresql13-pltcl-debuginfo-13.18-150200.5.64.1 * postgresql13-server-devel-13.18-150200.5.64.1 * postgresql13-llvmjit-debuginfo-13.18-150200.5.64.1 * postgresql13-plpython-13.18-150200.5.64.1 * postgresql13-debugsource-13.18-150200.5.64.1 * postgresql13-llvmjit-13.18-150200.5.64.1 * postgresql13-plperl-debuginfo-13.18-150200.5.64.1 * postgresql13-pltcl-13.18-150200.5.64.1 * postgresql13-llvmjit-devel-13.18-150200.5.64.1 * postgresql13-server-debuginfo-13.18-150200.5.64.1 * postgresql13-server-13.18-150200.5.64.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql13-docs-13.18-150200.5.64.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10976.html * https://www.suse.com/security/cve/CVE-2024-10977.html * https://www.suse.com/security/cve/CVE-2024-10978.html * https://www.suse.com/security/cve/CVE-2024-10979.html * https://bugzilla.suse.com/show_bug.cgi?id=1233323 * https://bugzilla.suse.com/show_bug.cgi?id=1233325 * https://bugzilla.suse.com/show_bug.cgi?id=1233326 * https://bugzilla.suse.com/show_bug.cgi?id=1233327 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 16:30:25 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 16:30:25 -0000 Subject: SUSE-SU-2024:4174-1: important: Security update for postgresql15 Message-ID: <173332982557.26376.9947805318633558233@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2024:4174-1 Release Date: 2024-12-04T14:50:52Z Rating: important References: * bsc#1233323 * bsc#1233325 * bsc#1233326 * bsc#1233327 Cross-References: * CVE-2024-10976 * CVE-2024-10977 * CVE-2024-10978 * CVE-2024-10979 CVSS scores: * CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10976 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10977 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10978 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-10979 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for postgresql15 fixes the following issues: * CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323). * CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325). * CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326). * CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4174=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4174=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-4174=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4174=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4174=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4174=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4174=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4174=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4174=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4174=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4174=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4174=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4174=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4174=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4174=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-llvmjit-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-llvmjit-debuginfo-15.10-150200.5.33.1 * postgresql15-test-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-llvmjit-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * openSUSE Leap 15.5 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * Server Applications Module 15-SP5 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Manager Server 4.3 (noarch) * postgresql15-docs-15.10-150200.5.33.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql15-devel-15.10-150200.5.33.1 * postgresql15-plpython-debuginfo-15.10-150200.5.33.1 * postgresql15-server-15.10-150200.5.33.1 * postgresql15-server-devel-15.10-150200.5.33.1 * postgresql15-plperl-15.10-150200.5.33.1 * postgresql15-contrib-debuginfo-15.10-150200.5.33.1 * postgresql15-debuginfo-15.10-150200.5.33.1 * postgresql15-15.10-150200.5.33.1 * postgresql15-plpython-15.10-150200.5.33.1 * postgresql15-server-debuginfo-15.10-150200.5.33.1 * postgresql15-plperl-debuginfo-15.10-150200.5.33.1 * postgresql15-pltcl-15.10-150200.5.33.1 * postgresql15-contrib-15.10-150200.5.33.1 * postgresql15-pltcl-debuginfo-15.10-150200.5.33.1 * postgresql15-server-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-devel-debuginfo-15.10-150200.5.33.1 * postgresql15-debugsource-15.10-150200.5.33.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql15-docs-15.10-150200.5.33.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10976.html * https://www.suse.com/security/cve/CVE-2024-10977.html * https://www.suse.com/security/cve/CVE-2024-10978.html * https://www.suse.com/security/cve/CVE-2024-10979.html * https://bugzilla.suse.com/show_bug.cgi?id=1233323 * https://bugzilla.suse.com/show_bug.cgi?id=1233325 * https://bugzilla.suse.com/show_bug.cgi?id=1233326 * https://bugzilla.suse.com/show_bug.cgi?id=1233327 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 4 16:30:35 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 04 Dec 2024 16:30:35 -0000 Subject: SUSE-SU-2024:4173-1: important: Security update for postgresql, postgresql16, postgresql17 Message-ID: <173332983524.26376.13262694497575783228@smelt2.prg2.suse.org> # Security update for postgresql, postgresql16, postgresql17 Announcement ID: SUSE-SU-2024:4173-1 Release Date: 2024-12-04T14:49:16Z Rating: important References: * bsc#1219340 * bsc#1230423 * bsc#1233323 * bsc#1233325 * bsc#1233326 * bsc#1233327 * jsc#PED-11514 Cross-References: * CVE-2024-10976 * CVE-2024-10977 * CVE-2024-10978 * CVE-2024-10979 CVSS scores: * CVE-2024-10976 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10976 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10977 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10977 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2024-10978 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10978 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-10979 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-10979 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves four vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: This update for postgresql, postgresql16, postgresql17 fixes the following issues: This update ships postgresql17 , and fixes security issues with postgresql16: * bsc#1230423: Relax the dependency of extensions on the server version from exact major.minor to greater or equal, after Tom Lane confirmed on the PostgreSQL packagers list that ABI stability is being taken care of between minor releases. * bsc#1219340: The last fix was not correct. Improve it by removing the dependency again and call fillup only if it is installed. postgresql16 was updated to 16.6: * Repair ABI break for extensions that work with struct ResultRelInfo. * Restore functionality of ALTER {ROLE|DATABASE} SET role. * Fix cases where a logical replication slot's restart_lsn could go backwards. * Avoid deleting still-needed WAL files during pg_rewind. * Fix race conditions associated with dropping shared statistics entries. * Count index scans in contrib/bloom indexes in the statistics views, such as the pg_stat_user_indexes.idx_scan counter. * Fix crash when checking to see if an index's opclass options have changed. * Avoid assertion failure caused by disconnected NFA sub-graphs in regular expression parsing. * https://www.postgresql.org/docs/release/16.6/ postgresql16 was updated to 16.5: * CVE-2024-10976, bsc#1233323: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference. * CVE-2024-10977, bsc#1233325: Make libpq discard error messages received during SSL or GSS protocol negotiation. * CVE-2024-10978, bsc#1233326: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE * CVE-2024-10979, bsc#1233327: Prevent trusted PL/Perl code from changing environment variables. * https://www.postgresql.org/about/news/p-2955/ * https://www.postgresql.org/docs/release/16.5/ * Don't build the libs and mini flavor anymore to hand over to PostgreSQL 17. * https://www.postgresql.org/about/news/p-2910/ postgresql17 is shipped in version 17.2: * CVE-2024-10976, bsc#1233323: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference. * CVE-2024-10977, bsc#1233325: Make libpq discard error messages received during SSL or GSS protocol negotiation. * CVE-2024-10978, bsc#1233326: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE * CVE-2024-10979, bsc#1233327: Prevent trusted PL/Perl code from changing environment variables. * https://www.postgresql.org/about/news/p-2955/ * https://www.postgresql.org/docs/release/17.1/ * https://www.postgresql.org/docs/release/17.2/ Upgrade to 17.2: * Repair ABI break for extensions that work with struct ResultRelInfo. * Restore functionality of ALTER {ROLE|DATABASE} SET role. * Fix cases where a logical replication slot's restart_lsn could go backwards. * Avoid deleting still-needed WAL files during pg_rewind. * Fix race conditions associated with dropping shared statistics entries. * Count index scans in contrib/bloom indexes in the statistics views, such as the pg_stat_user_indexes.idx_scan counter. * Fix crash when checking to see if an index's opclass options have changed. * Avoid assertion failure caused by disconnected NFA sub-graphs in regular expression parsing. Upgrade to 17.0: * New memory management system for VACUUM, which reduces memory consumption and can improve overall vacuuming performance. * New SQL/JSON capabilities, including constructors, identity functions, and the JSON_TABLE() function, which converts JSON data into a table representation. * Various query performance improvements, including for sequential reads using streaming I/O, write throughput under high concurrency, and searches over multiple values in a btree index. * Logical replication enhancements, including: * Failover control * pg_createsubscriber, a utility that creates logical replicas from physical standbys * pg_upgrade now preserves replication slots on both publishers and subscribers * New client-side connection option, sslnegotiation=direct, that performs a direct TLS handshake to avoid a round-trip negotiation. * pg_basebackup now supports incremental backup. * COPY adds a new option, ON_ERROR ignore, that allows a copy operation to continue in the event of an error. * https://www.postgresql.org/about/news/p-2936/ * https://www.postgresql.org/docs/17/release-17.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4173=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4173=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4173=1 SUSE-2024-4173=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4173=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4173=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4173=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-4173=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4173=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4173=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4173=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4173=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4173=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4173=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4173=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4173=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4173=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4173=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4173=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4173=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4173=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4173=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4173=1 ## Package List: * openSUSE Leap 15.3 (noarch) * postgresql-17-150300.10.27.1 * postgresql-llvmjit-17-150300.10.27.1 * postgresql-contrib-17-150300.10.27.1 * postgresql-server-17-150300.10.27.1 * postgresql-llvmjit-devel-17-150300.10.27.1 * postgresql-test-17-150300.10.27.1 * postgresql-server-devel-17-150300.10.27.1 * postgresql-pltcl-17-150300.10.27.1 * postgresql-devel-17-150300.10.27.1 * postgresql-plperl-17-150300.10.27.1 * postgresql-plpython-17-150300.10.27.1 * postgresql-docs-17-150300.10.27.1 * openSUSE Leap 15.4 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-llvmjit-devel-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-llvmjit-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-test-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * openSUSE Leap 15.5 (noarch) * postgresql-devel-17-150500.10.9.1 * postgresql-llvmjit-17-150500.10.9.1 * postgresql-docs-17-150500.10.9.1 * postgresql-plperl-17-150500.10.9.1 * postgresql-plpython-17-150500.10.9.1 * postgresql-server-devel-17-150500.10.9.1 * postgresql-server-17-150500.10.9.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-llvmjit-devel-17-150500.10.9.1 * postgresql-contrib-17-150500.10.9.1 * postgresql-17-150500.10.9.1 * postgresql-test-17-150500.10.9.1 * postgresql-pltcl-17-150500.10.9.1 * postgresql17-docs-17.2-150200.5.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql17-contrib-17.2-150200.5.5.1 * postgresql17-devel-debuginfo-17.2-150200.5.5.1 * postgresql17-llvmjit-debuginfo-17.2-150200.5.5.1 * postgresql17-test-17.2-150200.5.5.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql17-llvmjit-17.2-150200.5.5.1 * postgresql16-llvmjit-debuginfo-16.6-150200.5.21.1 * postgresql16-16.6-150200.5.21.1 * postgresql17-llvmjit-devel-17.2-150200.5.5.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql17-server-devel-17.2-150200.5.5.1 * postgresql17-pltcl-debuginfo-17.2-150200.5.5.1 * postgresql16-llvmjit-16.6-150200.5.21.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql17-17.2-150200.5.5.1 * postgresql17-plperl-debuginfo-17.2-150200.5.5.1 * postgresql17-plperl-17.2-150200.5.5.1 * postgresql16-server-16.6-150200.5.21.1 * postgresql17-server-17.2-150200.5.5.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql16-test-16.6-150200.5.21.1 * postgresql17-plpython-debuginfo-17.2-150200.5.5.1 * postgresql16-llvmjit-devel-16.6-150200.5.21.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql17-devel-17.2-150200.5.5.1 * postgresql17-pltcl-17.2-150200.5.5.1 * postgresql17-server-debuginfo-17.2-150200.5.5.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql17-server-devel-debuginfo-17.2-150200.5.5.1 * postgresql17-contrib-debuginfo-17.2-150200.5.5.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql17-plpython-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * openSUSE Leap 15.5 (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * libecpg6-32bit-debuginfo-17.2-150200.5.5.1 * libecpg6-32bit-17.2-150200.5.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql17-17.2-150200.5.5.1 * libpq5-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-debugsource-16.6-150200.5.21.1 * Basesystem Module 15-SP5 (noarch) * postgresql-17-150500.10.9.1 * Basesystem Module 15-SP5 (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * Legacy Module 15-SP5 (noarch) * postgresql-llvmjit-17-150500.10.9.1 * postgresql-llvmjit-devel-17-150500.10.9.1 * SUSE Package Hub 15 15-SP5 (noarch) * postgresql-devel-17-150500.10.9.1 * postgresql-llvmjit-17-150500.10.9.1 * postgresql-docs-17-150500.10.9.1 * postgresql-plperl-17-150500.10.9.1 * postgresql-plpython-17-150500.10.9.1 * postgresql-server-devel-17-150500.10.9.1 * postgresql-server-17-150500.10.9.1 * postgresql-llvmjit-devel-17-150500.10.9.1 * postgresql-contrib-17-150500.10.9.1 * postgresql-17-150500.10.9.1 * postgresql-test-17-150500.10.9.1 * postgresql-pltcl-17-150500.10.9.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql16-llvmjit-devel-16.6-150200.5.21.1 * postgresql17-llvmjit-debuginfo-17.2-150200.5.5.1 * postgresql17-test-17.2-150200.5.5.1 * postgresql17-llvmjit-17.2-150200.5.5.1 * postgresql16-llvmjit-debuginfo-16.6-150200.5.21.1 * postgresql17-llvmjit-devel-17.2-150200.5.5.1 * postgresql16-test-16.6-150200.5.21.1 * postgresql16-llvmjit-16.6-150200.5.21.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql17-contrib-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql17-devel-debuginfo-17.2-150200.5.5.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql17-server-devel-17.2-150200.5.5.1 * postgresql17-pltcl-debuginfo-17.2-150200.5.5.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql17-plperl-debuginfo-17.2-150200.5.5.1 * postgresql17-plperl-17.2-150200.5.5.1 * postgresql16-server-16.6-150200.5.21.1 * postgresql17-server-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql17-plpython-debuginfo-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql17-devel-17.2-150200.5.5.1 * postgresql17-pltcl-17.2-150200.5.5.1 * postgresql17-server-debuginfo-17.2-150200.5.5.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql17-server-devel-debuginfo-17.2-150200.5.5.1 * postgresql17-contrib-debuginfo-17.2-150200.5.5.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql17-plpython-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * Server Applications Module 15-SP5 (noarch) * postgresql-devel-17-150500.10.9.1 * postgresql-docs-17-150500.10.9.1 * postgresql-plperl-17-150500.10.9.1 * postgresql-plpython-17-150500.10.9.1 * postgresql-server-devel-17-150500.10.9.1 * postgresql-server-17-150500.10.9.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-contrib-17-150500.10.9.1 * postgresql-pltcl-17-150500.10.9.1 * postgresql17-docs-17.2-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * postgresql-server-17-150200.4.30.1 * postgresql-17-150200.4.30.1 * postgresql-contrib-17-150200.4.30.1 * postgresql-plpython-17-150200.4.30.1 * postgresql-devel-17-150200.4.30.1 * postgresql-plperl-17-150200.4.30.1 * postgresql-pltcl-17-150200.4.30.1 * postgresql-server-devel-17-150200.4.30.1 * postgresql-docs-17-150200.4.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libpq5-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-debugsource-16.6-150200.5.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql-17-150300.10.27.1 * postgresql-contrib-17-150300.10.27.1 * postgresql-server-17-150300.10.27.1 * postgresql-server-devel-17-150300.10.27.1 * postgresql-pltcl-17-150300.10.27.1 * postgresql-devel-17-150300.10.27.1 * postgresql-plperl-17-150300.10.27.1 * postgresql-plpython-17-150300.10.27.1 * postgresql-docs-17-150300.10.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-llvmjit-devel-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-llvmjit-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-llvmjit-devel-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-llvmjit-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-17.2-150200.5.5.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * postgresql16-16.6-150200.5.21.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * postgresql16-debugsource-16.6-150200.5.21.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * postgresql-17-150400.4.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * postgresql-server-17-150200.4.30.1 * postgresql-17-150200.4.30.1 * postgresql-contrib-17-150200.4.30.1 * postgresql-plpython-17-150200.4.30.1 * postgresql-devel-17-150200.4.30.1 * postgresql-plperl-17-150200.4.30.1 * postgresql-pltcl-17-150200.4.30.1 * postgresql-server-devel-17-150200.4.30.1 * postgresql-docs-17-150200.4.30.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libpq5-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-debugsource-16.6-150200.5.21.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * postgresql-17-150300.10.27.1 * postgresql-contrib-17-150300.10.27.1 * postgresql-server-17-150300.10.27.1 * postgresql-server-devel-17-150300.10.27.1 * postgresql-pltcl-17-150300.10.27.1 * postgresql-devel-17-150300.10.27.1 * postgresql-plperl-17-150300.10.27.1 * postgresql-plpython-17-150300.10.27.1 * postgresql-docs-17-150300.10.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-llvmjit-devel-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-llvmjit-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql-server-17-150200.4.30.1 * postgresql-17-150200.4.30.1 * postgresql-contrib-17-150200.4.30.1 * postgresql-plpython-17-150200.4.30.1 * postgresql-devel-17-150200.4.30.1 * postgresql-plperl-17-150200.4.30.1 * postgresql-pltcl-17-150200.4.30.1 * postgresql-server-devel-17-150200.4.30.1 * postgresql-docs-17-150200.4.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libpq5-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-debugsource-16.6-150200.5.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql-17-150300.10.27.1 * postgresql-contrib-17-150300.10.27.1 * postgresql-server-17-150300.10.27.1 * postgresql-server-devel-17-150300.10.27.1 * postgresql-pltcl-17-150300.10.27.1 * postgresql-devel-17-150300.10.27.1 * postgresql-plperl-17-150300.10.27.1 * postgresql-plpython-17-150300.10.27.1 * postgresql-docs-17-150300.10.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-llvmjit-devel-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-llvmjit-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * SUSE Manager Proxy 4.3 (x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * libpq5-32bit-17.2-150200.5.5.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * libpq5-32bit-17.2-150200.5.5.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libpq5-17.2-150200.5.5.1 * postgresql16-plperl-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql16-16.6-150200.5.21.1 * postgresql16-server-devel-16.6-150200.5.21.1 * postgresql16-pltcl-debuginfo-16.6-150200.5.21.1 * postgresql16-server-16.6-150200.5.21.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-server-debuginfo-16.6-150200.5.21.1 * postgresql16-contrib-16.6-150200.5.21.1 * postgresql16-server-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-debugsource-16.6-150200.5.21.1 * postgresql16-plpython-16.6-150200.5.21.1 * postgresql16-pltcl-16.6-150200.5.21.1 * postgresql16-devel-debuginfo-16.6-150200.5.21.1 * postgresql16-plperl-16.6-150200.5.21.1 * postgresql16-devel-16.6-150200.5.21.1 * postgresql16-plpython-debuginfo-16.6-150200.5.21.1 * SUSE Manager Server 4.3 (noarch) * postgresql-plperl-17-150400.4.18.1 * postgresql-plpython-17-150400.4.18.1 * postgresql-server-17-150400.4.18.1 * postgresql-contrib-17-150400.4.18.1 * postgresql17-docs-17.2-150200.5.5.1 * postgresql-server-devel-17-150400.4.18.1 * postgresql-docs-17-150400.4.18.1 * postgresql16-docs-16.6-150200.5.21.1 * postgresql-devel-17-150400.4.18.1 * postgresql-pltcl-17-150400.4.18.1 * postgresql-17-150400.4.18.1 * SUSE Manager Server 4.3 (s390x) * postgresql17-17.2-150200.5.5.1 * postgresql17-contrib-17.2-150200.5.5.1 * postgresql17-plperl-debuginfo-17.2-150200.5.5.1 * postgresql17-devel-debuginfo-17.2-150200.5.5.1 * postgresql17-plperl-17.2-150200.5.5.1 * postgresql17-plpython-debuginfo-17.2-150200.5.5.1 * postgresql17-server-devel-debuginfo-17.2-150200.5.5.1 * postgresql17-server-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * postgresql17-contrib-debuginfo-17.2-150200.5.5.1 * postgresql17-devel-17.2-150200.5.5.1 * postgresql17-pltcl-17.2-150200.5.5.1 * postgresql17-server-debuginfo-17.2-150200.5.5.1 * postgresql17-server-devel-17.2-150200.5.5.1 * postgresql17-plpython-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * postgresql17-pltcl-debuginfo-17.2-150200.5.5.1 * SUSE Manager Server 4.3 (x86_64) * libpq5-32bit-17.2-150200.5.5.1 * libpq5-32bit-debuginfo-17.2-150200.5.5.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libpq5-17.2-150200.5.5.1 * postgresql17-debugsource-17.2-150200.5.5.1 * libpq5-debuginfo-17.2-150200.5.5.1 * postgresql16-debuginfo-16.6-150200.5.21.1 * libecpg6-debuginfo-17.2-150200.5.5.1 * postgresql17-debuginfo-17.2-150200.5.5.1 * libecpg6-17.2-150200.5.5.1 * postgresql16-debugsource-16.6-150200.5.21.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql-17-150300.10.27.1 * postgresql-contrib-17-150300.10.27.1 * postgresql-server-17-150300.10.27.1 * postgresql-server-devel-17-150300.10.27.1 * postgresql-pltcl-17-150300.10.27.1 * postgresql-devel-17-150300.10.27.1 * postgresql-plperl-17-150300.10.27.1 * postgresql-plpython-17-150300.10.27.1 * postgresql-docs-17-150300.10.27.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10976.html * https://www.suse.com/security/cve/CVE-2024-10977.html * https://www.suse.com/security/cve/CVE-2024-10978.html * https://www.suse.com/security/cve/CVE-2024-10979.html * https://bugzilla.suse.com/show_bug.cgi?id=1219340 * https://bugzilla.suse.com/show_bug.cgi?id=1230423 * https://bugzilla.suse.com/show_bug.cgi?id=1233323 * https://bugzilla.suse.com/show_bug.cgi?id=1233325 * https://bugzilla.suse.com/show_bug.cgi?id=1233326 * https://bugzilla.suse.com/show_bug.cgi?id=1233327 * https://jira.suse.com/browse/PED-11514 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 08:30:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 08:30:22 -0000 Subject: SUSE-SU-2024:4180-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Message-ID: <173338742221.16048.15600012611585008759@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4180-1 Release Date: 2024-12-04T21:06:22Z Rating: important References: * bsc#1210619 * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2021-47598 * CVE-2023-1829 * CVE-2023-52752 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 18 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4180=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4180=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_44-debugsource-8-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_161-default-8-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-8-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-8-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_161-preempt-8-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-8-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 08:30:25 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 08:30:25 -0000 Subject: SUSE-SU-2024:4179-1: important: Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) Message-ID: <173338742547.16048.15963314825427082472@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4179-1 Release Date: 2024-12-04T21:05:57Z Rating: important References: * bsc#1225733 * bsc#1229553 Cross-References: * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_144 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4179=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4179=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_144-default-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-14-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_39-debugsource-14-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_144-preempt-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-preempt-debuginfo-14-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_144-default-14-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 12:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 12:30:07 -0000 Subject: SUSE-SU-2024:4194-1: important: Security update for python-python-multipart Message-ID: <173340180745.13380.10039756081291692184@smelt2.prg2.suse.org> # Security update for python-python-multipart Announcement ID: SUSE-SU-2024:4194-1 Release Date: 2024-12-05T11:03:12Z Rating: important References: * bsc#1234115 Cross-References: * CVE-2024-53981 CVSS scores: * CVE-2024-53981 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53981 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for python-python-multipart fixes the following issues: * CVE-2024-53981: excessive logging for certain inputs when parsing form data. (bsc#1234115) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4194=1 SUSE-2024-4194=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-python-multipart-0.0.9-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53981.html * https://bugzilla.suse.com/show_bug.cgi?id=1234115 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 12:30:11 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 12:30:11 -0000 Subject: SUSE-SU-2024:4193-1: low: Security update for python3 Message-ID: <173340181127.13380.9142943337166276222@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2024:4193-1 Release Date: 2024-12-05T11:02:58Z Rating: low References: * bsc#1231795 * bsc#1233307 Cross-References: * CVE-2024-11168 CVSS scores: * CVE-2024-11168 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X * CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-11168 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307) Other fixes: \- Remove -IVendor/ from python-config (bsc#1231795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4193=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4193=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4193=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4193=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4193=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4193=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4193=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4193=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4193=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4193=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4193=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4193=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4193=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4193=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4193=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-base-3.6.15-150300.10.78.1 * python3-dbm-3.6.15-150300.10.78.1 * python3-tk-debuginfo-3.6.15-150300.10.78.1 * python3-doc-devhelp-3.6.15-150300.10.78.1 * python3-testsuite-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * python3-tk-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-curses-3.6.15-150300.10.78.1 * python3-curses-debuginfo-3.6.15-150300.10.78.1 * python3-idle-3.6.15-150300.10.78.1 * python3-testsuite-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-debuginfo-3.6.15-150300.10.78.1 * python3-doc-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * python3-tools-3.6.15-150300.10.78.1 * python3-devel-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-devel-3.6.15-150300.10.78.1 * openSUSE Leap 15.3 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.78.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.78.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpython3_6m1_0-64bit-3.6.15-150300.10.78.1 * libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.78.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * python3-dbm-3.6.15-150300.10.78.1 * python3-tk-debuginfo-3.6.15-150300.10.78.1 * python3-doc-devhelp-3.6.15-150300.10.78.1 * python3-testsuite-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * python3-tk-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-curses-3.6.15-150300.10.78.1 * python3-curses-debuginfo-3.6.15-150300.10.78.1 * python3-idle-3.6.15-150300.10.78.1 * python3-testsuite-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-debuginfo-3.6.15-150300.10.78.1 * python3-doc-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * python3-tools-3.6.15-150300.10.78.1 * python3-devel-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-devel-3.6.15-150300.10.78.1 * openSUSE Leap 15.5 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.78.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.78.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * python3-dbm-3.6.15-150300.10.78.1 * python3-tk-debuginfo-3.6.15-150300.10.78.1 * python3-doc-devhelp-3.6.15-150300.10.78.1 * python3-testsuite-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * python3-tk-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-curses-3.6.15-150300.10.78.1 * python3-curses-debuginfo-3.6.15-150300.10.78.1 * python3-idle-3.6.15-150300.10.78.1 * python3-testsuite-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-debuginfo-3.6.15-150300.10.78.1 * python3-doc-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * python3-tools-3.6.15-150300.10.78.1 * python3-devel-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-devel-3.6.15-150300.10.78.1 * openSUSE Leap 15.6 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.78.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-curses-3.6.15-150300.10.78.1 * python3-curses-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-3.6.15-150300.10.78.1 * python3-devel-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-idle-3.6.15-150300.10.78.1 * python3-tk-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-tk-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * python3-devel-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-curses-3.6.15-150300.10.78.1 * python3-curses-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-3.6.15-150300.10.78.1 * python3-devel-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-idle-3.6.15-150300.10.78.1 * python3-tk-debuginfo-3.6.15-150300.10.78.1 * python3-dbm-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-tk-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * python3-devel-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python3-base-3.6.15-150300.10.78.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1 * python3-base-debuginfo-3.6.15-150300.10.78.1 * python3-debugsource-3.6.15-150300.10.78.1 * python3-core-debugsource-3.6.15-150300.10.78.1 * python3-debuginfo-3.6.15-150300.10.78.1 * libpython3_6m1_0-3.6.15-150300.10.78.1 * python3-3.6.15-150300.10.78.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11168.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1233307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:30:11 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:30:11 -0000 Subject: SUSE-SU-2024:4210-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) Message-ID: <173341621183.19950.16114416818369020171@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:4210-1 Release Date: 2024-12-05T15:34:15Z Rating: important References: * bsc#1225819 * bsc#1228349 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2023-52752 * CVE-2024-35949 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-43861 CVSS scores: * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_17 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4210=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4210=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-5-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_17-default-5-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-5-150600.13.6.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-5-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_17-default-5-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-5-150600.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:30:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:30:18 -0000 Subject: SUSE-SU-2024:4209-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) Message-ID: <173341621818.19950.17787992611748212619@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:4209-1 Release Date: 2024-12-05T15:34:05Z Rating: important References: * bsc#1225819 * bsc#1228349 * bsc#1228786 * bsc#1229273 * bsc#1229553 * bsc#1231419 Cross-References: * CVE-2023-52752 * CVE-2024-35949 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-42133 * CVE-2024-43861 CVSS scores: * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_14 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG (bsc#1228511). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4209=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4209=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_14-default-5-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-5-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_2-debugsource-5-150600.13.6.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_14-default-5-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-5-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_2-debugsource-5-150600.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:30:24 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:30:24 -0000 Subject: SUSE-SU-2024:4208-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) Message-ID: <173341622449.19950.6032307052500629513@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:4208-1 Release Date: 2024-12-05T15:33:56Z Rating: important References: * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1228786 * bsc#1229273 * bsc#1229553 * bsc#1231419 Cross-References: * CVE-2023-52752 * CVE-2024-35949 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-40954 * CVE-2024-42133 * CVE-2024-43861 CVSS scores: * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_7 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG (bsc#1228511). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4208=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4208=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_7-default-5-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_1-debugsource-5-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-5-150600.13.6.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_7-default-5-150600.13.6.1 * kernel-livepatch-SLE15-SP6_Update_1-debugsource-5-150600.13.6.1 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-5-150600.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-42133.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231419 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:30:40 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:30:40 -0000 Subject: SUSE-SU-2024:4207-1: important: Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) Message-ID: <173341624083.19950.5863785721250925007@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4207-1 Release Date: 2024-12-05T15:33:46Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225311 * bsc#1225312 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 20 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_65 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4207=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4207=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_65-default-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-7-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_65-default-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-7-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:30:45 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:30:45 -0000 Subject: SUSE-SU-2024:4206-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Message-ID: <173341624583.19950.11958745914307990246@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4206-1 Release Date: 2024-12-05T15:33:35Z Rating: important References: * bsc#1225429 * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_44 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4206=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4206=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-13-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-13-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:30:56 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:30:56 -0000 Subject: SUSE-SU-2024:4197-1: important: Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) Message-ID: <173341625620.19950.17956010998675025622@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4197-1 Release Date: 2024-12-05T13:33:56Z Rating: important References: * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225819 * bsc#1226325 * bsc#1228573 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2023-52752 * CVE-2024-26923 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_219 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4197=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_219-default-5-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:31:00 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:31:00 -0000 Subject: SUSE-SU-2024:4195-1: important: Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) Message-ID: <173341626012.19950.8522935794972573176@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4195-1 Release Date: 2024-12-05T12:33:42Z Rating: important References: * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_194 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4195=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_194-default-11-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:31:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:31:06 -0000 Subject: SUSE-SU-2024:4205-1: moderate: Security update for docker-stable Message-ID: <173341626681.19950.12107251556020250634@smelt2.prg2.suse.org> # Security update for docker-stable Announcement ID: SUSE-SU-2024:4205-1 Release Date: 2024-12-05T14:58:05Z Rating: moderate References: * bsc#1214855 * bsc#1221916 * bsc#1228324 * bsc#1230331 * bsc#1230333 * bsc#1231348 * jsc#PED-11185 * jsc#PED-8585 Cross-References: * CVE-2024-41110 CVSS scores: * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability, contains two features and has five security fixes can now be installed. ## Description: This update for docker-stable fixes the following issues: * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Update --add-runtime to point to correct binary path. * Further merge docker and docker-stable specfiles to minimise the differences. The main thing is that we now include both halves of the Conflicts/Provides/Obsoletes dance in both specfiles. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Allow users to disable SUSE secrets support by setting DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker. bsc#1231348 * Import specfile changes for docker-buildx as well as the changes to help reduce specfile differences between docker-stable and docker. bsc#1230331 bsc#1230333 * Backport patch for CVE-2024-41110. bsc#1228324 * Initial docker-stable release, forked from Docker 24.0.6-ce release (packaged on 2023-10-11). * Update to Docker 24.0.9-ce, which is the latest version of the 24.0.x branch. It seems likely this will be the last upstream version of the 24.0.x branch (it seems Mirantis is going to do LTS for 23.0.x, not 24.0.x). * Fix BuildKit's symlink resolution logic to correctly handle non-lexical symlinks. Backport of and . bsc#1221916 * Write volume options atomically so sudden system crashes won't result in future Docker starts failing due to empty files. Backport of . bsc#1214855 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4205=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4205=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-1.5.1 * docker-stable-debuginfo-24.0.9_ce-1.5.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-1.5.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-stable-24.0.9_ce-1.5.1 * docker-stable-debuginfo-24.0.9_ce-1.5.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-stable-bash-completion-24.0.9_ce-1.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1214855 * https://bugzilla.suse.com/show_bug.cgi?id=1221916 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://jira.suse.com/browse/PED-11185 * https://jira.suse.com/browse/PED-8585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:31:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:31:12 -0000 Subject: SUSE-SU-2024:4204-1: important: Security update for docker-stable Message-ID: <173341627258.19950.5699984494517303076@smelt2.prg2.suse.org> # Security update for docker-stable Announcement ID: SUSE-SU-2024:4204-1 Release Date: 2024-12-05T14:57:55Z Rating: important References: * bsc#1214855 * bsc#1221916 * bsc#1228324 * bsc#1230331 * bsc#1230333 * bsc#1231348 Cross-References: * CVE-2024-41110 CVSS scores: * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has five security fixes can now be installed. ## Description: This update for docker-stable fixes the following issues: * CVE-2024-41110: Fixed Authz zero length regression (bsc#1228324). Bug fixes: * Allow users to disable SUSE secrets support by setting DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker (bsc#1231348). * Import specfile changes for docker-buildx as well as the changes to help reduce specfile differences between docker-stable and docker (bsc#1230331, bsc#1230333). * Fix BuildKit's symlink resolution logic to correctly handle non-lexical symlinks (bsc#1221916). * Write volume options atomically so sudden system crashes won't result in future Docker starts failing due to empty files (bsc#1214855). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4204=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4204=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4204=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4204=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-4204=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-4204=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4204=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4204=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4204=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4204=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4204=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4204=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Enterprise Storage 7.1 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * openSUSE Leap 15.5 (noarch) * docker-stable-fish-completion-24.0.9_ce-150000.1.5.1 * docker-stable-zsh-completion-24.0.9_ce-150000.1.5.1 * docker-stable-rootless-extras-24.0.9_ce-150000.1.5.1 * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * openSUSE Leap 15.6 (noarch) * docker-stable-fish-completion-24.0.9_ce-150000.1.5.1 * docker-stable-zsh-completion-24.0.9_ce-150000.1.5.1 * docker-stable-rootless-extras-24.0.9_ce-150000.1.5.1 * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * Containers Module 15-SP5 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * Containers Module 15-SP6 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * docker-stable-debuginfo-24.0.9_ce-150000.1.5.1 * docker-stable-24.0.9_ce-150000.1.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1214855 * https://bugzilla.suse.com/show_bug.cgi?id=1221916 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:31:19 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:31:19 -0000 Subject: SUSE-SU-2024:4202-1: moderate: Security update for java-1_8_0-openjdk Message-ID: <173341627920.19950.9521954691790340962@smelt2.prg2.suse.org> # Security update for java-1_8_0-openjdk Announcement ID: SUSE-SU-2024:4202-1 Release Date: 2024-12-05T14:03:50Z Rating: moderate References: * bsc#1231702 * bsc#1231711 * bsc#1231716 * bsc#1231719 Cross-References: * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 CVSS scores: * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * Legacy Module 15-SP5 * Legacy Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openjdk fixes the following issues: Update to version jdk8u432 (icedtea-3.33.0): \- CVE-2024-21208: Fixed partial DoS in component Networking (bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed unauthorized update, insert or delete access to some of Oracle Java SE accessible data in component Hotspot (bsc#1231711,JDK-8328544) \- CVE-2024-21217: Fixed partial DoS in component Serialization (bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231719,JDK-8332644) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4202=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4202=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4202=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4202=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4202=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4202=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4202=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4202=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4202=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4202=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4202=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4202=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4202=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4202=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-src-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-accessibility-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openjdk-javadoc-1.8.0.432-150000.3.100.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-src-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-accessibility-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * openSUSE Leap 15.6 (noarch) * java-1_8_0-openjdk-javadoc-1.8.0.432-150000.3.100.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html * https://bugzilla.suse.com/show_bug.cgi?id=1231702 * https://bugzilla.suse.com/show_bug.cgi?id=1231711 * https://bugzilla.suse.com/show_bug.cgi?id=1231716 * https://bugzilla.suse.com/show_bug.cgi?id=1231719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 16:31:33 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 16:31:33 -0000 Subject: SUSE-SU-2024:4196-1: moderate: Security update for avahi Message-ID: <173341629310.19950.14263863147472976634@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2024:4196-1 Release Date: 2024-12-05T12:56:23Z Rating: moderate References: * bsc#1233420 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: Fixed Avahi Wide-Area DNS Predictable Transaction IDs (bsc#1233420) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4196=1 openSUSE-SLE-15.6-2024-4196=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4196=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4196=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4196=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libavahi-libevent1-0.8-150600.15.6.1 * libavahi-glib1-debuginfo-0.8-150600.15.6.1 * libavahi-gobject-devel-0.8-150600.15.6.1 * avahi-autoipd-debuginfo-0.8-150600.15.6.1 * avahi-compat-mDNSResponder-devel-0.8-150600.15.6.1 * libavahi-core7-0.8-150600.15.6.1 * avahi-qt5-debugsource-0.8-150600.15.6.1 * avahi-compat-howl-devel-0.8-150600.15.6.1 * libavahi-gobject0-0.8-150600.15.6.1 * avahi-0.8-150600.15.6.1 * avahi-utils-debuginfo-0.8-150600.15.6.1 * avahi-debuginfo-0.8-150600.15.6.1 * libdns_sd-debuginfo-0.8-150600.15.6.1 * libavahi-common3-0.8-150600.15.6.1 * libavahi-client3-0.8-150600.15.6.1 * python3-avahi-0.8-150600.15.6.1 * libavahi-glib1-0.8-150600.15.6.1 * libavahi-ui-gtk3-0-0.8-150600.15.6.1 * avahi-utils-gtk-0.8-150600.15.6.1 * avahi-debugsource-0.8-150600.15.6.1 * avahi-glib2-debugsource-0.8-150600.15.6.1 * libavahi-client3-debuginfo-0.8-150600.15.6.1 * avahi-autoipd-0.8-150600.15.6.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.6.1 * avahi-utils-0.8-150600.15.6.1 * libdns_sd-0.8-150600.15.6.1 * python3-avahi-gtk-0.8-150600.15.6.1 * libavahi-libevent1-debuginfo-0.8-150600.15.6.1 * libhowl0-0.8-150600.15.6.1 * libavahi-qt5-1-debuginfo-0.8-150600.15.6.1 * libavahi-qt5-devel-0.8-150600.15.6.1 * libavahi-common3-debuginfo-0.8-150600.15.6.1 * libavahi-devel-0.8-150600.15.6.1 * libavahi-qt5-1-0.8-150600.15.6.1 * avahi-utils-gtk-debuginfo-0.8-150600.15.6.1 * libavahi-gobject0-debuginfo-0.8-150600.15.6.1 * libhowl0-debuginfo-0.8-150600.15.6.1 * typelib-1_0-Avahi-0_6-0.8-150600.15.6.1 * libavahi-glib-devel-0.8-150600.15.6.1 * libavahi-core7-debuginfo-0.8-150600.15.6.1 * openSUSE Leap 15.6 (x86_64) * libavahi-glib1-32bit-0.8-150600.15.6.1 * libavahi-common3-32bit-debuginfo-0.8-150600.15.6.1 * libavahi-client3-32bit-0.8-150600.15.6.1 * avahi-32bit-debuginfo-0.8-150600.15.6.1 * libdns_sd-32bit-debuginfo-0.8-150600.15.6.1 * libavahi-client3-32bit-debuginfo-0.8-150600.15.6.1 * libavahi-common3-32bit-0.8-150600.15.6.1 * libdns_sd-32bit-0.8-150600.15.6.1 * libavahi-glib1-32bit-debuginfo-0.8-150600.15.6.1 * openSUSE Leap 15.6 (noarch) * avahi-lang-0.8-150600.15.6.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libavahi-common3-64bit-debuginfo-0.8-150600.15.6.1 * libavahi-client3-64bit-debuginfo-0.8-150600.15.6.1 * libavahi-glib1-64bit-0.8-150600.15.6.1 * avahi-64bit-debuginfo-0.8-150600.15.6.1 * libdns_sd-64bit-0.8-150600.15.6.1 * libavahi-glib1-64bit-debuginfo-0.8-150600.15.6.1 * libdns_sd-64bit-debuginfo-0.8-150600.15.6.1 * libavahi-common3-64bit-0.8-150600.15.6.1 * libavahi-client3-64bit-0.8-150600.15.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libavahi-libevent1-0.8-150600.15.6.1 * libavahi-glib1-debuginfo-0.8-150600.15.6.1 * avahi-compat-mDNSResponder-devel-0.8-150600.15.6.1 * libavahi-core7-0.8-150600.15.6.1 * avahi-compat-howl-devel-0.8-150600.15.6.1 * libavahi-gobject0-0.8-150600.15.6.1 * avahi-0.8-150600.15.6.1 * avahi-utils-debuginfo-0.8-150600.15.6.1 * avahi-debuginfo-0.8-150600.15.6.1 * libdns_sd-debuginfo-0.8-150600.15.6.1 * libavahi-common3-0.8-150600.15.6.1 * libavahi-client3-0.8-150600.15.6.1 * libavahi-glib1-0.8-150600.15.6.1 * libavahi-ui-gtk3-0-0.8-150600.15.6.1 * avahi-debugsource-0.8-150600.15.6.1 * avahi-glib2-debugsource-0.8-150600.15.6.1 * libavahi-client3-debuginfo-0.8-150600.15.6.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.6.1 * avahi-utils-0.8-150600.15.6.1 * libdns_sd-0.8-150600.15.6.1 * libavahi-libevent1-debuginfo-0.8-150600.15.6.1 * libhowl0-0.8-150600.15.6.1 * libavahi-common3-debuginfo-0.8-150600.15.6.1 * libavahi-devel-0.8-150600.15.6.1 * libavahi-gobject0-debuginfo-0.8-150600.15.6.1 * libhowl0-debuginfo-0.8-150600.15.6.1 * typelib-1_0-Avahi-0_6-0.8-150600.15.6.1 * libavahi-glib-devel-0.8-150600.15.6.1 * libavahi-core7-debuginfo-0.8-150600.15.6.1 * Basesystem Module 15-SP6 (noarch) * avahi-lang-0.8-150600.15.6.1 * Basesystem Module 15-SP6 (x86_64) * libavahi-common3-32bit-debuginfo-0.8-150600.15.6.1 * libavahi-client3-32bit-0.8-150600.15.6.1 * avahi-32bit-debuginfo-0.8-150600.15.6.1 * libavahi-client3-32bit-debuginfo-0.8-150600.15.6.1 * libavahi-common3-32bit-0.8-150600.15.6.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * avahi-utils-gtk-0.8-150600.15.6.1 * avahi-debugsource-0.8-150600.15.6.1 * avahi-glib2-debugsource-0.8-150600.15.6.1 * avahi-autoipd-0.8-150600.15.6.1 * avahi-debuginfo-0.8-150600.15.6.1 * libavahi-gobject-devel-0.8-150600.15.6.1 * avahi-autoipd-debuginfo-0.8-150600.15.6.1 * avahi-utils-gtk-debuginfo-0.8-150600.15.6.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * avahi-debuginfo-0.8-150600.15.6.1 * python3-avahi-0.8-150600.15.6.1 * avahi-debugsource-0.8-150600.15.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1233420 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 20:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 20:30:10 -0000 Subject: SUSE-SU-2024:4217-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) Message-ID: <173343061039.13579.2129567950144518356@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) Announcement ID: SUSE-SU-2024:4217-1 Release Date: 2024-12-05T18:03:45Z Rating: important References: * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_21 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4217=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4217=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_0-debugsource-7-150600.4.13.1 * kernel-livepatch-6_4_0-150600_21-default-7-150600.4.13.1 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-7-150600.4.13.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_0-debugsource-7-150600.4.13.1 * kernel-livepatch-6_4_0-150600_21-default-7-150600.4.13.1 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-7-150600.4.13.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 20:30:35 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 20:30:35 -0000 Subject: SUSE-SU-2024:4216-1: important: Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) Message-ID: <173343063516.13579.1112313422166685136@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4216-1 Release Date: 2024-12-05T17:33:37Z Rating: important References: * bsc#1221302 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 25 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_59 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2022-48662: Update for 'really move i915_gem_context.link under ref protection' (bsc#1223521) * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4216=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4216=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-9-150500.11.10.1 * kernel-livepatch-5_14_21-150500_55_59-default-9-150500.11.10.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-9-150500.11.10.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-9-150500.11.10.1 * kernel-livepatch-5_14_21-150500_55_59-default-9-150500.11.10.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-9-150500.11.10.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 20:30:58 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 20:30:58 -0000 Subject: SUSE-SU-2024:4214-1: important: Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) Message-ID: <173343065862.13579.16100924251710281731@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4214-1 Release Date: 2024-12-05T17:03:54Z Rating: important References: * bsc#1220145 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52502 * CVE-2023-52752 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 30 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_52 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2022-48662: Update for 'really move i915_gem_context.link under ref protection' (bsc#1223521) * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4214=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4214=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-9-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_11-debugsource-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-9-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-9-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_11-debugsource-9-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_52-default-9-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 20:31:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 20:31:05 -0000 Subject: SUSE-SU-2024:4215-1: moderate: Security update for php8 Message-ID: <173343066524.13579.11849165128819461048@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2024:4215-1 Release Date: 2024-12-05T17:31:56Z Rating: moderate References: * bsc#1233651 * bsc#1233702 * bsc#1233703 Cross-References: * CVE-2024-11233 * CVE-2024-11234 * CVE-2024-8929 CVSS scores: * CVE-2024-11233 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-11233 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-11233 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2024-11233 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-11234 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-11234 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-11234 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-11234 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-8929 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-8929 ( NVD ): 5.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Web and Scripting Module 15-SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for php8 fixes the following issues: * CVE-2024-11233: buffer overread when processing input with the convert.quoted-printable-decode filter. (bsc#1233702) * CVE-2024-11234: possible CRLF injection in URIs when a proxy is configured in a stream context. (bsc#1233703) * CVE-2024-8929: data exposure on MySQL clients due to heap buffer overread in mysqlnd. (bsc#1233651) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4215=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4215=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4215=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php8-mbstring-debuginfo-8.0.30-150400.4.49.1 * php8-gmp-8.0.30-150400.4.49.1 * php8-gmp-debuginfo-8.0.30-150400.4.49.1 * php8-sqlite-8.0.30-150400.4.49.1 * php8-ctype-debuginfo-8.0.30-150400.4.49.1 * php8-gettext-debuginfo-8.0.30-150400.4.49.1 * php8-iconv-debuginfo-8.0.30-150400.4.49.1 * php8-dom-8.0.30-150400.4.49.1 * php8-mysql-debuginfo-8.0.30-150400.4.49.1 * php8-intl-debuginfo-8.0.30-150400.4.49.1 * php8-zip-8.0.30-150400.4.49.1 * php8-ftp-debuginfo-8.0.30-150400.4.49.1 * php8-soap-debuginfo-8.0.30-150400.4.49.1 * php8-ctype-8.0.30-150400.4.49.1 * php8-curl-debuginfo-8.0.30-150400.4.49.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.49.1 * php8-tidy-debuginfo-8.0.30-150400.4.49.1 * php8-fpm-debuginfo-8.0.30-150400.4.49.1 * php8-mbstring-8.0.30-150400.4.49.1 * php8-snmp-8.0.30-150400.4.49.1 * php8-fpm-8.0.30-150400.4.49.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.49.1 * php8-sysvshm-8.0.30-150400.4.49.1 * php8-readline-8.0.30-150400.4.49.1 * php8-xmlreader-8.0.30-150400.4.49.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.49.1 * php8-sysvsem-8.0.30-150400.4.49.1 * php8-sodium-debuginfo-8.0.30-150400.4.49.1 * php8-exif-debuginfo-8.0.30-150400.4.49.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.49.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.49.1 * php8-xsl-8.0.30-150400.4.49.1 * php8-tidy-8.0.30-150400.4.49.1 * php8-opcache-debuginfo-8.0.30-150400.4.49.1 * php8-mysql-8.0.30-150400.4.49.1 * php8-intl-8.0.30-150400.4.49.1 * php8-odbc-8.0.30-150400.4.49.1 * php8-cli-8.0.30-150400.4.49.1 * php8-openssl-8.0.30-150400.4.49.1 * php8-embed-debugsource-8.0.30-150400.4.49.1 * php8-sockets-8.0.30-150400.4.49.1 * php8-gd-8.0.30-150400.4.49.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.49.1 * php8-odbc-debuginfo-8.0.30-150400.4.49.1 * php8-bz2-8.0.30-150400.4.49.1 * php8-pdo-debuginfo-8.0.30-150400.4.49.1 * php8-zlib-8.0.30-150400.4.49.1 * php8-opcache-8.0.30-150400.4.49.1 * php8-exif-8.0.30-150400.4.49.1 * php8-snmp-debuginfo-8.0.30-150400.4.49.1 * php8-sqlite-debuginfo-8.0.30-150400.4.49.1 * php8-8.0.30-150400.4.49.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.49.1 * php8-calendar-debuginfo-8.0.30-150400.4.49.1 * php8-bz2-debuginfo-8.0.30-150400.4.49.1 * php8-tokenizer-8.0.30-150400.4.49.1 * php8-gd-debuginfo-8.0.30-150400.4.49.1 * php8-ftp-8.0.30-150400.4.49.1 * php8-pdo-8.0.30-150400.4.49.1 * php8-embed-8.0.30-150400.4.49.1 * php8-debuginfo-8.0.30-150400.4.49.1 * php8-curl-8.0.30-150400.4.49.1 * php8-iconv-8.0.30-150400.4.49.1 * php8-phar-8.0.30-150400.4.49.1 * php8-fpm-debugsource-8.0.30-150400.4.49.1 * php8-test-8.0.30-150400.4.49.1 * php8-bcmath-8.0.30-150400.4.49.1 * php8-enchant-debuginfo-8.0.30-150400.4.49.1 * php8-ldap-debuginfo-8.0.30-150400.4.49.1 * php8-zip-debuginfo-8.0.30-150400.4.49.1 * php8-openssl-debuginfo-8.0.30-150400.4.49.1 * php8-gettext-8.0.30-150400.4.49.1 * php8-enchant-8.0.30-150400.4.49.1 * php8-debugsource-8.0.30-150400.4.49.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.49.1 * php8-dba-debuginfo-8.0.30-150400.4.49.1 * php8-readline-debuginfo-8.0.30-150400.4.49.1 * php8-xsl-debuginfo-8.0.30-150400.4.49.1 * php8-fileinfo-8.0.30-150400.4.49.1 * php8-pcntl-8.0.30-150400.4.49.1 * php8-xmlwriter-8.0.30-150400.4.49.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.49.1 * php8-sodium-8.0.30-150400.4.49.1 * php8-dom-debuginfo-8.0.30-150400.4.49.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.49.1 * php8-fastcgi-debugsource-8.0.30-150400.4.49.1 * php8-zlib-debuginfo-8.0.30-150400.4.49.1 * php8-fastcgi-8.0.30-150400.4.49.1 * php8-calendar-8.0.30-150400.4.49.1 * php8-ldap-8.0.30-150400.4.49.1 * php8-dba-8.0.30-150400.4.49.1 * php8-soap-8.0.30-150400.4.49.1 * php8-bcmath-debuginfo-8.0.30-150400.4.49.1 * php8-cli-debuginfo-8.0.30-150400.4.49.1 * php8-shmop-debuginfo-8.0.30-150400.4.49.1 * php8-devel-8.0.30-150400.4.49.1 * php8-pcntl-debuginfo-8.0.30-150400.4.49.1 * php8-posix-debuginfo-8.0.30-150400.4.49.1 * php8-sysvmsg-8.0.30-150400.4.49.1 * php8-posix-8.0.30-150400.4.49.1 * php8-pgsql-8.0.30-150400.4.49.1 * php8-pgsql-debuginfo-8.0.30-150400.4.49.1 * php8-sockets-debuginfo-8.0.30-150400.4.49.1 * php8-phar-debuginfo-8.0.30-150400.4.49.1 * php8-shmop-8.0.30-150400.4.49.1 * php8-embed-debuginfo-8.0.30-150400.4.49.1 * apache2-mod_php8-8.0.30-150400.4.49.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * php8-mbstring-debuginfo-8.0.30-150400.4.49.1 * php8-gmp-8.0.30-150400.4.49.1 * php8-gmp-debuginfo-8.0.30-150400.4.49.1 * php8-sqlite-8.0.30-150400.4.49.1 * php8-ctype-debuginfo-8.0.30-150400.4.49.1 * php8-gettext-debuginfo-8.0.30-150400.4.49.1 * php8-iconv-debuginfo-8.0.30-150400.4.49.1 * php8-dom-8.0.30-150400.4.49.1 * php8-mysql-debuginfo-8.0.30-150400.4.49.1 * php8-intl-debuginfo-8.0.30-150400.4.49.1 * php8-zip-8.0.30-150400.4.49.1 * php8-ftp-debuginfo-8.0.30-150400.4.49.1 * php8-soap-debuginfo-8.0.30-150400.4.49.1 * php8-ctype-8.0.30-150400.4.49.1 * php8-curl-debuginfo-8.0.30-150400.4.49.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.49.1 * php8-tidy-debuginfo-8.0.30-150400.4.49.1 * php8-fpm-debuginfo-8.0.30-150400.4.49.1 * php8-mbstring-8.0.30-150400.4.49.1 * php8-snmp-8.0.30-150400.4.49.1 * php8-fpm-8.0.30-150400.4.49.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.49.1 * php8-sysvshm-8.0.30-150400.4.49.1 * php8-readline-8.0.30-150400.4.49.1 * php8-xmlreader-8.0.30-150400.4.49.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.49.1 * php8-sysvsem-8.0.30-150400.4.49.1 * php8-sodium-debuginfo-8.0.30-150400.4.49.1 * php8-exif-debuginfo-8.0.30-150400.4.49.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.49.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.49.1 * php8-xsl-8.0.30-150400.4.49.1 * php8-tidy-8.0.30-150400.4.49.1 * php8-opcache-debuginfo-8.0.30-150400.4.49.1 * php8-mysql-8.0.30-150400.4.49.1 * php8-intl-8.0.30-150400.4.49.1 * php8-odbc-8.0.30-150400.4.49.1 * php8-cli-8.0.30-150400.4.49.1 * php8-openssl-8.0.30-150400.4.49.1 * php8-embed-debugsource-8.0.30-150400.4.49.1 * php8-sockets-8.0.30-150400.4.49.1 * php8-gd-8.0.30-150400.4.49.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.49.1 * php8-odbc-debuginfo-8.0.30-150400.4.49.1 * php8-bz2-8.0.30-150400.4.49.1 * php8-pdo-debuginfo-8.0.30-150400.4.49.1 * php8-zlib-8.0.30-150400.4.49.1 * php8-opcache-8.0.30-150400.4.49.1 * php8-exif-8.0.30-150400.4.49.1 * php8-snmp-debuginfo-8.0.30-150400.4.49.1 * php8-sqlite-debuginfo-8.0.30-150400.4.49.1 * php8-8.0.30-150400.4.49.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.49.1 * php8-calendar-debuginfo-8.0.30-150400.4.49.1 * php8-bz2-debuginfo-8.0.30-150400.4.49.1 * php8-tokenizer-8.0.30-150400.4.49.1 * php8-gd-debuginfo-8.0.30-150400.4.49.1 * php8-ftp-8.0.30-150400.4.49.1 * php8-pdo-8.0.30-150400.4.49.1 * php8-embed-8.0.30-150400.4.49.1 * php8-debuginfo-8.0.30-150400.4.49.1 * php8-curl-8.0.30-150400.4.49.1 * php8-iconv-8.0.30-150400.4.49.1 * php8-fpm-debugsource-8.0.30-150400.4.49.1 * php8-phar-8.0.30-150400.4.49.1 * php8-test-8.0.30-150400.4.49.1 * php8-bcmath-8.0.30-150400.4.49.1 * php8-enchant-debuginfo-8.0.30-150400.4.49.1 * php8-ldap-debuginfo-8.0.30-150400.4.49.1 * php8-zip-debuginfo-8.0.30-150400.4.49.1 * php8-openssl-debuginfo-8.0.30-150400.4.49.1 * php8-gettext-8.0.30-150400.4.49.1 * php8-enchant-8.0.30-150400.4.49.1 * php8-debugsource-8.0.30-150400.4.49.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.49.1 * php8-dba-debuginfo-8.0.30-150400.4.49.1 * php8-readline-debuginfo-8.0.30-150400.4.49.1 * php8-xsl-debuginfo-8.0.30-150400.4.49.1 * php8-fileinfo-8.0.30-150400.4.49.1 * php8-pcntl-8.0.30-150400.4.49.1 * php8-xmlwriter-8.0.30-150400.4.49.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.49.1 * php8-sodium-8.0.30-150400.4.49.1 * php8-dom-debuginfo-8.0.30-150400.4.49.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.49.1 * php8-fastcgi-debugsource-8.0.30-150400.4.49.1 * php8-zlib-debuginfo-8.0.30-150400.4.49.1 * php8-fastcgi-8.0.30-150400.4.49.1 * php8-calendar-8.0.30-150400.4.49.1 * php8-ldap-8.0.30-150400.4.49.1 * php8-dba-8.0.30-150400.4.49.1 * php8-soap-8.0.30-150400.4.49.1 * php8-bcmath-debuginfo-8.0.30-150400.4.49.1 * php8-cli-debuginfo-8.0.30-150400.4.49.1 * php8-shmop-debuginfo-8.0.30-150400.4.49.1 * php8-devel-8.0.30-150400.4.49.1 * php8-pcntl-debuginfo-8.0.30-150400.4.49.1 * php8-posix-debuginfo-8.0.30-150400.4.49.1 * php8-sysvmsg-8.0.30-150400.4.49.1 * php8-posix-8.0.30-150400.4.49.1 * php8-sockets-debuginfo-8.0.30-150400.4.49.1 * php8-pgsql-8.0.30-150400.4.49.1 * php8-pgsql-debuginfo-8.0.30-150400.4.49.1 * php8-phar-debuginfo-8.0.30-150400.4.49.1 * php8-shmop-8.0.30-150400.4.49.1 * php8-embed-debuginfo-8.0.30-150400.4.49.1 * apache2-mod_php8-8.0.30-150400.4.49.1 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * php8-mbstring-debuginfo-8.0.30-150400.4.49.1 * php8-gmp-8.0.30-150400.4.49.1 * php8-gmp-debuginfo-8.0.30-150400.4.49.1 * php8-sqlite-8.0.30-150400.4.49.1 * php8-ctype-debuginfo-8.0.30-150400.4.49.1 * php8-gettext-debuginfo-8.0.30-150400.4.49.1 * php8-iconv-debuginfo-8.0.30-150400.4.49.1 * php8-dom-8.0.30-150400.4.49.1 * php8-mysql-debuginfo-8.0.30-150400.4.49.1 * php8-intl-debuginfo-8.0.30-150400.4.49.1 * php8-zip-8.0.30-150400.4.49.1 * php8-ftp-debuginfo-8.0.30-150400.4.49.1 * php8-soap-debuginfo-8.0.30-150400.4.49.1 * php8-ctype-8.0.30-150400.4.49.1 * php8-curl-debuginfo-8.0.30-150400.4.49.1 * php8-sysvmsg-debuginfo-8.0.30-150400.4.49.1 * php8-tidy-debuginfo-8.0.30-150400.4.49.1 * php8-fpm-debuginfo-8.0.30-150400.4.49.1 * php8-mbstring-8.0.30-150400.4.49.1 * php8-snmp-8.0.30-150400.4.49.1 * php8-fpm-8.0.30-150400.4.49.1 * php8-xmlreader-debuginfo-8.0.30-150400.4.49.1 * php8-sysvshm-8.0.30-150400.4.49.1 * php8-readline-8.0.30-150400.4.49.1 * php8-xmlreader-8.0.30-150400.4.49.1 * apache2-mod_php8-debuginfo-8.0.30-150400.4.49.1 * php8-sysvsem-8.0.30-150400.4.49.1 * php8-sodium-debuginfo-8.0.30-150400.4.49.1 * php8-exif-debuginfo-8.0.30-150400.4.49.1 * php8-fileinfo-debuginfo-8.0.30-150400.4.49.1 * apache2-mod_php8-debugsource-8.0.30-150400.4.49.1 * php8-xsl-8.0.30-150400.4.49.1 * php8-tidy-8.0.30-150400.4.49.1 * php8-opcache-debuginfo-8.0.30-150400.4.49.1 * php8-mysql-8.0.30-150400.4.49.1 * php8-intl-8.0.30-150400.4.49.1 * php8-odbc-8.0.30-150400.4.49.1 * php8-cli-8.0.30-150400.4.49.1 * php8-openssl-8.0.30-150400.4.49.1 * php8-embed-debugsource-8.0.30-150400.4.49.1 * php8-sockets-8.0.30-150400.4.49.1 * php8-gd-8.0.30-150400.4.49.1 * php8-sysvshm-debuginfo-8.0.30-150400.4.49.1 * php8-odbc-debuginfo-8.0.30-150400.4.49.1 * php8-bz2-8.0.30-150400.4.49.1 * php8-pdo-debuginfo-8.0.30-150400.4.49.1 * php8-zlib-8.0.30-150400.4.49.1 * php8-opcache-8.0.30-150400.4.49.1 * php8-exif-8.0.30-150400.4.49.1 * php8-snmp-debuginfo-8.0.30-150400.4.49.1 * php8-sqlite-debuginfo-8.0.30-150400.4.49.1 * php8-8.0.30-150400.4.49.1 * php8-fastcgi-debuginfo-8.0.30-150400.4.49.1 * php8-calendar-debuginfo-8.0.30-150400.4.49.1 * php8-bz2-debuginfo-8.0.30-150400.4.49.1 * php8-tokenizer-8.0.30-150400.4.49.1 * php8-gd-debuginfo-8.0.30-150400.4.49.1 * php8-ftp-8.0.30-150400.4.49.1 * php8-pdo-8.0.30-150400.4.49.1 * php8-embed-8.0.30-150400.4.49.1 * php8-debuginfo-8.0.30-150400.4.49.1 * php8-curl-8.0.30-150400.4.49.1 * php8-iconv-8.0.30-150400.4.49.1 * php8-fpm-debugsource-8.0.30-150400.4.49.1 * php8-phar-8.0.30-150400.4.49.1 * php8-test-8.0.30-150400.4.49.1 * php8-bcmath-8.0.30-150400.4.49.1 * php8-enchant-debuginfo-8.0.30-150400.4.49.1 * php8-ldap-debuginfo-8.0.30-150400.4.49.1 * php8-zip-debuginfo-8.0.30-150400.4.49.1 * php8-openssl-debuginfo-8.0.30-150400.4.49.1 * php8-gettext-8.0.30-150400.4.49.1 * php8-enchant-8.0.30-150400.4.49.1 * php8-debugsource-8.0.30-150400.4.49.1 * php8-sysvsem-debuginfo-8.0.30-150400.4.49.1 * php8-dba-debuginfo-8.0.30-150400.4.49.1 * php8-readline-debuginfo-8.0.30-150400.4.49.1 * php8-xsl-debuginfo-8.0.30-150400.4.49.1 * php8-fileinfo-8.0.30-150400.4.49.1 * php8-pcntl-8.0.30-150400.4.49.1 * php8-xmlwriter-8.0.30-150400.4.49.1 * php8-tokenizer-debuginfo-8.0.30-150400.4.49.1 * php8-sodium-8.0.30-150400.4.49.1 * php8-dom-debuginfo-8.0.30-150400.4.49.1 * php8-xmlwriter-debuginfo-8.0.30-150400.4.49.1 * php8-fastcgi-debugsource-8.0.30-150400.4.49.1 * php8-zlib-debuginfo-8.0.30-150400.4.49.1 * php8-fastcgi-8.0.30-150400.4.49.1 * php8-calendar-8.0.30-150400.4.49.1 * php8-ldap-8.0.30-150400.4.49.1 * php8-dba-8.0.30-150400.4.49.1 * php8-soap-8.0.30-150400.4.49.1 * php8-bcmath-debuginfo-8.0.30-150400.4.49.1 * php8-cli-debuginfo-8.0.30-150400.4.49.1 * php8-shmop-debuginfo-8.0.30-150400.4.49.1 * php8-devel-8.0.30-150400.4.49.1 * php8-pcntl-debuginfo-8.0.30-150400.4.49.1 * php8-posix-debuginfo-8.0.30-150400.4.49.1 * php8-sysvmsg-8.0.30-150400.4.49.1 * php8-posix-8.0.30-150400.4.49.1 * php8-sockets-debuginfo-8.0.30-150400.4.49.1 * php8-pgsql-8.0.30-150400.4.49.1 * php8-pgsql-debuginfo-8.0.30-150400.4.49.1 * php8-phar-debuginfo-8.0.30-150400.4.49.1 * php8-shmop-8.0.30-150400.4.49.1 * php8-embed-debuginfo-8.0.30-150400.4.49.1 * apache2-mod_php8-8.0.30-150400.4.49.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11233.html * https://www.suse.com/security/cve/CVE-2024-11234.html * https://www.suse.com/security/cve/CVE-2024-8929.html * https://bugzilla.suse.com/show_bug.cgi?id=1233651 * https://bugzilla.suse.com/show_bug.cgi?id=1233702 * https://bugzilla.suse.com/show_bug.cgi?id=1233703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 5 20:31:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 05 Dec 2024 20:31:12 -0000 Subject: SUSE-SU-2024:4212-1: important: Security update for obs-scm-bridge Message-ID: <173343067293.13579.12052065008628918438@smelt2.prg2.suse.org> # Security update for obs-scm-bridge Announcement ID: SUSE-SU-2024:4212-1 Release Date: 2024-12-05T16:05:03Z Rating: important References: * bsc#1230469 Cross-References: * CVE-2024-22038 CVSS scores: * CVE-2024-22038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-22038 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H * CVE-2024-22038 ( NVD ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-22038 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for obs-scm-bridge fixes the following issues: Updated to version 0.5.4: \- CVE-2024-22038: Fixed DoS attacks, information leaks with crafted Git repositories (bnc#1230469) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4212=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4212=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4212=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4212=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4212=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4212=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4212=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4212=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4212=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4212=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4212=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4212=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4212=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4212=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4212=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4212=1 ## Package List: * openSUSE Leap 15.5 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * openSUSE Leap 15.6 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * Development Tools Module 15-SP5 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * Development Tools Module 15-SP6 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 * SUSE Enterprise Storage 7.1 (noarch) * obs-scm-bridge-0.5.4-150100.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22038.html * https://bugzilla.suse.com/show_bug.cgi?id=1230469 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 08:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 08:30:06 -0000 Subject: SUSE-SU-2024:4221-1: important: Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) Message-ID: <173347380684.31500.15164077656812533255@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4221-1 Release Date: 2024-12-05T23:40:52Z Rating: important References: * bsc#1229553 Cross-References: * CVE-2024-43861 CVSS scores: * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_225 fixes one issue. The following security issue was fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4221=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_225-default-2-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 08:30:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 08:30:13 -0000 Subject: SUSE-SU-2024:4220-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Message-ID: <173347381363.31500.8779135875534760440@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4220-1 Release Date: 2024-12-05T21:09:30Z Rating: important References: * bsc#1225429 * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_36 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4220=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4220=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-14-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-14-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 08:30:17 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 08:30:17 -0000 Subject: SUSE-SU-2024:4219-1: important: Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) Message-ID: <173347381756.31500.12645841895068786029@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4219-1 Release Date: 2024-12-05T21:09:19Z Rating: important References: * bsc#1228573 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_222 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4219=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_222-default-3-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 08:30:46 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 08:30:46 -0000 Subject: SUSE-SU-2024:4218-1: important: Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) Message-ID: <173347384655.31500.11418706644808671259@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4218-1 Release Date: 2024-12-05T20:39:59Z Rating: important References: * bsc#1219296 * bsc#1220145 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-52752 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 34 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_49 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2022-48662: Update for 'really move i915_gem_context.link under ref protection' (bsc#1223521) * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4218=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4218=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-11-150500.11.8.1 * kernel-livepatch-SLE15-SP5_Update_10-debugsource-11-150500.11.8.1 * kernel-livepatch-5_14_21-150500_55_49-default-11-150500.11.8.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-11-150500.11.8.1 * kernel-livepatch-SLE15-SP5_Update_10-debugsource-11-150500.11.8.1 * kernel-livepatch-5_14_21-150500_55_49-default-11-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:30:04 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:30:04 -0000 Subject: SUSE-SU-2024:4237-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) Message-ID: <173348820428.583.3815620670456053769@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4237-1 Release Date: 2024-12-06T10:35:22Z Rating: important References: * bsc#1229553 Cross-References: * CVE-2024-43861 CVSS scores: * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_170 fixes one issue. The following security issue was fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4237=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4237=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-2-150300.7.6.1 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-2-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-2-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_170-preempt-debuginfo-2-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_170-preempt-2-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-2-150300.7.6.1 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-2-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-2-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:30:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:30:26 -0000 Subject: SUSE-SU-2024:4236-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Message-ID: <173348822645.583.8655963317657099702@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4236-1 Release Date: 2024-12-06T10:35:07Z Rating: important References: * bsc#1223059 * bsc#1223363 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 22 vulnerabilities and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_119 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP) (bsc#1231353) * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4236=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4236=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-8-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-8-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-8-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-8-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-8-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_119-default-8-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:30:49 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:30:49 -0000 Subject: SUSE-SU-2024:4235-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Message-ID: <173348824985.583.6839437885383091953@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4235-1 Release Date: 2024-12-06T10:34:50Z Rating: important References: * bsc#1220145 * bsc#1221302 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 27 vulnerabilities and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_116 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP) (bsc#1231353) * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4235=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4235=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_116-default-9-150400.9.8.1 * kernel-livepatch-SLE15-SP4_Update_25-debugsource-9-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-9-150400.9.8.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_116-default-9-150400.9.8.1 * kernel-livepatch-SLE15-SP4_Update_25-debugsource-9-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-9-150400.9.8.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:31:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:31:18 -0000 Subject: SUSE-SU-2024:4234-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) Message-ID: <173348827871.583.8744189285673961368@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4234-1 Release Date: 2024-12-06T10:34:29Z Rating: important References: * bsc#1219296 * bsc#1220145 * bsc#1220211 * bsc#1220828 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52340 * CVE-2023-52502 * CVE-2023-52752 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26585 * CVE-2024-26610 * CVE-2024-26622 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 31 vulnerabilities and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_108 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP) (bsc#1231353) * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220211). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828). * CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4234=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4234=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_23-debugsource-11-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-11-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-11-150400.9.8.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_23-debugsource-11-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-11-150400.9.8.1 * kernel-livepatch-5_14_21-150400_24_108-default-11-150400.9.8.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1219296 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220211 * https://bugzilla.suse.com/show_bug.cgi?id=1220828 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:31:30 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:31:30 -0000 Subject: SUSE-SU-2024:4231-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP2) Message-ID: <173348829070.583.15285202574317259091@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4231-1 Release Date: 2024-12-06T10:33:53Z Rating: important References: * bsc#1223683 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227472 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-47291 * CVE-2021-47598 * CVE-2021-47600 * CVE-2023-52752 * CVE-2024-26923 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_194 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1227472). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4231=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_194-default-debuginfo-5-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_194-default-5-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_49-debugsource-5-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2021-47600.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227472 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:31:35 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:31:35 -0000 Subject: SUSE-SU-2024:4230-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Message-ID: <173348829501.583.2321470590439497641@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4230-1 Release Date: 2024-12-06T10:34:14Z Rating: important References: * bsc#1225733 * bsc#1229553 Cross-References: * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_150 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4230=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4232=1 SUSE-2024-4233=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4232=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-4233=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_43-debugsource-14-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-14-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-14-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_41-debugsource-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-default-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-14-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_40-debugsource-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-14-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_150-preempt-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-14-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_147-default-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-default-13-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:31:45 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:31:45 -0000 Subject: SUSE-SU-2024:4228-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) Message-ID: <173348830547.583.2682886662773877242@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4228-1 Release Date: 2024-12-06T10:04:04Z Rating: important References: * bsc#1223683 * bsc#1225099 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1227471 * bsc#1228349 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26923 * CVE-2024-35949 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-40909 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1228349). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4228=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4228=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_68-default-6-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-6-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-6-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_68-default-6-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-6-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-6-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-40909.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228349 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:31:50 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:31:50 -0000 Subject: SUSE-SU-2024:4227-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) Message-ID: <173348831041.583.495659025339445959@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4227-1 Release Date: 2024-12-06T10:03:53Z Rating: important References: * bsc#1225429 * bsc#1225733 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-35949 * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_39 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4227=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4227=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-14-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-14-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:32:09 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:32:09 -0000 Subject: SUSE-SU-2024:4226-1: important: Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) Message-ID: <173348832901.583.12670955055943702357@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4226-1 Release Date: 2024-12-06T10:03:42Z Rating: important References: * bsc#1210619 * bsc#1220145 * bsc#1220537 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225819 * bsc#1226325 * bsc#1228573 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-46955 * CVE-2021-47378 * CVE-2021-47383 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-52752 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 22 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_201 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4226=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_201-default-10-8.10.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 12:32:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 12:32:18 -0000 Subject: SUSE-SU-2024:4225-1: moderate: Security update for avahi Message-ID: <173348833866.583.6127631480205734039@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2024:4225-1 Release Date: 2024-12-06T09:36:11Z Rating: moderate References: * bsc#1233420 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: Fixed Avahi Wide-Area DNS Predictable Transaction IDs (bsc#1233420) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4225=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4225=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libavahi-common3-0.7-150100.3.40.1 * libavahi-core7-debuginfo-0.7-150100.3.40.1 * libavahi-client3-0.7-150100.3.40.1 * avahi-0.7-150100.3.40.1 * libavahi-core7-0.7-150100.3.40.1 * avahi-debuginfo-0.7-150100.3.40.1 * libavahi-common3-debuginfo-0.7-150100.3.40.1 * libavahi-client3-debuginfo-0.7-150100.3.40.1 * avahi-debugsource-0.7-150100.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libavahi-common3-0.7-150100.3.40.1 * libavahi-core7-debuginfo-0.7-150100.3.40.1 * libavahi-client3-0.7-150100.3.40.1 * avahi-0.7-150100.3.40.1 * libavahi-core7-0.7-150100.3.40.1 * avahi-debuginfo-0.7-150100.3.40.1 * libavahi-common3-debuginfo-0.7-150100.3.40.1 * libavahi-client3-debuginfo-0.7-150100.3.40.1 * avahi-debugsource-0.7-150100.3.40.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1233420 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:30:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:30:20 -0000 Subject: SUSE-SU-2024:4250-1: important: Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2) Message-ID: <173350262085.13380.12304992973279312762@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4250-1 Release Date: 2024-12-06T15:04:45Z Rating: important References: * bsc#1210619 * bsc#1223363 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227472 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2021-47598 * CVE-2021-47600 * CVE-2023-1829 * CVE-2023-52752 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves 19 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_191 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1227472). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4250=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_191-default-8-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_48-debugsource-8-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_191-default-debuginfo-8-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2021-47600.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227472 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:30:36 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:30:36 -0000 Subject: SUSE-SU-2024:4249-1: important: Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Message-ID: <173350263674.13380.10118182536602532457@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4249-1 Release Date: 2024-12-06T15:04:33Z Rating: important References: * bsc#1210619 * bsc#1220537 * bsc#1223363 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225819 * bsc#1226325 * bsc#1228573 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-46955 * CVE-2021-47378 * CVE-2021-47383 * CVE-2023-1829 * CVE-2023-52752 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35949 * CVE-2024-35950 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 17 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_216 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4249=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_216-default-8-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:30:41 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:30:41 -0000 Subject: SUSE-SU-2024:4248-1: important: Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP2) Message-ID: <173350264172.13380.15755422275916262437@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4248-1 Release Date: 2024-12-06T14:33:29Z Rating: important References: * bsc#1227471 * bsc#1227472 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-47291 * CVE-2021-47598 * CVE-2021-47600 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_197 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1227472). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4248=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_197-default-4-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_50-debugsource-4-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_197-default-debuginfo-4-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2021-47600.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227472 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:30:43 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:30:43 -0000 Subject: SUSE-SU-2024:4247-1: important: Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP2) Message-ID: <173350264369.13380.8692944995206847006@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4247-1 Release Date: 2024-12-06T14:04:04Z Rating: important References: * bsc#1229553 Cross-References: * CVE-2024-43861 CVSS scores: * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_200 fixes one issue. The following security issue was fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4247=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_51-debugsource-2-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_200-default-2-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_200-default-debuginfo-2-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:30:54 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:30:54 -0000 Subject: SUSE-SU-2024:4246-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) Message-ID: <173350265409.13380.13993377741929509170@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4246-1 Release Date: 2024-12-06T14:03:50Z Rating: important References: * bsc#1223683 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-47291 * CVE-2021-47598 * CVE-2023-52752 * CVE-2024-26923 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 12 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_164 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4246=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4246=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-5-150300.7.6.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-5-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-5-150300.7.6.1 * kernel-livepatch-SLE15-SP3_Update_45-debugsource-5-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_164-preempt-5-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-5-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:10 -0000 Subject: SUSE-SU-2024:4243-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) Message-ID: <173350267097.13380.5974678489361691489@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4243-1 Release Date: 2024-12-06T13:04:12Z Rating: important References: * bsc#1223363 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225311 * bsc#1225312 * bsc#1225429 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26828 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35949 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 20 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_62 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4243=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4243=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_62-default-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-7-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_62-default-7-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-7-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-7-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:32 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:32 -0000 Subject: SUSE-SU-2024:4242-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) Message-ID: <173350269293.13380.8887098862548925749@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4242-1 Release Date: 2024-12-06T13:03:59Z Rating: important References: * bsc#1210619 * bsc#1218487 * bsc#1220145 * bsc#1220537 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227472 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2021-47598 * CVE-2021-47600 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-52752 * CVE-2023-6531 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves 25 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_183 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1227472). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4242=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-10-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_183-default-10-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_46-debugsource-10-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2021-47600.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218487 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227472 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:36 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:36 -0000 Subject: SUSE-SU-2024:4241-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2) Message-ID: <173350269641.13380.6732936669683031822@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4241-1 Release Date: 2024-12-06T13:03:50Z Rating: important References: * bsc#1225733 * bsc#1229553 Cross-References: * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_175 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4241=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_44-debugsource-15-150200.2.1 * kernel-livepatch-5_3_18-150200_24_175-default-15-150200.2.1 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-15-150200.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:39 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:39 -0000 Subject: SUSE-SU-2024:4240-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) Message-ID: <173350269937.13380.12081442611709963264@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:4240-1 Release Date: 2024-12-06T12:33:47Z Rating: important References: * bsc#1225429 * bsc#1229553 Cross-References: * CVE-2021-47517 * CVE-2024-43861 CVSS scores: * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_73 fixes several issues. The following security issues were fixed: * CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225429). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4240=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4240=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_73-default-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-2-150500.11.6.1 * kernel-livepatch-SLE15-SP5_Update_17-debugsource-2-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_73-default-2-150500.11.6.1 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-2-150500.11.6.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64) * kernel-livepatch-SLE15-SP5_Update_17-debugsource-2-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225429 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:43 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:43 -0000 Subject: SUSE-SU-2024:4239-1: important: Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) Message-ID: <173350270359.13380.7020447951927524756@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4239-1 Release Date: 2024-12-06T12:33:34Z Rating: important References: * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_186 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4239=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_186-default-14-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:45 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:45 -0000 Subject: SUSE-SU-2024:4253-1: important: Security update for MozillaFirefox Message-ID: <173350270533.13380.658530014121300146@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:4253-1 Release Date: 2024-12-06T15:42:00Z Rating: important References: Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.5.1 ESR: \- Fixed: Fixed an issue that prevented some websites from loading when using SSL Inspection. (bmo#1933747) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4253=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4253=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-common-128.5.1-112.240.1 * MozillaFirefox-debuginfo-128.5.1-112.240.1 * MozillaFirefox-128.5.1-112.240.1 * MozillaFirefox-debugsource-128.5.1-112.240.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-128.5.1-112.240.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-translations-common-128.5.1-112.240.1 * MozillaFirefox-debuginfo-128.5.1-112.240.1 * MozillaFirefox-128.5.1-112.240.1 * MozillaFirefox-debugsource-128.5.1-112.240.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-128.5.1-112.240.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 16:31:51 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 16:31:51 -0000 Subject: SUSE-SU-2024:4252-1: moderate: Security update for java-1_8_0-ibm Message-ID: <173350271113.13380.5461279955594237045@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2024:4252-1 Release Date: 2024-12-06T15:40:27Z Rating: moderate References: * bsc#1225470 * bsc#1231702 * bsc#1231711 * bsc#1231716 * bsc#1231719 * bsc#1232064 Cross-References: * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 * CVE-2024-3933 CVSS scores: * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-3933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: Updated to Java 8.0 Service Refresh 8 Fix Pack 35 with Oracle October 15 2024 CPU (bsc#1232064): \- CVE-2024-21208: Fixed partial DoS in component Networking (bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed unauthorized update, insert or delete access to some of Oracle Java SE accessible data in component Hotspot (bsc#1231711,JDK-8328544) \- CVE-2024-21217: Fixed partial DoS in component Serialization (bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231719,JDK-8332644) Other issues fixed in past releases: \- CVE-2024-3933: Fixed evaluate constant byteLenNode of arrayCopyChild (bsc#1225470) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4252=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4252=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-30.129.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-30.129.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.35-30.129.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-30.129.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-30.129.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-30.129.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-30.129.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-30.129.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html * https://www.suse.com/security/cve/CVE-2024-3933.html * https://bugzilla.suse.com/show_bug.cgi?id=1225470 * https://bugzilla.suse.com/show_bug.cgi?id=1231702 * https://bugzilla.suse.com/show_bug.cgi?id=1231711 * https://bugzilla.suse.com/show_bug.cgi?id=1231716 * https://bugzilla.suse.com/show_bug.cgi?id=1231719 * https://bugzilla.suse.com/show_bug.cgi?id=1232064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 20:30:25 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 20:30:25 -0000 Subject: SUSE-SU-2024:4256-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) Message-ID: <173351702535.13380.978778748352304106@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4256-1 Release Date: 2024-12-06T19:03:50Z Rating: important References: * bsc#1210619 * bsc#1218487 * bsc#1220145 * bsc#1220537 * bsc#1221302 * bsc#1222685 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2021-47598 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-52752 * CVE-2023-6531 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 25 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218487). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4256=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4256=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_42-debugsource-10-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_153-default-10-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-10-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_153-preempt-10-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-10-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_153-default-10-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218487 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 20:30:30 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 20:30:30 -0000 Subject: SUSE-SU-2024:4255-1: important: Security update for kernel-firmware Message-ID: <173351703054.13380.14185072804195234904@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2024:4255-1 Release Date: 2024-12-06T17:10:46Z Rating: important References: * bsc#1229069 * bsc#1229272 * bsc#1230007 * bsc#1230596 * bsc#1234027 Cross-References: * CVE-2023-31315 CVSS scores: * CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has four security fixes can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update to version 20241128 (git commit ea71da6f0690): * i915: Update Xe2LPD DMC to v2.24 * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * iwlwifi: add Bz-gf FW for core89-91 release * amdgpu: update smu 13.0.10 firmware * amdgpu: update sdma 6.0.3 firmware * amdgpu: update psp 13.0.10 firmware * amdgpu: update gc 11.0.3 firmware * amdgpu: add smu 13.0.14 firmware * amdgpu: add sdma 4.4.5 firmware * amdgpu: add psp 13.0.14 firmware * amdgpu: add gc 9.4.4 firmware * amdgpu: update vcn 3.1.2 firmware * amdgpu: update psp 13.0.5 firmware * amdgpu: update psp 13.0.8 firmware * amdgpu: update vega20 firmware * amdgpu: update vega12 firmware * amdgpu: update psp 14.0.4 firmware * amdgpu: update gc 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update vcn 4.0.0 firmware * amdgpu: update smu 13.0.0 firmware * amdgpu: update psp 13.0.0 firmware * amdgpu: update gc 11.0.0 firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update psp 13.0.11 firmware * amdgpu: update gc 11.0.4 firmware * amdgpu: update vcn 4.0.2 firmware * amdgpu: update psp 13.0.4 firmware * amdgpu: update gc 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update vpe 6.1.1 firmware * amdgpu: update vcn 4.0.6 firmware * amdgpu: update psp 14.0.1 firmware * amdgpu: update gc 11.5.1 firmware * amdgpu: update vcn 4.0.5 firmware * amdgpu: update psp 14.0.0 firmware * amdgpu: update gc 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update arcturus firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update sdma 4.4.2 firmware * amdgpu: update psp 13.0.6 firmware * amdgpu: update gc 9.4.3 firmware * amdgpu: update vcn 4.0.4 firmware * amdgpu: update psp 13.0.7 firmware * amdgpu: update gc 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * Update aliases from 6.13-rc1 * Update to version 20241125 (git commit 508d770ee6f3): * ice: update ice DDP wireless_edge package to 1.3.20.0 * ice: update ice DDP comms package to 1.3.52.0 * ice: update ice DDP package to ice-1.3.41.0 * amdgpu: update DMCUB to v9.0.10.0 for DCN314 * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * Update to version 20241121 (git commit 48bb90cceb88): * linux-firmware: Update AMD cpu microcode * xe: Update GUC to v70.36.0 for BMG, LNL * i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL * Update to version 20241119 (git commit 60cdfe1831e8): * iwlwifi: add Bz-gf FW for core91-69 release * Update aliases from 6.12 * Update to version 20241113 (git commit 1727aceef4d2): * qcom: venus-5.4: add venus firmware file for qcs615 * qcom: update venus firmware file for SC7280 * QCA: Add 22 bluetooth firmware nvm files for QCA2066 * Update to version 20241112 (git commit c57a0a42468b): * mediatek MT7922: update bluetooth firmware to 20241106163512 * mediatek MT7921: update bluetooth firmware to 20241106151414 * linux-firmware: update firmware for MT7922 WiFi device * linux-firmware: update firmware for MT7921 WiFi device * qcom: Add QDU100 firmware image files. * qcom: Update aic100 firmware files * dedup-firmware.sh: fix infinite loop for --verbose * rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7 * cnm: update chips&media wave521c firmware. * mediatek MT7920: update bluetooth firmware to 20241104091246 * linux-firmware: update firmware for MT7920 WiFi device * copy-firmware.sh: Run check_whence.py only if in a git repo * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops * amdgpu: update DMCUB to v9.0.10.0 for DCN351 * rtw89: 8852a: update fw to v0.13.36.2 * rtw88: Add firmware v52.14.0 for RTL8812AU * i915: Update Xe2LPD DMC to v2.23 * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * linux-firmware: update firmware for MT7925 WiFi device * WHENCE: Add sof-tolg for mt8195 * linux-firmware: Update firmware file for Intel BlazarI core * qcom: Add link for QCS6490 GPU firmware * qcom: update gpu firmwares for qcs615 chipset * cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops * mediatek: Add sof-tolg for mt8195 * Update to version 20241029 (git commit 048795eef350): * ath11k: move WCN6750 firmware to the device-specific subdir * xe: Update LNL GSC to v104.0.0.1263 * i915: Update MTL/ARL GSC to v102.1.15.1926 * Update to version 20241028 (git commit 987607d681cb): * amdgpu: DMCUB updates for various AMDGPU ASICs * i915: Add Xe3LPD DMC * cnm: update chips&media wave521c firmware. * linux-firmware: Add firmware for Cirrus CS35L41 * linux-firmware: Update firmware file for Intel BlazarU core * Makefile: error out of 'install' if COPYOPTS is set * Update to version 20241018 (git commit 2f0464118f40): * check_whence.py: skip some validation if git ls-files fails * qcom: Add Audio firmware for X1E80100 CRD/QCPs * amdgpu: DMCUB updates forvarious AMDGPU ASICs * brcm: replace NVRAM for Jetson TX1 * rtlwifi: Update firmware for RTL8192FU to v7.3 * make: separate installation and de-duplication targets * check_whence.py: check the permissions * Remove execute bit from firmware files * configure: remove unused file * rtl_nic: add firmware rtl8125d-1 * Update to version 20241014 (git commit 99f9c7ed1f4a): * iwlwifi: add gl/Bz FW for core91-69 release * iwlwifi: update ty/So/Ma firmwares for core91-69 release * iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop * cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops * cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops * linux-firmware: update firmware for en8811h 2.5G ethernet phy * QCA: Add Bluetooth firmwares for WCN785x with UART transport * Update to version 20241011 (git commit 808cba847c70): * mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher * ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596) * ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1 * ath12k: QCN9274 hw2.0: add board-2.bin * copy-firmware.sh: rename variables in symlink hanlding * copy-firmware.sh: remove no longer reachable test -L * copy-firmware.sh: remove no longer reachable test -f * copy-firmware.sh: call ./check_whence.py before parsing the file * copy-firmware.sh: warn if the destination folder is not empty * copy-firmware.sh: add err() helper * copy-firmware.sh: fix indentation * copy-firmware.sh: reset and consistently handle destdir * Revert "copy-firmware: Support additional compressor options" * copy-firmware.sh: flesh out and fix dedup-firmware.sh * Style update yaml files * editorconfig: add initial config file * check_whence.py: annotate replacement strings as raw * check_whence.py: LC_ALL=C sort -u the filelist * check_whence.py: ban link-to-a-link * check_whence.py: use consistent naming * Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin * tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31 * Drop obsoleted --ignore-duplicates option to copy-firmware.sh * Drop the ath12k workaround again * Update to version 20241010 (git commit d4e688aa74a0): * rtlwifi: Add firmware v39.0 for RTL8192DU * Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer firmware in this package instead) * update aliases * Update to version 20241004 (git commit bbb77872a8a7): * amdgpu: DMCUB DCN35 update * brcm: Add BCM4354 NVRAM for Jetson TX1 * brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram * Update to version 20241001 (git commit 51e5af813eaf): * linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920) * linux-firmware: add firmware for MT7920 * amdgpu: update raven firmware * amdgpu: update SMU 13.0.10 firmware * amdgpu: update PSP 13.0.10 firmware * amdgpu: update GC 11.0.3 firmware * amdgpu: update VCN 3.1.2 firmware * amdgpu: update PSP 13.0.5 firmware * amdgpu: update PSP 13.0.8 firmware * amdgpu: update vega12 firmware * amdgpu: update PSP 14.0.4 firmware * amdgpu: update GC 11.5.2 firmware * amdgpu: update vega10 firmware * amdgpu: update VCN 4.0.0 firmware * amdgpu: update PSP 13.0.0 firmware * amdgpu: update GC 11.0.0 firmware * amdgpu: update picasso firmware * amdgpu: update beige goby firmware * amdgpu: update vangogh firmware * amdgpu: update dimgrey cavefish firmware * amdgpu: update navy flounder firmware * amdgpu: update green sardine firmware * amdgpu: update VCN 4.0.2 firmware * amdgpu: update PSP 13.0.4 firmware * amdgpu: update GC 11.0.1 firmware * amdgpu: update sienna cichlid firmware * amdgpu: update VCN 4.0.6 firmware * amdgpu: update PSP 14.0.1 firmware * amdgpu: update GC 11.5.1 firmware * amdgpu: update VCN 4.0.5 firmware * amdgpu: update PSP 14.0.0 firmware * amdgpu: update GC 11.5.0 firmware * amdgpu: update navi14 firmware * amdgpu: update renoir firmware * amdgpu: update navi12 firmware * amdgpu: update SMU 13.0.6 firmware * amdgpu: update SDMA 4.4.2 firmware * amdgpu: update PSP 13.0.6 firmware * amdgpu: update GC 9.4.3 firmware * amdgpu: update yellow carp firmware * amdgpu: update VCN 4.0.4 firmware * amdgpu: update PSP 13.0.7 firmware * amdgpu: update GC 11.0.2 firmware * amdgpu: update navi10 firmware * amdgpu: update aldebaran firmware * qcom: update gpu firmwares for qcm6490 chipset * mt76: mt7996: add firmware files for mt7992 chipset * mt76: mt7996: add firmware files for mt7996 chipset variants * qcom: add gpu firmwares for sa8775p chipset * rtw89: 8922a: add fw format-2 v0.35.42.1 * Pick up the fixed ath12k firmware from https://git.codelinaro.org/clo/ath- firmware/ath12k-firmware (bsc#1230596) * Update aliases from 6.11.x and 6.12-rc1 * Update to version 20240913 (git commit bcbdd1670bc3): * amdgpu: update DMCUB to v0.0.233.0 DCN351 * copy-firmware: Handle links to uncompressed files * WHENCE: Fix battmgr.jsn entry type * Temporary revert for ath12k firmware (bsc#1230596) * Update to version 20240912 (git commit 47c72fee8fe3): * amdgpu: Add VPE 6.1.3 microcode * amdgpu: add SDMA 6.1.2 microcode * amdgpu: Add support for PSP 14.0.4 * amdgpu: add GC 11.5.2 microcode * qcom: qcm6490: add ADSP and CDSP firmware * linux-firmware: Update firmware file for Intel Bluetooth Magnetor core * linux-firmware: Update firmware file for Intel BlazarU core * linux-firmware: Update firmware file for Intel Bluetooth Solar core * Update to version 20240911 (git commit 59def907425d): * rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272) * Update to version 20240910 (git commit 2a7b69a3fa30): * realtek: rt1320: Add patch firmware of MCU * i915: Update MTL DMC v2.23 * cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops * Update to version 20240903 (git commit 96af55bd3d0b): * amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007) * iwlwifi: add Bz FW for core89-58 release * rtl_nic: add firmware rtl8126a-3 * linux-firmware: update firmware for MT7921 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7921) * Update to version 20240830 (git commit d6c600d46981): * amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351 * qcom: vpu: restore compatibility with kernels before 6.6 * Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w updates for bsc#1234027) * amdgpu: DMCUB updates forvarious AMDGPU ASICs * rtw89: 8922a: add fw format-1 v0.35.41.0 * linux-firmware: update firmware for MT7925 WiFi device * linux-firmware: update firmware for mediatek bluetooth chip (MT7925) * rtl_bt: Add firmware and config files for RTL8922A * rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part * rtl_bt: de-dupe identical config.bin files * rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin * linux-firmware: Update AMD SEV firmware * linux-firmware: update firmware for MT7996 * Revert "i915: Update MTL DMC v2.22" * ath12k: WCN7850 hw2.0: update board-2.bin * ath11k: WCN6855 hw2.0: update to WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41 * ath11k: WCN6855 hw2.0: update board-2.bin * ath11k: QCA2066 hw2.1: add to WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3 * ath11k: QCA2066 hw2.1: add board-2.bin * ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1 * qcom: vpu: add video firmware for sa8775p * amdgpu: DMCUB updates for various AMDGPU ASICs * Update to version 20240809 (git commit 36db650dae03): * qcom: update path for video firmware for vpu-1/2/3.0 * QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642 * rtw89: 8852c: add fw format-1 v0.27.97.0 * rtw89: 8852bt: add firmware 0.29.91.0 * amdgpu: Update ISP FW for isp v4.1.1 * mediatek: Update mt8195 SOF firmware * amdgpu: DMCUB updates for DCN314 * xe: First GuC release v70.29.2 for BMG * xe: Add GuC v70.29.2 for LNL * i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL * i915: Update MTL DMC v2.22 * i915: update MTL GSC to v102.0.10.1878 * xe: Add BMG HuC 8.2.10 * xe: Add GSC 104.0.0.1161 for LNL * xe: Add LNL HuC 9.4.13 * i915: update DG2 HuC to v7.10.16 * amdgpu: Update ISP FW for isp v4.1.1 * QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641 * Issues already fixed in past releases: * CVE-2023-31315: Fixed improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration (bsc#1229069) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4255=1 openSUSE-SLE-15.6-2024-4255=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4255=1 ## Package List: * openSUSE Leap 15.6 (noarch) * kernel-firmware-usb-network-20241128-150600.3.9.1 * kernel-firmware-iwlwifi-20241128-150600.3.9.1 * kernel-firmware-serial-20241128-150600.3.9.1 * ucode-amd-20241128-150600.3.9.1 * kernel-firmware-liquidio-20241128-150600.3.9.1 * kernel-firmware-i915-20241128-150600.3.9.1 * kernel-firmware-network-20241128-150600.3.9.1 * kernel-firmware-atheros-20241128-150600.3.9.1 * kernel-firmware-mellanox-20241128-150600.3.9.1 * kernel-firmware-all-20241128-150600.3.9.1 * kernel-firmware-20241128-150600.3.9.1 * kernel-firmware-chelsio-20241128-150600.3.9.1 * kernel-firmware-mwifiex-20241128-150600.3.9.1 * kernel-firmware-radeon-20241128-150600.3.9.1 * kernel-firmware-media-20241128-150600.3.9.1 * kernel-firmware-sound-20241128-150600.3.9.1 * kernel-firmware-qlogic-20241128-150600.3.9.1 * kernel-firmware-realtek-20241128-150600.3.9.1 * kernel-firmware-ti-20241128-150600.3.9.1 * kernel-firmware-nvidia-20241128-150600.3.9.1 * kernel-firmware-dpaa2-20241128-150600.3.9.1 * kernel-firmware-mediatek-20241128-150600.3.9.1 * kernel-firmware-qcom-20241128-150600.3.9.1 * kernel-firmware-ath12k-20241128-150600.3.9.1 * kernel-firmware-intel-20241128-150600.3.9.1 * kernel-firmware-bnx2-20241128-150600.3.9.1 * kernel-firmware-marvell-20241128-150600.3.9.1 * kernel-firmware-prestera-20241128-150600.3.9.1 * kernel-firmware-nfp-20241128-150600.3.9.1 * kernel-firmware-ath11k-20241128-150600.3.9.1 * kernel-firmware-amdgpu-20241128-150600.3.9.1 * kernel-firmware-ueagle-20241128-150600.3.9.1 * kernel-firmware-platform-20241128-150600.3.9.1 * kernel-firmware-brcm-20241128-150600.3.9.1 * kernel-firmware-bluetooth-20241128-150600.3.9.1 * kernel-firmware-ath10k-20241128-150600.3.9.1 * Basesystem Module 15-SP6 (noarch) * kernel-firmware-usb-network-20241128-150600.3.9.1 * kernel-firmware-iwlwifi-20241128-150600.3.9.1 * kernel-firmware-serial-20241128-150600.3.9.1 * ucode-amd-20241128-150600.3.9.1 * kernel-firmware-liquidio-20241128-150600.3.9.1 * kernel-firmware-i915-20241128-150600.3.9.1 * kernel-firmware-network-20241128-150600.3.9.1 * kernel-firmware-atheros-20241128-150600.3.9.1 * kernel-firmware-mellanox-20241128-150600.3.9.1 * kernel-firmware-all-20241128-150600.3.9.1 * kernel-firmware-chelsio-20241128-150600.3.9.1 * kernel-firmware-mwifiex-20241128-150600.3.9.1 * kernel-firmware-radeon-20241128-150600.3.9.1 * kernel-firmware-media-20241128-150600.3.9.1 * kernel-firmware-sound-20241128-150600.3.9.1 * kernel-firmware-qlogic-20241128-150600.3.9.1 * kernel-firmware-realtek-20241128-150600.3.9.1 * kernel-firmware-ti-20241128-150600.3.9.1 * kernel-firmware-nvidia-20241128-150600.3.9.1 * kernel-firmware-dpaa2-20241128-150600.3.9.1 * kernel-firmware-mediatek-20241128-150600.3.9.1 * kernel-firmware-qcom-20241128-150600.3.9.1 * kernel-firmware-ath12k-20241128-150600.3.9.1 * kernel-firmware-intel-20241128-150600.3.9.1 * kernel-firmware-bnx2-20241128-150600.3.9.1 * kernel-firmware-marvell-20241128-150600.3.9.1 * kernel-firmware-prestera-20241128-150600.3.9.1 * kernel-firmware-nfp-20241128-150600.3.9.1 * kernel-firmware-ath11k-20241128-150600.3.9.1 * kernel-firmware-amdgpu-20241128-150600.3.9.1 * kernel-firmware-ueagle-20241128-150600.3.9.1 * kernel-firmware-platform-20241128-150600.3.9.1 * kernel-firmware-brcm-20241128-150600.3.9.1 * kernel-firmware-bluetooth-20241128-150600.3.9.1 * kernel-firmware-ath10k-20241128-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31315.html * https://bugzilla.suse.com/show_bug.cgi?id=1229069 * https://bugzilla.suse.com/show_bug.cgi?id=1229272 * https://bugzilla.suse.com/show_bug.cgi?id=1230007 * https://bugzilla.suse.com/show_bug.cgi?id=1230596 * https://bugzilla.suse.com/show_bug.cgi?id=1234027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 20:30:35 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 20:30:35 -0000 Subject: SUSE-SU-2024:4254-1: important: Security update for glib2 Message-ID: <173351703590.13380.2485524457849984723@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2024:4254-1 Release Date: 2024-12-06T17:03:29Z Rating: important References: * bsc#1231463 * bsc#1233282 Cross-References: * CVE-2024-52533 CVSS scores: * CVE-2024-52533 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for glib2 fixes the following issues: Security issues fixed: * CVE-2024-52533: Fix a single byte buffer overflow in set_connect_msg() (bsc#1233282). Non-security issue fixed: * Fix error when uninstalling packages (bsc#1231463). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4254=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4254=1 openSUSE-SLE-15.6-2024-4254=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libglib-2_0-0-debuginfo-2.78.6-150600.4.8.1 * libgthread-2_0-0-2.78.6-150600.4.8.1 * glib2-debugsource-2.78.6-150600.4.8.1 * libglib-2_0-0-2.78.6-150600.4.8.1 * libgobject-2_0-0-2.78.6-150600.4.8.1 * glib2-devel-2.78.6-150600.4.8.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.8.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.8.1 * glib2-devel-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-2.78.6-150600.4.8.1 * glib2-tools-2.78.6-150600.4.8.1 * glib2-tools-debuginfo-2.78.6-150600.4.8.1 * libgio-2_0-0-2.78.6-150600.4.8.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.8.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.8.1 * Basesystem Module 15-SP6 (noarch) * glib2-lang-2.78.6-150600.4.8.1 * Basesystem Module 15-SP6 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * libgio-2_0-0-32bit-2.78.6-150600.4.8.1 * libglib-2_0-0-32bit-2.78.6-150600.4.8.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.8.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.8.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * openSUSE Leap 15.6 (noarch) * gio-branding-upstream-2.78.6-150600.4.8.1 * glib2-lang-2.78.6-150600.4.8.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glib2-tests-devel-debuginfo-2.78.6-150600.4.8.1 * glib2-devel-static-2.78.6-150600.4.8.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.8.1 * glib2-debugsource-2.78.6-150600.4.8.1 * libgthread-2_0-0-2.78.6-150600.4.8.1 * glib2-doc-2.78.6-150600.4.8.1 * libglib-2_0-0-2.78.6-150600.4.8.1 * libgobject-2_0-0-2.78.6-150600.4.8.1 * glib2-devel-2.78.6-150600.4.8.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.8.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.8.1 * glib2-devel-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-2.78.6-150600.4.8.1 * glib2-tools-2.78.6-150600.4.8.1 * glib2-tools-debuginfo-2.78.6-150600.4.8.1 * libgio-2_0-0-2.78.6-150600.4.8.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.8.1 * glib2-tests-devel-2.78.6-150600.4.8.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.8.1 * openSUSE Leap 15.6 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * glib2-devel-32bit-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * libgthread-2_0-0-32bit-2.78.6-150600.4.8.1 * glib2-devel-32bit-2.78.6-150600.4.8.1 * libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * glib2-tools-32bit-2.78.6-150600.4.8.1 * libgio-2_0-0-32bit-2.78.6-150600.4.8.1 * libglib-2_0-0-32bit-2.78.6-150600.4.8.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.8.1 * glib2-tools-32bit-debuginfo-2.78.6-150600.4.8.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.8.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1 * libglib-2_0-0-64bit-2.78.6-150600.4.8.1 * libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1 * glib2-devel-64bit-debuginfo-2.78.6-150600.4.8.1 * glib2-devel-64bit-2.78.6-150600.4.8.1 * libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1 * glib2-tools-64bit-2.78.6-150600.4.8.1 * libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1 * libgmodule-2_0-0-64bit-2.78.6-150600.4.8.1 * libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1 * libgthread-2_0-0-64bit-2.78.6-150600.4.8.1 * libgobject-2_0-0-64bit-2.78.6-150600.4.8.1 * glib2-tools-64bit-debuginfo-2.78.6-150600.4.8.1 * libgio-2_0-0-64bit-2.78.6-150600.4.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52533.html * https://bugzilla.suse.com/show_bug.cgi?id=1231463 * https://bugzilla.suse.com/show_bug.cgi?id=1233282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 6 20:30:39 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 06 Dec 2024 20:30:39 -0000 Subject: SUSE-SU-2024:4079-2: important: Security update for webkit2gtk3 Message-ID: <173351703943.13380.15345265541223626319@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:4079-2 Release Date: 2024-12-06T16:38:07Z Rating: important References: * bsc#1231039 * bsc#1232747 Cross-References: * CVE-2024-44244 * CVE-2024-44296 * CVE-2024-46185 CVSS scores: * CVE-2024-44244 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44244 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44244 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-44244 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-44296 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-44296 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-44296 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-44296 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.46.3 (bsc#1232747): * CVE-2024-44244: Processing maliciously crafted web content may lead to an unexpected process crash. * CVE-2024-44296: Processing maliciously crafted web content may prevent Content Security Policy from being enforced. New references to version 2.46.0 (boo#1231039): * CVE-2024-44185: Processing maliciously crafted web content may lead to an unexpected process crash. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4079=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4079=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-4.18.2 * libjavascriptcoregtk-4_0-18-2.46.3-4.18.2 * webkit2gtk-4_0-injected-bundles-2.46.3-4.18.2 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-4.18.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-4.18.2 * typelib-1_0-WebKit2-4_0-2.46.3-4.18.2 * webkit2gtk3-debugsource-2.46.3-4.18.2 * typelib-1_0-JavaScriptCore-4_0-2.46.3-4.18.2 * libwebkit2gtk-4_0-37-debuginfo-2.46.3-4.18.2 * libwebkit2gtk-4_0-37-2.46.3-4.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libwebkit2gtk3-lang-2.46.3-4.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.46.3-4.18.2 * webkit2gtk-4_0-injected-bundles-2.46.3-4.18.2 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-4.18.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-4.18.2 * typelib-1_0-WebKit2-4_0-2.46.3-4.18.2 * webkit2gtk3-debugsource-2.46.3-4.18.2 * typelib-1_0-JavaScriptCore-4_0-2.46.3-4.18.2 * libwebkit2gtk-4_0-37-debuginfo-2.46.3-4.18.2 * libwebkit2gtk-4_0-37-2.46.3-4.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libwebkit2gtk3-lang-2.46.3-4.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-4.18.2 ## References: * https://www.suse.com/security/cve/CVE-2024-44244.html * https://www.suse.com/security/cve/CVE-2024-44296.html * https://www.suse.com/security/cve/CVE-2024-46185.html * https://bugzilla.suse.com/show_bug.cgi?id=1231039 * https://bugzilla.suse.com/show_bug.cgi?id=1232747 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 12:30:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 12:30:26 -0000 Subject: SUSE-SU-2024:4266-1: important: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) Message-ID: <173374742668.11370.11435733076544326507@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4266-1 Release Date: 2024-12-09T10:04:52Z Rating: important References: * bsc#1220145 * bsc#1220832 * bsc#1221302 * bsc#1222685 * bsc#1222882 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223521 * bsc#1223681 * bsc#1223683 * bsc#1225011 * bsc#1225012 * bsc#1225013 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225313 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1226327 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2021-47598 * CVE-2022-48651 * CVE-2022-48662 * CVE-2023-52502 * CVE-2023-52752 * CVE-2023-52846 * CVE-2023-6546 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26766 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-35817 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35863 * CVE-2024-35864 * CVE-2024-35867 * CVE-2024-35905 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 29 vulnerabilities and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_111 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1225011). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP) (bsc#1231353) * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223521). * CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222882). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220832). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1222685). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4266=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4266=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_111-default-9-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-9-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-9-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_111-default-9-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-9-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-9-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35817.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35863.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35867.html * https://www.suse.com/security/cve/CVE-2024-35905.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220832 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1222685 * https://bugzilla.suse.com/show_bug.cgi?id=1222882 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223521 * https://bugzilla.suse.com/show_bug.cgi?id=1223681 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225011 * https://bugzilla.suse.com/show_bug.cgi?id=1225012 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225313 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1226327 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 12:30:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 12:30:29 -0000 Subject: SUSE-SU-2024:4265-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) Message-ID: <173374742977.11370.5144178783000517405@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4265-1 Release Date: 2024-12-09T10:04:37Z Rating: important References: * bsc#1225733 * bsc#1229553 Cross-References: * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_100 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4265=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4265=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_100-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-14-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_100-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-14-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 12:30:47 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 12:30:47 -0000 Subject: SUSE-SU-2024:4264-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Message-ID: <173374744760.11370.17775969513179040109@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:4264-1 Release Date: 2024-12-09T10:04:26Z Rating: important References: * bsc#1210619 * bsc#1220145 * bsc#1220537 * bsc#1221302 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2021-47598 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-52752 * CVE-2024-23307 * CVE-2024-26610 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves 23 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4264=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4264=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_43-debugsource-9-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-9-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_158-default-9-150300.7.6.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_158-preempt-9-150300.7.6.1 * kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-9-150300.7.6.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_158-default-9-150300.7.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1221302 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 12:31:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 12:31:06 -0000 Subject: SUSE-SU-2024:4263-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) Message-ID: <173374746629.11370.1166605922772438305@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:4263-1 Release Date: 2024-12-09T10:04:08Z Rating: important References: * bsc#1210619 * bsc#1220145 * bsc#1220537 * bsc#1223059 * bsc#1223363 * bsc#1223514 * bsc#1223683 * bsc#1225013 * bsc#1225202 * bsc#1225211 * bsc#1225302 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1227472 * bsc#1227651 * bsc#1228573 * bsc#1229553 Cross-References: * CVE-2021-46955 * CVE-2021-47291 * CVE-2021-47378 * CVE-2021-47383 * CVE-2021-47402 * CVE-2021-47598 * CVE-2021-47600 * CVE-2022-48651 * CVE-2023-1829 * CVE-2023-52752 * CVE-2024-23307 * CVE-2024-26828 * CVE-2024-26852 * CVE-2024-26923 * CVE-2024-27398 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves 23 vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_188 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1227472). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2021-47291: ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions (bsc#1227651). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225202). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1225013). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit (bsc#1225211). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363). * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220537). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1220145). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223059). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223514). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4263=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_188-default-debuginfo-9-150200.5.6.1 * kernel-livepatch-5_3_18-150200_24_188-default-9-150200.5.6.1 * kernel-livepatch-SLE15-SP2_Update_47-debugsource-9-150200.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-46955.html * https://www.suse.com/security/cve/CVE-2021-47291.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2021-47600.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1220145 * https://bugzilla.suse.com/show_bug.cgi?id=1220537 * https://bugzilla.suse.com/show_bug.cgi?id=1223059 * https://bugzilla.suse.com/show_bug.cgi?id=1223363 * https://bugzilla.suse.com/show_bug.cgi?id=1223514 * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225013 * https://bugzilla.suse.com/show_bug.cgi?id=1225202 * https://bugzilla.suse.com/show_bug.cgi?id=1225211 * https://bugzilla.suse.com/show_bug.cgi?id=1225302 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1227472 * https://bugzilla.suse.com/show_bug.cgi?id=1227651 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 12:31:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 12:31:12 -0000 Subject: SUSE-SU-2024:4262-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) Message-ID: <173374747231.11370.4459199054924233557@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4262-1 Release Date: 2024-12-09T10:03:55Z Rating: important References: * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2021-47598 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_125 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). Non-security issues fixed: * Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP) (bsc#1231353) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4262=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4262=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-4-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_125-default-4-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-4-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-4-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_125-default-4-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-4-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 12:31:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 12:31:16 -0000 Subject: SUSE-SU-2024:4261-1: important: Security update for the Linux Kernel (Live Patch 50 for SLE 12 SP5) Message-ID: <173374747601.11370.16615786582730668531@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 50 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:4261-1 Release Date: 2024-12-09T09:33:35Z Rating: important References: * bsc#1229273 * bsc#1229553 Cross-References: * CVE-2024-35949 * CVE-2024-43861 CVSS scores: * CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_183 fixes several issues. The following security issues were fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1229273). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4261=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_183-default-15-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-35949.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229273 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 9 16:30:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 09 Dec 2024 16:30:08 -0000 Subject: SUSE-SU-2024:4268-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) Message-ID: <173376180888.11152.5316411051045746941@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4268-1 Release Date: 2024-12-09T12:33:42Z Rating: important References: * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2024-43861 CVSS scores: * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_128 fixes several issues. The following security issue was fixed: * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * Fix intermittent nfs mount failures, may be due to SUNRPC over UDP. (bsc#1231353) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4268=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4268=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_128-default-2-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-2-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-2-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_128-default-2-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-2-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 10 12:30:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 10 Dec 2024 12:30:20 -0000 Subject: SUSE-SU-2024:4275-1: important: Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) Message-ID: <173383382037.23997.9772805010919212276@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4275-1 Release Date: 2024-12-10T09:42:22Z Rating: important References: * bsc#1223683 * bsc#1225099 * bsc#1225309 * bsc#1225310 * bsc#1225311 * bsc#1225312 * bsc#1225733 * bsc#1225739 * bsc#1225819 * bsc#1226325 * bsc#1227471 * bsc#1228573 * bsc#1228786 * bsc#1229553 * bsc#1231353 Cross-References: * CVE-2021-47598 * CVE-2023-52752 * CVE-2023-52846 * CVE-2024-26923 * CVE-2024-35861 * CVE-2024-35862 * CVE-2024-35864 * CVE-2024-35950 * CVE-2024-36899 * CVE-2024-36904 * CVE-2024-36964 * CVE-2024-40954 * CVE-2024-41059 * CVE-2024-43861 CVSS scores: * CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 14 vulnerabilities and has one security fix can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_122 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1227471). * CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225819). * CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1225311). * CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1225309). * Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP) (bsc#1231353) * CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1225312). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1231353). * CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225739). * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808) * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573). * CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1226325). * CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225099). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). * CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223683). * CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1225310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4275=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4275=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-6-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-6-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-6-150400.9.6.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-6-150400.9.6.1 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-6-150400.9.6.1 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-6-150400.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47598.html * https://www.suse.com/security/cve/CVE-2023-52752.html * https://www.suse.com/security/cve/CVE-2023-52846.html * https://www.suse.com/security/cve/CVE-2024-26923.html * https://www.suse.com/security/cve/CVE-2024-35861.html * https://www.suse.com/security/cve/CVE-2024-35862.html * https://www.suse.com/security/cve/CVE-2024-35864.html * https://www.suse.com/security/cve/CVE-2024-35950.html * https://www.suse.com/security/cve/CVE-2024-36899.html * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-36964.html * https://www.suse.com/security/cve/CVE-2024-40954.html * https://www.suse.com/security/cve/CVE-2024-41059.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1223683 * https://bugzilla.suse.com/show_bug.cgi?id=1225099 * https://bugzilla.suse.com/show_bug.cgi?id=1225309 * https://bugzilla.suse.com/show_bug.cgi?id=1225310 * https://bugzilla.suse.com/show_bug.cgi?id=1225311 * https://bugzilla.suse.com/show_bug.cgi?id=1225312 * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1225739 * https://bugzilla.suse.com/show_bug.cgi?id=1225819 * https://bugzilla.suse.com/show_bug.cgi?id=1226325 * https://bugzilla.suse.com/show_bug.cgi?id=1227471 * https://bugzilla.suse.com/show_bug.cgi?id=1228573 * https://bugzilla.suse.com/show_bug.cgi?id=1228786 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 * https://bugzilla.suse.com/show_bug.cgi?id=1231353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 10 12:30:23 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 10 Dec 2024 12:30:23 -0000 Subject: SUSE-SU-2024:4276-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4) Message-ID: <173383382353.23997.8737877480825979630@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:4276-1 Release Date: 2024-12-10T11:04:08Z Rating: important References: * bsc#1225733 * bsc#1229553 Cross-References: * CVE-2024-36904 * CVE-2024-43861 CVSS scores: * CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_103 fixes several issues. The following security issues were fixed: * CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225733). * CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4273=1 SUSE-2024-4274=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4273=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-4274=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4276=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-4277=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_20-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-12-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_20-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-12-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-12-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_42-debugsource-16-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-16-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-16-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_45-debugsource-12-150200.2.1 * kernel-livepatch-5_3_18-150200_24_178-default-12-150200.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-36904.html * https://www.suse.com/security/cve/CVE-2024-43861.html * https://bugzilla.suse.com/show_bug.cgi?id=1225733 * https://bugzilla.suse.com/show_bug.cgi?id=1229553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 10 12:30:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 10 Dec 2024 12:30:29 -0000 Subject: SUSE-SU-2024:4272-1: moderate: Security update for nodejs18 Message-ID: <173383382954.23997.2900536867209861060@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:4272-1 Release Date: 2024-12-10T09:12:06Z Rating: moderate References: * bsc#1233856 Cross-References: * CVE-2024-21538 CVSS scores: * CVE-2024-21538 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for nodejs18 fixes the following issues: * CVE-2024-21538: Fixed regular expression denial of service in cross-spawn dependency (bsc#1233856) * Update to 18.20.5 * esm: mark import attributes and JSON module as stable * deps: * upgrade npm to 10.8.2 * update simdutf to 5.6.0 * update brotli to 1.1.0 * update ada to 2.8.0 * update acorn to 8.13.0 * update acorn-walk to 8.3.4 * update c-ares to 1.29.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4272=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * nodejs18-devel-18.20.5-8.30.1 * nodejs18-18.20.5-8.30.1 * npm18-18.20.5-8.30.1 * nodejs18-debugsource-18.20.5-8.30.1 * nodejs18-debuginfo-18.20.5-8.30.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * nodejs18-docs-18.20.5-8.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21538.html * https://bugzilla.suse.com/show_bug.cgi?id=1233856 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 10 20:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 10 Dec 2024 20:30:06 -0000 Subject: SUSE-SU-2024:4282-1: moderate: Security update for avahi Message-ID: <173386260604.13380.5969811708279489931@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2024:4282-1 Release Date: 2024-12-10T18:03:38Z Rating: moderate References: * bsc#1233420 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: sequential increment of DNS transaction IDs allows DNS spoofing. (bsc#1233420) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4282=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libavahi-glib1-debuginfo-0.6.32-32.30.1 * libavahi-glib1-debuginfo-32bit-0.6.32-32.30.1 * libavahi-common3-debuginfo-0.6.32-32.30.1 * libavahi-client3-debuginfo-32bit-0.6.32-32.30.1 * libdns_sd-debuginfo-32bit-0.6.32-32.30.1 * libavahi-common3-0.6.32-32.30.1 * avahi-debuginfo-32bit-0.6.32-32.30.1 * libavahi-client3-0.6.32-32.30.1 * libavahi-core7-debuginfo-0.6.32-32.30.1 * libavahi-client3-32bit-0.6.32-32.30.1 * avahi-0.6.32-32.30.1 * libavahi-glib1-32bit-0.6.32-32.30.1 * libavahi-common3-32bit-0.6.32-32.30.1 * avahi-glib2-debugsource-0.6.32-32.30.1 * libavahi-common3-debuginfo-32bit-0.6.32-32.30.1 * libdns_sd-0.6.32-32.30.1 * avahi-utils-debuginfo-0.6.32-32.30.1 * libdns_sd-debuginfo-0.6.32-32.30.1 * avahi-debugsource-0.6.32-32.30.1 * libavahi-client3-debuginfo-0.6.32-32.30.1 * avahi-utils-0.6.32-32.30.1 * libavahi-glib1-0.6.32-32.30.1 * libavahi-core7-0.6.32-32.30.1 * avahi-debuginfo-0.6.32-32.30.1 * libdns_sd-32bit-0.6.32-32.30.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * avahi-lang-0.6.32-32.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1233420 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:08 -0000 Subject: SUSE-SU-2024:4293-1: important: Security update for webkit2gtk3 Message-ID: <173392020823.13380.9709130456505453726@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:4293-1 Release Date: 2024-12-11T11:42:03Z Rating: important References: * bsc#1233631 * bsc#1233632 Cross-References: * CVE-2024-44308 * CVE-2024-44309 CVSS scores: * CVE-2024-44308 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44309 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-44309 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-44309 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2024-44308: Fixed processing maliciously crafted web content that may lead to arbitrary code execution (bsc#1233631) * CVE-2024-44309: Fixed data isolation bypass vulnerability (bsc#1233632) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4293=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4293=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-4.22.1 * libwebkit2gtk-4_0-37-2.46.3-4.22.1 * libjavascriptcoregtk-4_0-18-2.46.3-4.22.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-4.22.1 * webkit2gtk-4_0-injected-bundles-2.46.3-4.22.1 * typelib-1_0-WebKit2-4_0-2.46.3-4.22.1 * webkit2gtk3-debugsource-2.46.3-4.22.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-4.22.1 * libwebkit2gtk-4_0-37-debuginfo-2.46.3-4.22.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libwebkit2gtk3-lang-2.46.3-4.22.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-4.22.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-4.22.1 * libwebkit2gtk-4_0-37-2.46.3-4.22.1 * libjavascriptcoregtk-4_0-18-2.46.3-4.22.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-4.22.1 * webkit2gtk-4_0-injected-bundles-2.46.3-4.22.1 * typelib-1_0-WebKit2-4_0-2.46.3-4.22.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-4.22.1 * webkit2gtk3-debugsource-2.46.3-4.22.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-4.22.1 * libwebkit2gtk-4_0-37-debuginfo-2.46.3-4.22.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libwebkit2gtk3-lang-2.46.3-4.22.1 ## References: * https://www.suse.com/security/cve/CVE-2024-44308.html * https://www.suse.com/security/cve/CVE-2024-44309.html * https://bugzilla.suse.com/show_bug.cgi?id=1233631 * https://bugzilla.suse.com/show_bug.cgi?id=1233632 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:13 -0000 Subject: SUSE-SU-2024:4292-1: important: Security update for webkit2gtk3 Message-ID: <173392021318.13380.13598690632771387737@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:4292-1 Release Date: 2024-12-11T11:41:37Z Rating: important References: * bsc#1233631 * bsc#1233632 Cross-References: * CVE-2024-44308 * CVE-2024-44309 CVSS scores: * CVE-2024-44308 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-44309 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-44309 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2024-44309 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2024-44308: Fixed processing maliciously crafted web content that may lead to arbitrary code execution (bsc#1233631) * CVE-2024-44309: Fixed data isolation bypass vulnerability (bsc#1233632) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4292=1 openSUSE-SLE-15.6-2024-4292=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4292=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4292=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4292=1 ## Package List: * openSUSE Leap 15.6 (noarch) * WebKitGTK-6.0-lang-2.46.3-150600.12.21.1 * WebKitGTK-4.0-lang-2.46.3-150600.12.21.1 * WebKitGTK-4.1-lang-2.46.3-150600.12.21.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * webkit2gtk3-soup2-devel-2.46.3-150600.12.21.1 * libwebkitgtk-6_0-4-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150600.12.21.1 * webkit2gtk4-minibrowser-2.46.3-150600.12.21.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150600.12.21.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.46.3-150600.12.21.1 * webkit2gtk-4_0-injected-bundles-2.46.3-150600.12.21.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2-4_0-2.46.3-150600.12.21.1 * webkit-jsc-4.1-2.46.3-150600.12.21.1 * webkit2gtk4-devel-2.46.3-150600.12.21.1 * webkit-jsc-4-debuginfo-2.46.3-150600.12.21.1 * webkit2gtk3-soup2-minibrowser-2.46.3-150600.12.21.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-debuginfo-2.46.3-150600.12.21.1 * webkit-jsc-4.1-debuginfo-2.46.3-150600.12.21.1 * webkit-jsc-6.0-2.46.3-150600.12.21.1 * webkit-jsc-4-2.46.3-150600.12.21.1 * webkit2gtk3-soup2-debugsource-2.46.3-150600.12.21.1 * typelib-1_0-JavaScriptCore-6_0-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-2.46.3-150600.12.21.1 * webkit2gtk3-minibrowser-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150600.12.21.1 * webkit-jsc-6.0-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-JavaScriptCore-4_1-2.46.3-150600.12.21.1 * webkit2gtk-4_1-injected-bundles-2.46.3-150600.12.21.1 * libjavascriptcoregtk-6_0-1-2.46.3-150600.12.21.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1 * webkit2gtk3-devel-2.46.3-150600.12.21.1 * webkit2gtk4-debugsource-2.46.3-150600.12.21.1 * webkit2gtk4-minibrowser-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-WebKit-6_0-2.46.3-150600.12.21.1 * libwebkitgtk-6_0-4-2.46.3-150600.12.21.1 * webkit2gtk3-minibrowser-2.46.3-150600.12.21.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-2.46.3-150600.12.21.1 * webkitgtk-6_0-injected-bundles-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2-4_1-2.46.3-150600.12.21.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-2.46.3-150600.12.21.1 * webkit2gtk3-debugsource-2.46.3-150600.12.21.1 * openSUSE Leap 15.6 (x86_64) * libwebkit2gtk-4_0-37-32bit-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-32bit-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-32bit-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-32bit-2.46.3-150600.12.21.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-64bit-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-64bit-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-64bit-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-64bit-2.46.3-150600.12.21.1 * Basesystem Module 15-SP6 (noarch) * WebKitGTK-4.0-lang-2.46.3-150600.12.21.1 * WebKitGTK-6.0-lang-2.46.3-150600.12.21.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk-4_0-injected-bundles-2.46.3-150600.12.21.1 * webkit2gtk3-soup2-devel-2.46.3-150600.12.21.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2-4_0-2.46.3-150600.12.21.1 * libwebkitgtk-6_0-4-2.46.3-150600.12.21.1 * libwebkitgtk-6_0-4-debuginfo-2.46.3-150600.12.21.1 * typelib-1_0-JavaScriptCore-4_0-2.46.3-150600.12.21.1 * webkit2gtk3-soup2-debugsource-2.46.3-150600.12.21.1 * webkitgtk-6_0-injected-bundles-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-2.46.3-150600.12.21.1 * libwebkit2gtk-4_0-37-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150600.12.21.1 * libjavascriptcoregtk-6_0-1-2.46.3-150600.12.21.1 * webkit2gtk4-debugsource-2.46.3-150600.12.21.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1 * Desktop Applications Module 15-SP6 (noarch) * WebKitGTK-4.1-lang-2.46.3-150600.12.21.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-devel-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150600.12.21.1 * typelib-1_0-WebKit2-4_1-2.46.3-150600.12.21.1 * webkit2gtk3-debugsource-2.46.3-150600.12.21.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-debuginfo-2.46.3-150600.12.21.1 * webkit2gtk-4_1-injected-bundles-2.46.3-150600.12.21.1 * libwebkit2gtk-4_1-0-2.46.3-150600.12.21.1 * typelib-1_0-JavaScriptCore-4_1-2.46.3-150600.12.21.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.46.3-150600.12.21.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-WebKit-6_0-2.46.3-150600.12.21.1 * typelib-1_0-JavaScriptCore-6_0-2.46.3-150600.12.21.1 * webkit2gtk4-devel-2.46.3-150600.12.21.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150600.12.21.1 * webkit2gtk4-debugsource-2.46.3-150600.12.21.1 ## References: * https://www.suse.com/security/cve/CVE-2024-44308.html * https://www.suse.com/security/cve/CVE-2024-44309.html * https://bugzilla.suse.com/show_bug.cgi?id=1233631 * https://bugzilla.suse.com/show_bug.cgi?id=1233632 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:16 -0000 Subject: SUSE-SU-2024:4291-1: important: Security update for python312 Message-ID: <173392021648.13380.6494641244170404480@smelt2.prg2.suse.org> # Security update for python312 Announcement ID: SUSE-SU-2024:4291-1 Release Date: 2024-12-11T11:24:51Z Rating: important References: * bsc#1231795 * bsc#1234290 Cross-References: * CVE-2024-12254 CVSS scores: * CVE-2024-12254 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-12254 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python312 fixes the following issues: * CVE-2024-12254: Fixed unbounded memory buffering in SelectorSocketTransport.writelines() (bsc#1234290) Other fixes: \- Updated to version 3.12.8 \- Remove -IVendor/ from python-config (bsc#1231795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4291=1 openSUSE-SLE-15.6-2024-4291=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4291=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python312-doc-devhelp-3.12.8-150600.3.12.1 * python312-tools-3.12.8-150600.3.12.1 * libpython3_12-1_0-debuginfo-3.12.8-150600.3.12.1 * python312-dbm-debuginfo-3.12.8-150600.3.12.1 * python312-tk-3.12.8-150600.3.12.1 * python312-idle-3.12.8-150600.3.12.1 * python312-base-3.12.8-150600.3.12.1 * python312-curses-3.12.8-150600.3.12.1 * python312-testsuite-debuginfo-3.12.8-150600.3.12.1 * python312-debugsource-3.12.8-150600.3.12.1 * libpython3_12-1_0-3.12.8-150600.3.12.1 * python312-tk-debuginfo-3.12.8-150600.3.12.1 * python312-testsuite-3.12.8-150600.3.12.1 * python312-3.12.8-150600.3.12.1 * python312-curses-debuginfo-3.12.8-150600.3.12.1 * python312-doc-3.12.8-150600.3.12.1 * python312-base-debuginfo-3.12.8-150600.3.12.1 * python312-dbm-3.12.8-150600.3.12.1 * python312-debuginfo-3.12.8-150600.3.12.1 * python312-devel-3.12.8-150600.3.12.1 * python312-core-debugsource-3.12.8-150600.3.12.1 * openSUSE Leap 15.6 (x86_64) * python312-32bit-3.12.8-150600.3.12.1 * libpython3_12-1_0-32bit-debuginfo-3.12.8-150600.3.12.1 * libpython3_12-1_0-32bit-3.12.8-150600.3.12.1 * python312-base-32bit-debuginfo-3.12.8-150600.3.12.1 * python312-32bit-debuginfo-3.12.8-150600.3.12.1 * python312-base-32bit-3.12.8-150600.3.12.1 * openSUSE Leap 15.6 (aarch64_ilp32) * python312-64bit-debuginfo-3.12.8-150600.3.12.1 * libpython3_12-1_0-64bit-debuginfo-3.12.8-150600.3.12.1 * python312-64bit-3.12.8-150600.3.12.1 * python312-base-64bit-3.12.8-150600.3.12.1 * python312-base-64bit-debuginfo-3.12.8-150600.3.12.1 * libpython3_12-1_0-64bit-3.12.8-150600.3.12.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python312-dbm-debuginfo-3.12.8-150600.3.12.1 * python312-tk-debuginfo-3.12.8-150600.3.12.1 * python312-3.12.8-150600.3.12.1 * python312-curses-debuginfo-3.12.8-150600.3.12.1 * python312-debugsource-3.12.8-150600.3.12.1 * python312-tools-3.12.8-150600.3.12.1 * python312-tk-3.12.8-150600.3.12.1 * python312-devel-3.12.8-150600.3.12.1 * python312-curses-3.12.8-150600.3.12.1 * python312-base-debuginfo-3.12.8-150600.3.12.1 * libpython3_12-1_0-3.12.8-150600.3.12.1 * python312-idle-3.12.8-150600.3.12.1 * python312-dbm-3.12.8-150600.3.12.1 * python312-debuginfo-3.12.8-150600.3.12.1 * python312-core-debugsource-3.12.8-150600.3.12.1 * python312-base-3.12.8-150600.3.12.1 * libpython3_12-1_0-debuginfo-3.12.8-150600.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12254.html * https://bugzilla.suse.com/show_bug.cgi?id=1231795 * https://bugzilla.suse.com/show_bug.cgi?id=1234290 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:20 -0000 Subject: SUSE-SU-2024:4290-1: important: Security update for libsoup2 Message-ID: <173392022097.13380.5757962772000723964@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2024:4290-1 Release Date: 2024-12-11T11:10:48Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285) * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292) * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4290=1 openSUSE-SLE-15.6-2024-4290=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4290=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.3.1 * libsoup-2_4-1-2.74.3-150600.4.3.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.3.1 * libsoup2-debugsource-2.74.3-150600.4.3.1 * libsoup2-devel-2.74.3-150600.4.3.1 * openSUSE Leap 15.6 (x86_64) * libsoup2-devel-32bit-2.74.3-150600.4.3.1 * libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.3.1 * libsoup-2_4-1-32bit-2.74.3-150600.4.3.1 * openSUSE Leap 15.6 (noarch) * libsoup2-lang-2.74.3-150600.4.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-2_4-1-64bit-2.74.3-150600.4.3.1 * libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.3.1 * libsoup2-devel-64bit-2.74.3-150600.4.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.3.1 * libsoup-2_4-1-2.74.3-150600.4.3.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.3.1 * libsoup2-debugsource-2.74.3-150600.4.3.1 * libsoup2-devel-2.74.3-150600.4.3.1 * Basesystem Module 15-SP6 (noarch) * libsoup2-lang-2.74.3-150600.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:27 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:27 -0000 Subject: SUSE-SU-2024:4288-1: moderate: Security update for curl Message-ID: <173392022741.13380.18406643113472729784@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:4288-1 Release Date: 2024-12-11T08:31:36Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: Fixed password leak used for the first host to the followed- to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4288=1 openSUSE-SLE-15.6-2024-4288=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4288=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * curl-8.6.0-150600.4.15.1 * libcurl-devel-8.6.0-150600.4.15.1 * libcurl4-debuginfo-8.6.0-150600.4.15.1 * libcurl4-8.6.0-150600.4.15.1 * curl-debuginfo-8.6.0-150600.4.15.1 * curl-debugsource-8.6.0-150600.4.15.1 * openSUSE Leap 15.6 (x86_64) * libcurl4-32bit-8.6.0-150600.4.15.1 * libcurl-devel-32bit-8.6.0-150600.4.15.1 * libcurl4-32bit-debuginfo-8.6.0-150600.4.15.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libcurl4-64bit-debuginfo-8.6.0-150600.4.15.1 * libcurl4-64bit-8.6.0-150600.4.15.1 * libcurl-devel-64bit-8.6.0-150600.4.15.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * curl-8.6.0-150600.4.15.1 * libcurl-devel-8.6.0-150600.4.15.1 * libcurl4-debuginfo-8.6.0-150600.4.15.1 * libcurl4-8.6.0-150600.4.15.1 * curl-debuginfo-8.6.0-150600.4.15.1 * curl-debugsource-8.6.0-150600.4.15.1 * Basesystem Module 15-SP6 (x86_64) * libcurl4-32bit-8.6.0-150600.4.15.1 * libcurl4-32bit-debuginfo-8.6.0-150600.4.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:29 -0000 Subject: SUSE-SU-2024:4287-1: moderate: Security update for curl Message-ID: <173392022981.13380.16676369117362743249@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:4287-1 Release Date: 2024-12-11T08:31:26Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4287=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4287=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4287=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * curl-debuginfo-7.66.0-150200.4.81.1 * curl-debugsource-7.66.0-150200.4.81.1 * libcurl4-7.66.0-150200.4.81.1 * libcurl4-debuginfo-7.66.0-150200.4.81.1 * curl-7.66.0-150200.4.81.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * curl-debuginfo-7.66.0-150200.4.81.1 * curl-debugsource-7.66.0-150200.4.81.1 * libcurl4-7.66.0-150200.4.81.1 * libcurl4-debuginfo-7.66.0-150200.4.81.1 * curl-7.66.0-150200.4.81.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * curl-debuginfo-7.66.0-150200.4.81.1 * curl-debugsource-7.66.0-150200.4.81.1 * libcurl4-7.66.0-150200.4.81.1 * libcurl4-debuginfo-7.66.0-150200.4.81.1 * curl-7.66.0-150200.4.81.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:33 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:33 -0000 Subject: SUSE-SU-2024:4286-1: moderate: Security update for nodejs20 Message-ID: <173392023363.13380.3545074781628513390@smelt2.prg2.suse.org> # Security update for nodejs20 Announcement ID: SUSE-SU-2024:4286-1 Release Date: 2024-12-11T08:30:46Z Rating: moderate References: * bsc#1233856 Cross-References: * CVE-2024-21538 CVSS scores: * CVE-2024-21538 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * Web and Scripting Module 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for nodejs20 fixes the following issues: * CVE-2024-21538: Fixed regular expression denial of service in cross-spawn dependency (bsc#1233856) Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New option for vm.createContext() to create a context with a freezable globalThis * buffer: optimize createFromString \- Changes in 20.17.0: * module: support require()ing synchronous ESM graphs * path: add matchesGlob method * stream: expose DuplexPair API \- Changes in 20.16.0: * process: add process.getBuiltinModule(id) * inspector: fix disable async hooks on Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4286=1 openSUSE-SLE-15.6-2024-4286=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4286=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * nodejs20-debugsource-20.18.1-150600.3.6.1 * nodejs20-devel-20.18.1-150600.3.6.1 * nodejs20-20.18.1-150600.3.6.1 * nodejs20-debuginfo-20.18.1-150600.3.6.1 * corepack20-20.18.1-150600.3.6.1 * npm20-20.18.1-150600.3.6.1 * openSUSE Leap 15.6 (noarch) * nodejs20-docs-20.18.1-150600.3.6.1 * Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64) * nodejs20-debugsource-20.18.1-150600.3.6.1 * nodejs20-devel-20.18.1-150600.3.6.1 * nodejs20-20.18.1-150600.3.6.1 * nodejs20-debuginfo-20.18.1-150600.3.6.1 * npm20-20.18.1-150600.3.6.1 * Web and Scripting Module 15-SP6 (noarch) * nodejs20-docs-20.18.1-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21538.html * https://bugzilla.suse.com/show_bug.cgi?id=1233856 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:36 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:36 -0000 Subject: SUSE-SU-2024:4285-1: critical: Security update for python-Django Message-ID: <173392023665.13380.14046236943031309524@smelt2.prg2.suse.org> # Security update for python-Django Announcement ID: SUSE-SU-2024:4285-1 Release Date: 2024-12-11T08:30:27Z Rating: critical References: * bsc#1234231 * bsc#1234232 Cross-References: * CVE-2024-53907 * CVE-2024-53908 CVSS scores: * CVE-2024-53907 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53908 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-53908 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Django fixes the following issues: * CVE-2024-53907: Fixed denial-of-service in django.utils.html.strip_tags() (bsc#1234232) * CVE-2024-53908: Fixed SQL injection in HasKey(lhs, rhs) on Oracle (bsc#1234231) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4285=1 openSUSE-SLE-15.6-2024-4285=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4285=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-Django-4.2.11-150600.3.12.1 * SUSE Package Hub 15 15-SP6 (noarch) * python311-Django-4.2.11-150600.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53907.html * https://www.suse.com/security/cve/CVE-2024-53908.html * https://bugzilla.suse.com/show_bug.cgi?id=1234231 * https://bugzilla.suse.com/show_bug.cgi?id=1234232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 12:30:39 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 12:30:39 -0000 Subject: SUSE-SU-2024:4284-1: moderate: Security update for curl Message-ID: <173392023904.13380.18125244878236762205@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:4284-1 Release Date: 2024-12-11T08:30:05Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4284=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libcurl4-8.0.1-11.101.1 * curl-debugsource-8.0.1-11.101.1 * libcurl4-debuginfo-32bit-8.0.1-11.101.1 * curl-debuginfo-8.0.1-11.101.1 * libcurl4-debuginfo-8.0.1-11.101.1 * curl-8.0.1-11.101.1 * libcurl4-32bit-8.0.1-11.101.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 16:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 16:30:06 -0000 Subject: SUSE-SU-2024:4295-1: moderate: Security update for socat Message-ID: <173393460644.13380.3543691674359181474@smelt2.prg2.suse.org> # Security update for socat Announcement ID: SUSE-SU-2024:4295-1 Release Date: 2024-12-11T14:41:01Z Rating: moderate References: * bsc#1225462 Cross-References: * CVE-2024-54661 CVSS scores: * CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for socat fixes the following issues: * CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp directory in socat readline.sh (bsc#1225462) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4295=1 openSUSE-SLE-15.6-2024-4295=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4295=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * socat-extra-1.8.0.0-150600.20.6.1 * socat-1.8.0.0-150600.20.6.1 * socat-debugsource-1.8.0.0-150600.20.6.1 * socat-debuginfo-1.8.0.0-150600.20.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * socat-1.8.0.0-150600.20.6.1 * socat-debugsource-1.8.0.0-150600.20.6.1 * socat-debuginfo-1.8.0.0-150600.20.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54661.html * https://bugzilla.suse.com/show_bug.cgi?id=1225462 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 11 16:30:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 11 Dec 2024 16:30:08 -0000 Subject: SUSE-SU-2024:4294-1: moderate: Security update for socat Message-ID: <173393460875.13380.10038984805404865696@smelt2.prg2.suse.org> # Security update for socat Announcement ID: SUSE-SU-2024:4294-1 Release Date: 2024-12-11T13:06:43Z Rating: moderate References: * bsc#1225462 Cross-References: * CVE-2024-54661 CVSS scores: * CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for socat fixes the following issues: * CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp directory (bsc#1225462) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4294=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * socat-debugsource-1.7.2.4-4.3.1 * socat-1.7.2.4-4.3.1 * socat-debuginfo-1.7.2.4-4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54661.html * https://bugzilla.suse.com/show_bug.cgi?id=1225462 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 12:30:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 12:30:05 -0000 Subject: SUSE-SU-2024:4302-1: moderate: Security update for socat Message-ID: <173400660557.13579.13993780909716527616@smelt2.prg2.suse.org> # Security update for socat Announcement ID: SUSE-SU-2024:4302-1 Release Date: 2024-12-12T08:51:18Z Rating: moderate References: * bsc#1225462 Cross-References: * CVE-2024-54661 CVSS scores: * CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for socat fixes the following issues: * CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp directory (bsc#1225462) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4302=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4302=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4302=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4302=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4302=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * socat-extra-1.8.0.0-150400.14.6.1 * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * socat-1.8.0.0-150400.14.6.1 * socat-debugsource-1.8.0.0-150400.14.6.1 * socat-debuginfo-1.8.0.0-150400.14.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54661.html * https://bugzilla.suse.com/show_bug.cgi?id=1225462 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 12:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 12:30:10 -0000 Subject: SUSE-SU-2024:4301-1: moderate: Security update for nodejs18 Message-ID: <173400661055.13579.9148687552355996982@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:4301-1 Release Date: 2024-12-12T08:10:45Z Rating: moderate References: * bsc#1233856 Cross-References: * CVE-2024-21538 CVSS scores: * CVE-2024-21538 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Web and Scripting Module 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for nodejs18 fixes the following issues: * CVE-2024-21538: Fixed regular expression denial of service in cross-spawn dependency (bsc#1233856) Other fixes: \- Update to 18.20.5 * esm: mark import attributes and JSON module as stable * deps: \+ upgrade npm to 10.8.2 \+ update simdutf to 5.6.0 \+ update brotli to 1.1.0 \+ update ada to 2.8.0 \+ update acorn to 8.13.0 \+ update acorn-walk to 8.3.4 \+ update c-ares to 1.29.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4301=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4301=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4301=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * corepack18-18.20.5-150400.9.30.1 * nodejs18-devel-18.20.5-150400.9.30.1 * nodejs18-debugsource-18.20.5-150400.9.30.1 * npm18-18.20.5-150400.9.30.1 * nodejs18-debuginfo-18.20.5-150400.9.30.1 * nodejs18-18.20.5-150400.9.30.1 * openSUSE Leap 15.4 (noarch) * nodejs18-docs-18.20.5-150400.9.30.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * corepack18-18.20.5-150400.9.30.1 * nodejs18-devel-18.20.5-150400.9.30.1 * nodejs18-debugsource-18.20.5-150400.9.30.1 * npm18-18.20.5-150400.9.30.1 * nodejs18-debuginfo-18.20.5-150400.9.30.1 * nodejs18-18.20.5-150400.9.30.1 * openSUSE Leap 15.5 (noarch) * nodejs18-docs-18.20.5-150400.9.30.1 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * nodejs18-debugsource-18.20.5-150400.9.30.1 * nodejs18-devel-18.20.5-150400.9.30.1 * npm18-18.20.5-150400.9.30.1 * nodejs18-debuginfo-18.20.5-150400.9.30.1 * nodejs18-18.20.5-150400.9.30.1 * Web and Scripting Module 15-SP5 (noarch) * nodejs18-docs-18.20.5-150400.9.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21538.html * https://bugzilla.suse.com/show_bug.cgi?id=1233856 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 12:30:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 12:30:13 -0000 Subject: SUSE-SU-2024:4300-1: moderate: Security update for nodejs20 Message-ID: <173400661337.13579.2959428305235866403@smelt2.prg2.suse.org> # Security update for nodejs20 Announcement ID: SUSE-SU-2024:4300-1 Release Date: 2024-12-12T08:10:17Z Rating: moderate References: * bsc#1233856 Cross-References: * CVE-2024-21538 CVSS scores: * CVE-2024-21538 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Web and Scripting Module 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for nodejs20 fixes the following issues: * CVE-2024-21538: Fixed regular expression denial of service in cross-spawn dependency (bsc#1233856) Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New option for vm.createContext() to create a context with a freezable globalThis * buffer: optimize createFromString \- Changes in 20.17.0: * module: support require()ing synchronous ESM graphs * path: add matchesGlob method * stream: expose DuplexPair API \- Changes in 20.16.0: * process: add process.getBuiltinModule(id) * inspector: fix disable async hooks on Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4300=1 SUSE-2024-4300=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4300=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * npm20-20.18.1-150500.11.15.1 * nodejs20-debugsource-20.18.1-150500.11.15.1 * nodejs20-20.18.1-150500.11.15.1 * nodejs20-debuginfo-20.18.1-150500.11.15.1 * nodejs20-devel-20.18.1-150500.11.15.1 * corepack20-20.18.1-150500.11.15.1 * openSUSE Leap 15.5 (noarch) * nodejs20-docs-20.18.1-150500.11.15.1 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm20-20.18.1-150500.11.15.1 * nodejs20-debugsource-20.18.1-150500.11.15.1 * nodejs20-20.18.1-150500.11.15.1 * nodejs20-debuginfo-20.18.1-150500.11.15.1 * nodejs20-devel-20.18.1-150500.11.15.1 * Web and Scripting Module 15-SP5 (noarch) * nodejs20-docs-20.18.1-150500.11.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21538.html * https://bugzilla.suse.com/show_bug.cgi?id=1233856 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 12:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 12:30:15 -0000 Subject: SUSE-SU-2024:4299-1: moderate: Security update for govulncheck-vulndb Message-ID: <173400661513.13579.14080402626723639345@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2024:4299-1 Release Date: 2024-12-12T08:10:04Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20241209T183251 2024-12-09T18:32:51Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2024-3284 * GO-2024-3286 * GO-2024-3287 * GO-2024-3288 * GO-2024-3289 * GO-2024-3290 * GO-2024-3291 * GO-2024-3292 * GO-2024-3294 * GO-2024-3296 * GO-2024-3299 * GO-2024-3300 * GO-2024-3302 * GO-2024-3303 * GO-2024-3304 * GO-2024-3305 * GO-2024-3307 * GO-2024-3308 * GO-2024-3310 * GO-2024-3311 * GO-2024-3312 * GO-2024-3313 * Update to version 0.0.20241121T195252 2024-11-21T19:52:52Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2024-3279 * GO-2024-3280 * GO-2024-3281 * GO-2024-3282 * GO-2024-3283 * Update to version 0.0.20241120T172248 2024-11-20T17:22:48Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2024-3140 * GO-2024-3259 * GO-2024-3265 * Update to version 0.0.20241119T173509 2024-11-19T17:35:09Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2022-0646 * GO-2024-3267 * GO-2024-3269 * GO-2024-3271 * GO-2024-3272 * GO-2024-3273 * GO-2024-3274 * GO-2024-3275 * GO-2024-3277 * GO-2024-3278 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4299=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4299=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4299=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4299=1 ## Package List: * openSUSE Leap 15.5 (noarch) * govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1 * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1 * SUSE Package Hub 15 15-SP5 (noarch) * govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 16:30:09 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 16:30:09 -0000 Subject: SUSE-SU-2024:4306-1: moderate: Security update for java-1_8_0-ibm Message-ID: <173402100943.13380.8636879741286238074@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2024:4306-1 Release Date: 2024-12-12T14:31:37Z Rating: moderate References: * bsc#1225470 * bsc#1231702 * bsc#1231711 * bsc#1231716 * bsc#1231719 * bsc#1232064 Cross-References: * CVE-2024-21208 * CVE-2024-21210 * CVE-2024-21217 * CVE-2024-21235 * CVE-2024-3933 CVSS scores: * CVE-2024-21208 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21210 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21217 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21235 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-3933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L Affected Products: * Legacy Module 15-SP5 * Legacy Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: Updated to Java 8.0 Service Refresh 8 Fix Pack 35 with Oracle October 15 2024 CPU (bsc#1232064): \- CVE-2024-21208: Fixed partial DoS in component Networking (bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed unauthorized update, insert or delete access to some of Oracle Java SE accessible data in component Hotspot (bsc#1231711,JDK-8328544) \- CVE-2024-21217: Fixed partial DoS in component Serialization (bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231719,JDK-8332644) Other issues fixed in past releases: \- CVE-2024-3933: Fixed evaluate constant byteLenNode of arrayCopyChild (bsc#1225470) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4306=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4306=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4306=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4306=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4306=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4306=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4306=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4306=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4306=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4306=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4306=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4306=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4306=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4306=1 ## Package List: * Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * Legacy Module 15-SP5 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * Legacy Module 15-SP5 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * Legacy Module 15-SP6 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * Legacy Module 15-SP6 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * SUSE Enterprise Storage 7.1 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * SUSE Enterprise Storage 7.1 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * openSUSE Leap 15.5 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1 * openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 * openSUSE Leap 15.6 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 * java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21208.html * https://www.suse.com/security/cve/CVE-2024-21210.html * https://www.suse.com/security/cve/CVE-2024-21217.html * https://www.suse.com/security/cve/CVE-2024-21235.html * https://www.suse.com/security/cve/CVE-2024-3933.html * https://bugzilla.suse.com/show_bug.cgi?id=1225470 * https://bugzilla.suse.com/show_bug.cgi?id=1231702 * https://bugzilla.suse.com/show_bug.cgi?id=1231711 * https://bugzilla.suse.com/show_bug.cgi?id=1231716 * https://bugzilla.suse.com/show_bug.cgi?id=1231719 * https://bugzilla.suse.com/show_bug.cgi?id=1232064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 16:30:14 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 16:30:14 -0000 Subject: SUSE-SU-2024:4304-1: important: Security update for qemu Message-ID: <173402101496.13380.3361532800137363114@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2024:4304-1 Release Date: 2024-12-12T13:22:09Z Rating: important References: * bsc#1229007 * bsc#1230834 * bsc#1230915 Cross-References: * CVE-2024-7409 * CVE-2024-8354 * CVE-2024-8612 CVSS scores: * CVE-2024-7409 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8612 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2024-8612 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for qemu fixes the following issues: * CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU NBD Server during socket closure (bsc#1229007) * CVE-2024-8354: Fixed assertion failure in usb_ep_get() in usb (bsc#1230834) * CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4304=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4304=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4304=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4304=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4304=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4304=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4304=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4304=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4304=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * qemu-block-gluster-6.2.0-150400.37.37.3 * qemu-audio-jack-6.2.0-150400.37.37.3 * qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ivshmem-tools-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-jack-debuginfo-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-arm-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-accel-qtest-6.2.0-150400.37.37.3 * qemu-block-gluster-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-linux-user-debuginfo-6.2.0-150400.37.37.2 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-block-nfs-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-block-nfs-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-ppc-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-ppc-6.2.0-150400.37.37.3 * qemu-extra-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-smartcard-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-block-dmg-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * qemu-linux-user-debugsource-6.2.0-150400.37.37.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-oss-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-vhost-user-gpu-6.2.0-150400.37.37.3 * qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-s390x-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-block-dmg-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-oss-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-linux-user-6.2.0-150400.37.37.2 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * qemu-extra-6.2.0-150400.37.37.3 * qemu-accel-qtest-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * openSUSE Leap 15.4 (s390x x86_64 i586) * qemu-kvm-6.2.0-150400.37.37.3 * openSUSE Leap 15.4 (noarch) * qemu-skiboot-6.2.0-150400.37.37.3 * qemu-SLOF-6.2.0-150400.37.37.3 * qemu-sgabios-8-150400.37.37.3 * qemu-microvm-6.2.0-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * qemu-sgabios-8-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * qemu-s390x-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * qemu-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.3 (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.3 (noarch) * qemu-sgabios-8-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Linux Enterprise Micro 5.3 (s390x) * qemu-s390x-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.3 (x86_64) * qemu-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * qemu-sgabios-8-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * qemu-s390x-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * qemu-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.4 (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.4 (noarch) * qemu-sgabios-8-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Linux Enterprise Micro 5.4 (s390x) * qemu-s390x-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Micro 5.4 (x86_64) * qemu-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-sgabios-8-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-sgabios-8-150400.37.37.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * qemu-arm-6.2.0-150400.37.37.3 * qemu-arm-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * qemu-skiboot-6.2.0-150400.37.37.3 * qemu-SLOF-6.2.0-150400.37.37.3 * qemu-sgabios-8-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le) * qemu-ppc-debuginfo-6.2.0-150400.37.37.3 * qemu-ppc-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x x86_64) * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3 * qemu-s390x-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * qemu-skiboot-6.2.0-150400.37.37.3 * qemu-SLOF-6.2.0-150400.37.37.3 * qemu-sgabios-8-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le) * qemu-ppc-debuginfo-6.2.0-150400.37.37.3 * qemu-ppc-6.2.0-150400.37.37.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * SUSE Manager Proxy 4.3 (x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Manager Proxy 4.3 (noarch) * qemu-sgabios-8-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * qemu-sgabios-8-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * qemu-tools-debuginfo-6.2.0-150400.37.37.3 * qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3 * qemu-6.2.0-150400.37.37.3 * qemu-ui-curses-6.2.0-150400.37.37.3 * qemu-tools-6.2.0-150400.37.37.3 * qemu-ksm-6.2.0-150400.37.37.3 * qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3 * qemu-lang-6.2.0-150400.37.37.3 * qemu-block-ssh-6.2.0-150400.37.37.3 * qemu-hw-usb-host-6.2.0-150400.37.37.3 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3 * qemu-debuginfo-6.2.0-150400.37.37.3 * qemu-block-curl-6.2.0-150400.37.37.3 * qemu-debugsource-6.2.0-150400.37.37.3 * qemu-block-iscsi-6.2.0-150400.37.37.3 * qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3 * qemu-guest-agent-6.2.0-150400.37.37.3 * qemu-block-rbd-6.2.0-150400.37.37.3 * qemu-chardev-baum-6.2.0-150400.37.37.3 * qemu-block-curl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3 * SUSE Manager Server 4.3 (noarch) * qemu-skiboot-6.2.0-150400.37.37.3 * qemu-SLOF-6.2.0-150400.37.37.3 * qemu-sgabios-8-150400.37.37.3 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * qemu-ipxe-1.0.0+-150400.37.37.3 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 * SUSE Manager Server 4.3 (ppc64le x86_64) * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-6.2.0-150400.37.37.3 * qemu-ui-spice-app-6.2.0-150400.37.37.3 * qemu-ui-gtk-6.2.0-150400.37.37.3 * qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-usb-redirect-6.2.0-150400.37.37.3 * qemu-chardev-spice-6.2.0-150400.37.37.3 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-qxl-6.2.0-150400.37.37.3 * qemu-audio-spice-6.2.0-150400.37.37.3 * SUSE Manager Server 4.3 (ppc64le) * qemu-ppc-debuginfo-6.2.0-150400.37.37.3 * qemu-ppc-6.2.0-150400.37.37.3 * SUSE Manager Server 4.3 (s390x x86_64) * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3 * qemu-kvm-6.2.0-150400.37.37.3 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3 * SUSE Manager Server 4.3 (s390x) * qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3 * qemu-s390x-6.2.0-150400.37.37.3 * qemu-s390x-debuginfo-6.2.0-150400.37.37.3 * SUSE Manager Server 4.3 (x86_64) * qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-accel-tcg-x86-6.2.0-150400.37.37.3 * qemu-x86-debuginfo-6.2.0-150400.37.37.3 * qemu-x86-6.2.0-150400.37.37.3 * qemu-audio-alsa-6.2.0-150400.37.37.3 * qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3 * qemu-audio-pa-6.2.0-150400.37.37.3 ## References: * https://www.suse.com/security/cve/CVE-2024-7409.html * https://www.suse.com/security/cve/CVE-2024-8354.html * https://www.suse.com/security/cve/CVE-2024-8612.html * https://bugzilla.suse.com/show_bug.cgi?id=1229007 * https://bugzilla.suse.com/show_bug.cgi?id=1230834 * https://bugzilla.suse.com/show_bug.cgi?id=1230915 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 12 16:30:21 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 12 Dec 2024 16:30:21 -0000 Subject: SUSE-SU-2024:4303-1: moderate: Security update for buildah Message-ID: <173402102120.13380.13518710662407391721@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2024:4303-1 Release Date: 2024-12-12T12:50:24Z Rating: moderate References: * bsc#1231208 * bsc#1231230 * bsc#1231499 * bsc#1231698 * bsc#1232522 Cross-References: * CVE-2024-9341 * CVE-2024-9407 * CVE-2024-9675 * CVE-2024-9676 CVSS scores: * CVE-2024-9341 ( SUSE ): 5.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N * CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N * CVE-2024-9675 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9675 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2024-9676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for buildah fixes the following issues: Security issues fixed: * CVE-2024-9675: cache arbitrary directory mount (bsc#1231499) * CVE-2024-9407: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208) * CVE-2024-9676: symlink traversal vulnerability in the containers/storage library can cause denial of service (bsc#1231698) * CVE-2024-9341: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230) Non-security issue fixed: * default to slirp4netns on SLE instead of pasta (bsc#1232522) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4303=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4303=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4303=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4303=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4303=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.4-150300.8.28.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * buildah-1.35.4-150300.8.28.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.4-150300.8.28.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * buildah-1.35.4-150300.8.28.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * buildah-1.35.4-150300.8.28.3 ## References: * https://www.suse.com/security/cve/CVE-2024-9341.html * https://www.suse.com/security/cve/CVE-2024-9407.html * https://www.suse.com/security/cve/CVE-2024-9675.html * https://www.suse.com/security/cve/CVE-2024-9676.html * https://bugzilla.suse.com/show_bug.cgi?id=1231208 * https://bugzilla.suse.com/show_bug.cgi?id=1231230 * https://bugzilla.suse.com/show_bug.cgi?id=1231499 * https://bugzilla.suse.com/show_bug.cgi?id=1231698 * https://bugzilla.suse.com/show_bug.cgi?id=1232522 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 13 16:33:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 13 Dec 2024 16:33:29 -0000 Subject: SUSE-SU-2024:4315-1: important: Security update for the Linux Kernel Message-ID: <173410760932.1470.16896704645881863835@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4315-1 Release Date: 2024-12-13T15:23:51Z Rating: important References: * bsc#1082555 * bsc#1194869 * bsc#1218644 * bsc#1220382 * bsc#1221309 * bsc#1221333 * bsc#1222364 * bsc#1222590 * bsc#1223202 * bsc#1223656 * bsc#1223848 * bsc#1223919 * bsc#1223942 * bsc#1224518 * bsc#1224526 * bsc#1224574 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225812 * bsc#1226560 * bsc#1226592 * bsc#1226631 * bsc#1226748 * bsc#1226872 * bsc#1227853 * bsc#1228410 * bsc#1228430 * bsc#1228486 * bsc#1228650 * bsc#1228857 * bsc#1229312 * bsc#1229429 * bsc#1229585 * bsc#1229752 * bsc#1229808 * bsc#1230055 * bsc#1230220 * bsc#1230231 * bsc#1230270 * bsc#1230558 * bsc#1230827 * bsc#1230918 * bsc#1231083 * bsc#1231089 * bsc#1231098 * bsc#1231101 * bsc#1231108 * bsc#1231111 * bsc#1231132 * bsc#1231135 * bsc#1231138 * bsc#1231169 * bsc#1231178 * bsc#1231180 * bsc#1231181 * bsc#1231187 * bsc#1231202 * bsc#1231434 * bsc#1231441 * bsc#1231452 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231537 * bsc#1231541 * bsc#1231646 * bsc#1231849 * bsc#1231856 * bsc#1231858 * bsc#1231859 * bsc#1231864 * bsc#1231904 * bsc#1231916 * bsc#1231920 * bsc#1231923 * bsc#1231930 * bsc#1231931 * bsc#1231947 * bsc#1231952 * bsc#1231953 * bsc#1231959 * bsc#1231978 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232027 * bsc#1232028 * bsc#1232047 * bsc#1232048 * bsc#1232050 * bsc#1232056 * bsc#1232076 * bsc#1232080 * bsc#1232094 * bsc#1232096 * bsc#1232098 * bsc#1232111 * bsc#1232126 * bsc#1232134 * bsc#1232135 * bsc#1232141 * bsc#1232142 * bsc#1232147 * bsc#1232152 * bsc#1232159 * bsc#1232162 * bsc#1232165 * bsc#1232180 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232195 * bsc#1232198 * bsc#1232201 * bsc#1232218 * bsc#1232224 * bsc#1232232 * bsc#1232254 * bsc#1232255 * bsc#1232264 * bsc#1232272 * bsc#1232279 * bsc#1232287 * bsc#1232293 * bsc#1232312 * bsc#1232317 * bsc#1232318 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232339 * bsc#1232349 * bsc#1232357 * bsc#1232359 * bsc#1232362 * bsc#1232364 * bsc#1232370 * bsc#1232371 * bsc#1232378 * bsc#1232385 * bsc#1232387 * bsc#1232394 * bsc#1232413 * bsc#1232416 * bsc#1232436 * bsc#1232483 * bsc#1232500 * bsc#1232503 * bsc#1232504 * bsc#1232507 * bsc#1232520 * bsc#1232552 * bsc#1232757 * bsc#1232819 * bsc#1232860 * bsc#1232870 * bsc#1232873 * bsc#1232877 * bsc#1232878 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232919 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233035 * bsc#1233049 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233117 * bsc#1233123 * bsc#1233125 * bsc#1233129 * bsc#1233130 * bsc#1233134 * bsc#1233135 * bsc#1233150 * bsc#1233189 * bsc#1233191 * bsc#1233197 * bsc#1233205 * bsc#1233206 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233214 * bsc#1233216 * bsc#1233238 * bsc#1233241 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233350 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233528 * bsc#1233548 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233570 * bsc#1233577 * bsc#1233580 * bsc#1233977 * bsc#1234012 * bsc#1234025 * bsc#1234085 * bsc#1234093 * bsc#1234098 * bsc#1234108 Cross-References: * CVE-2021-47594 * CVE-2022-48674 * CVE-2022-48979 * CVE-2022-48982 * CVE-2022-48983 * CVE-2022-48989 * CVE-2022-48990 * CVE-2023-52915 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52921 * CVE-2023-52922 * CVE-2024-26782 * CVE-2024-26906 * CVE-2024-26953 * CVE-2024-35888 * CVE-2024-35937 * CVE-2024-35980 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36953 * CVE-2024-36954 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38615 * CVE-2024-40997 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41049 * CVE-2024-42131 * CVE-2024-43817 * CVE-2024-43897 * CVE-2024-44932 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-46681 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46807 * CVE-2024-46810 * CVE-2024-46812 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46835 * CVE-2024-46842 * CVE-2024-46853 * CVE-2024-46859 * CVE-2024-46864 * CVE-2024-46871 * CVE-2024-47663 * CVE-2024-47665 * CVE-2024-47667 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47679 * CVE-2024-47682 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47709 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47718 * CVE-2024-47723 * CVE-2024-47728 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47742 * CVE-2024-47745 * CVE-2024-47749 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49855 * CVE-2024-49861 * CVE-2024-49863 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49879 * CVE-2024-49884 * CVE-2024-49891 * CVE-2024-49900 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49921 * CVE-2024-49924 * CVE-2024-49925 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49938 * CVE-2024-49945 * CVE-2024-49947 * CVE-2024-49950 * CVE-2024-49957 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49968 * CVE-2024-49981 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49989 * CVE-2024-50003 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50013 * CVE-2024-50017 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50031 * CVE-2024-50044 * CVE-2024-50062 * CVE-2024-50067 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50082 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50138 * CVE-2024-50141 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50160 * CVE-2024-50167 * CVE-2024-50171 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50215 * CVE-2024-50218 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50249 * CVE-2024-50255 * CVE-2024-50259 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53052 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53079 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53104 * CVE-2024-53110 CVSS scores: * CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48990 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50259 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that solves 230 vulnerabilities and has 33 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560). * CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592). * CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808). * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890). * CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056). * CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103). * CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580). * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). The following non-security bugs were fixed: * Drop OCFS2 patch causing a regression (bsc#1233255) * Fix regression on AMDGPU driver (bsc#1233134) * Removed the duplicated check of static_assert(sizeof(struct work_struct) >= sizeof(struct rcu_head)). * Removed unnecessary white-space change in kernel/bpf/syscall.c * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Update config files (bsc#1218644). * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * acpi: CPPC: Fix _CPC register setting issue (git-fixes). * acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed with "suse_" to make it more obvious its a downstream thing. * add bugreference to a hv_netvsc patch (bsc#1232413). * add commit message for the kABI patch * alsa: 6fire: Release resources at card release (git-fixes). * alsa: ac97: bus: Fix the mistake in the comment (git-fixes). * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes). * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes). * alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes) * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528). * block: Avoid leaking hctx->nr_active counter on batched completion (bsc#1231923). * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: Wait for FLR to complete during probe (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * chtls: fix tp->rcv_tstamp initialization (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * drivers: net: prevent tun_build_skb() to exceed the packet size limit (git- fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: Fix skb truesize underestimation (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: core: zero-initialize the report buffer (git-fixes). * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * hid: multitouch: Add support for B2402FVA track point (stable-fixes). * hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * hid: wacom: fix when get product name maybe null pointer (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Fix filter input checks to prevent config with invalid values (git- fixes). * i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: Restore VF MSI-X state during PCI reset (git-fixes). * i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes). * i40e: take into account XDP Tx queues when stopping rings (git-fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * iavf: Fix promiscuous mode configuration flow messages (git-fixes). * iavf: Introduce new state machines for flow director (git-fixes). * iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git- fixes). * iavf: fix FDIR rule fields masks validation (git-fixes). * iavf: in iavf_down, disable queues when removing the driver (git-fixes). * iavf: initialize waitqueues before starting watchdog_task (git-fixes). * iavf: send VLAN offloading caps once after VFR (git-fixes). * iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git- fixes). * ibmvnic: Do partial reset on login failure (bsc#1233150). * ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150). * ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150). * ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150). * ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150). * ice: Block switchdev mode when ADQ is active and vice versa (git-fixes). * ice: Fix NULL pointer deref during VF reset (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix link_down_on_close message (git-fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Shut down VSI with "link-down-on-close" enabled (git-fixes). * ice: avoid executing commands on other ports when driving sync (git-fixes). * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix over-shifted variable (git-fixes). * ice: fix receive buffer size miscalculation (git-fixes). * ice: ice_aq_check_events: fix off-by-one check when filling buffer (git- fixes). * ice: reset first in crash dump kernels (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git- fixes). * idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: distinguish vports by the dev_port attribute (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Fix missing time sync events (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igc: Check VLAN EtherType mask (git-fixes). * igc: Check VLAN TCI mask (git-fixes). * igc: Fix hicredit calculation (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove temporary workaround (git-fixes). * igc: Report VLAN EtherType matching back to user (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes). * input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes). * input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes). * input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git- fixes). * input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * ixgbe: fix crash with empty VF macvlan list (git-fixes). * ixgbe: fix timestamp configuration code (git-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes) * kexec: fix a memory leak in crash_shrink_memory() (git-fixes). * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes). * media: dvb-usb-v2: af9035: fix missing unlock (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Allow 0 for total host VFs (git-fixes). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes). * net/mlx5: DR, Use the right GVMI number for drop action (git-fixes). * net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes). * net/mlx5: Drain health before unregistering devlink (git-fixes). * net/mlx5: E-switch, register event handler before arming the event (git- fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix fw tracer first block check (git-fixes). * net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes). * net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Skip clock update work when device is in error state (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes). * net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes). * net/mlx5: Use recovery timeout on sync reset flow (git-fixes). * net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes). * net/mlx5: fs, lock FTE when checking if active (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes). * net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Check return value of snprintf writing to fw_version buffer (git- fixes). * net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes). * net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git- fixes). * net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not offload internal port if filter device is out device (git- fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Fix pedit endianness (git-fixes). * net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes). * net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git- fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes). * net/mlx5e: Reduce the size of icosq_str (git-fixes). * net/mlx5e: Take state lock during tx timeout reporter (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes). * net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git- fixes). * net/mlx5e: fix double free of encap_header (git-fixes). * net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git- fixes). * net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * pci: Add T_PVPERL macro (git-fixes). * pci: Fix reset_method_store() memory leak (git-fixes). * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * pci: rockchip-ep: Fix address translation unit programming (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869). * qed: avoid truncating work queue length (git-fixes). * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * rdma/hns: Add clear_hem return value to log (git-fixes) * rdma/hns: Add mutex_destroy() (git-fixes) * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes) * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * rdma/hns: Remove unnecessary QP type checks (git-fixes) * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * rdma/hns: Use macro instead of magic number (git-fixes) * rdma/mlx5: Move events notifier registration to be after device registration (git-fixes) * rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * rdma/rxe: Fix the qp flush warnings in req (git-fixes) * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * sfc: Check firmware supports Ethernet PTP filter (git-fixes). * sfc: do not unregister flow_indr if it was never registered (git-fixes). * sfc: fix a double-free bug in efx_probe_filters (git-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes). * tun: prevent negative ifindex (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * usb: chaoskey: fail open after removal (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes). * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * usb: serial: option: add Quectel RG650V (stable-fixes). * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * vdpa/mlx5: preserve CVQ vringh index (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * x86/kvm: fix is_stale_page_fault() (bsc#1221333). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-4315=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4315=1 openSUSE-SLE-15.5-2024-4315=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4315=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4315=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1 ## Package List: * SUSE Real Time Module 15-SP5 (x86_64) * kernel-rt_debug-vdso-5.14.21-150500.13.79.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-debugsource-5.14.21-150500.13.79.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.79.1 * cluster-md-kmp-rt-5.14.21-150500.13.79.1 * kernel-rt_debug-devel-5.14.21-150500.13.79.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-vdso-5.14.21-150500.13.79.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1 * kernel-syms-rt-5.14.21-150500.13.79.1 * gfs2-kmp-rt-5.14.21-150500.13.79.1 * kernel-rt-devel-5.14.21-150500.13.79.1 * dlm-kmp-rt-5.14.21-150500.13.79.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1 * ocfs2-kmp-rt-5.14.21-150500.13.79.1 * SUSE Real Time Module 15-SP5 (noarch) * kernel-devel-rt-5.14.21-150500.13.79.1 * kernel-source-rt-5.14.21-150500.13.79.1 * SUSE Real Time Module 15-SP5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.79.1 * kernel-rt-5.14.21-150500.13.79.1 * openSUSE Leap 15.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.79.1 * kernel-source-rt-5.14.21-150500.13.79.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt-extra-5.14.21-150500.13.79.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-livepatch-5.14.21-150500.13.79.1 * kernel-rt_debug-vdso-5.14.21-150500.13.79.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-debuginfo-5.14.21-150500.13.79.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1 * kernel-rt-debugsource-5.14.21-150500.13.79.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.79.1 * kernel-rt-optional-5.14.21-150500.13.79.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1 * reiserfs-kmp-rt-5.14.21-150500.13.79.1 * cluster-md-kmp-rt-5.14.21-150500.13.79.1 * kernel-rt_debug-devel-5.14.21-150500.13.79.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-vdso-5.14.21-150500.13.79.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1 * gfs2-kmp-rt-5.14.21-150500.13.79.1 * kernel-syms-rt-5.14.21-150500.13.79.1 * kselftests-kmp-rt-5.14.21-150500.13.79.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-devel-5.14.21-150500.13.79.1 * dlm-kmp-rt-5.14.21-150500.13.79.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.79.1 * ocfs2-kmp-rt-5.14.21-150500.13.79.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.79.1 * kernel-rt-5.14.21-150500.13.79.1 * openSUSE Leap Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.79.1 * openSUSE Leap Micro 5.5 (x86_64) * kernel-rt-debugsource-5.14.21-150500.13.79.1 * kernel-rt-debuginfo-5.14.21-150500.13.79.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.79.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debugsource-5.14.21-150500.13.79.1 * kernel-rt-debuginfo-5.14.21-150500.13.79.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-source-rt-5.14.21-150500.13.79.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47594.html * https://www.suse.com/security/cve/CVE-2022-48674.html * https://www.suse.com/security/cve/CVE-2022-48979.html * https://www.suse.com/security/cve/CVE-2022-48982.html * https://www.suse.com/security/cve/CVE-2022-48983.html * https://www.suse.com/security/cve/CVE-2022-48989.html * https://www.suse.com/security/cve/CVE-2022-48990.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38615.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50259.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1221333 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1223919 * https://bugzilla.suse.com/show_bug.cgi?id=1223942 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1226560 * https://bugzilla.suse.com/show_bug.cgi?id=1226592 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231180 * https://bugzilla.suse.com/show_bug.cgi?id=1231181 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231646 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231923 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231959 * https://bugzilla.suse.com/show_bug.cgi?id=1231978 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232027 * https://bugzilla.suse.com/show_bug.cgi?id=1232028 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232293 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233134 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233150 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233214 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233528 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 13 16:36:57 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 13 Dec 2024 16:36:57 -0000 Subject: SUSE-SU-2024:4314-1: important: Security update for the Linux Kernel Message-ID: <173410781717.1470.5372212093330874524@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4314-1 Release Date: 2024-12-13T15:23:19Z Rating: important References: * bsc#1012628 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1218644 * bsc#1220355 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223656 * bsc#1223733 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224948 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226130 * bsc#1226748 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228430 * bsc#1228850 * bsc#1229165 * bsc#1230231 * bsc#1230557 * bsc#1230558 * bsc#1230733 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230971 * bsc#1231076 * bsc#1231114 * bsc#1231182 * bsc#1231453 * bsc#1231465 * bsc#1231630 * bsc#1231920 * bsc#1231930 * bsc#1231946 * bsc#1231952 * bsc#1232079 * bsc#1232096 * bsc#1232103 * bsc#1232104 * bsc#1232149 * bsc#1232157 * bsc#1232165 * bsc#1232166 * bsc#1232198 * bsc#1232199 * bsc#1232201 * bsc#1232207 * bsc#1232224 * bsc#1232258 * bsc#1232259 * bsc#1232264 * bsc#1232272 * bsc#1232305 * bsc#1232307 * bsc#1232318 * bsc#1232335 * bsc#1232337 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232361 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232371 * bsc#1232374 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232704 * bsc#1232757 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9943 Cross-References: * CVE-2023-52778 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38589 * CVE-2024-40914 * CVE-2024-41023 * CVE-2024-42102 * CVE-2024-44995 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46765 * CVE-2024-46788 * CVE-2024-46800 * CVE-2024-46828 * CVE-2024-46845 * CVE-2024-47666 * CVE-2024-47679 * CVE-2024-47701 * CVE-2024-47703 * CVE-2024-49852 * CVE-2024-49866 * CVE-2024-49868 * CVE-2024-49881 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49897 * CVE-2024-49899 * CVE-2024-49901 * CVE-2024-49905 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49952 * CVE-2024-49959 * CVE-2024-49968 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49983 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50026 * CVE-2024-50067 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Real Time Module 15-SP6 An update that solves 241 vulnerabilities, contains four features and has 43 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * Documentation: kgdb: Correct parameter error (git-fixes). * Drop OCFS2 patch causing a regression (bsc#1233255) * Move upstreamed crypto patches into sorted section * Move upstreamed patches into sorted section * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * acpi: CPPC: Fix _CPC register setting issue (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * add bugreference to a hv_netvsc patch (bsc#1232413). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * alsa: 6fire: Release resources at card release (git-fixes). * alsa: ac97: bus: Fix the mistake in the comment (git-fixes). * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * alsa: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * alsa: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * alsa: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * alsa: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * alsa: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * alsa: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * alsa: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * alsa: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes). * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * alsa: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * alsa: hda: Show the codec quirk info at probing (stable-fixes). * alsa: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * alsa: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * alsa: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * alsa: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * alsa: usb-audio: Fix a DMA to stack memory bug (git-fixes). * alsa: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * alsa: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * alsa: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * alsa: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * alsa: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * asoc: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * asoc: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * asoc: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * asoc: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * asoc: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * asoc: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * asoc: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * asoc: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * asoc: SOF: Wire up buffer flags (bsc#1233305). * asoc: SOF: add alignment for topology header file struct definition (bsc#1233305). * asoc: SOF: align topology header file with sof topology header (bsc#1233305). * asoc: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * asoc: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * asoc: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * asoc: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * asoc: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * asoc: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * asoc: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * asoc: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * asoc: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * asoc: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * asoc: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * asoc: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * asoc: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * asoc: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * asoc: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * asoc: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * asoc: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * asoc: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * asoc: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * asoc: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * asoc: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * asoc: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * asoc: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * asoc: fsl_micfil: Add sample rate constraint (stable-fixes). * asoc: fsl_micfil: fix regmap_write_bits usage (git-fixes). * asoc: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * asoc: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * asoc: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * asoc: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * asoc: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * asoc: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * hid: core: zero-initialize the report buffer (git-fixes). * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * hid: multitouch: Add support for B2402FVA track point (stable-fixes). * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * hid: wacom: fix when get product name maybe null pointer (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * input: xpad - add support for MSI Claw A1M (git-fixes). * input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * input: xpad - fix support for some third-party controllers (git-fixes). * input: xpad - sort xpad_device by vendor and product ID (git-fixes). * input: xpad - spelling fixes for "Xbox" (git-fixes). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: move checks to do_strncpy_from_user (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * kvm: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * kvm: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869). * kvm: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * kvm: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: remove revoked delegation from server's delegation list (git-fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * pci: Add T_PVPERL macro (git-fixes). * pci: Fix reset_method_store() memory leak (git-fixes). * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * pci: rockchip-ep: Fix address translation unit programming (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * rdma/hns: Add mutex_destroy() (git-fixes) * rdma/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes) * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * rdma/hns: Use macro instead of magic number (git-fixes) * rdma/mlx5: Move events notifier registration to be after device registration (git-fixes) * rdma/rxe: Fix the qp flush warnings in req (git-fixes) * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * rdma/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * sunrpc: Remove BUG_ON call sites (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Fix utf8_load() error path (git-fixes). * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * usb: chaoskey: fail open after removal (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes). * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * usb: serial: option: add Quectel RG650V (stable-fixes). * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * vsock: Update msg_count on read_skb() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4314=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4314=1 * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-4314=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * kernel-rt_debug-debugsource-6.4.0-150600.10.20.1 * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-vdso-6.4.0-150600.10.20.1 * kernel-rt-devel-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-6.4.0-150600.10.20.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-6.4.0-150600.10.20.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * ocfs2-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-debugsource-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1 * reiserfs-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1 * dlm-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-optional-6.4.0-150600.10.20.1 * kernel-rt-extra-6.4.0-150600.10.20.1 * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-extra-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-vdso-6.4.0-150600.10.20.1 * kernel-rt-vdso-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-optional-debuginfo-6.4.0-150600.10.20.1 * kernel-syms-rt-6.4.0-150600.10.20.1 * kernel-rt-debuginfo-6.4.0-150600.10.20.1 * kselftests-kmp-rt-6.4.0-150600.10.20.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * gfs2-kmp-rt-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-livepatch-devel-6.4.0-150600.10.20.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-rt-6.4.0-150600.10.20.1 * kernel-source-rt-6.4.0-150600.10.20.1 * openSUSE Leap 15.6 (nosrc x86_64) * kernel-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-6.4.0-150600.10.20.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-1-150600.1.3.1 * kernel-livepatch-6_4_0-150600_10_20-rt-1-150600.1.3.1 * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-1-150600.1.3.1 * SUSE Real Time Module 15-SP6 (x86_64) * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.20.1 * ocfs2-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-debugsource-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1 * gfs2-kmp-rt-6.4.0-150600.10.20.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * cluster-md-kmp-rt-6.4.0-150600.10.20.1 * dlm-kmp-rt-6.4.0-150600.10.20.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1 * kernel-rt-devel-6.4.0-150600.10.20.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1 * kernel-syms-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-devel-6.4.0-150600.10.20.1 * kernel-rt-debuginfo-6.4.0-150600.10.20.1 * SUSE Real Time Module 15-SP6 (noarch) * kernel-devel-rt-6.4.0-150600.10.20.1 * kernel-source-rt-6.4.0-150600.10.20.1 * SUSE Real Time Module 15-SP6 (nosrc x86_64) * kernel-rt-6.4.0-150600.10.20.1 * kernel-rt_debug-6.4.0-150600.10.20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 13 16:44:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 13 Dec 2024 16:44:07 -0000 Subject: SUSE-SU-2024:4318-1: important: Security update for the Linux Kernel Message-ID: <173410824777.1470.3277309468845162357@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4318-1 Release Date: 2024-12-13T15:34:03Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220355 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230557 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232157 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232166 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9899 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46765 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves 506 vulnerabilities, contains eight features and has 101 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2023-6270: aoe: fix the potential use-after-free problem in more places (bsc#1218562). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46828: sched: sch_cake: fix bulk flow accounting logic for host fairness (bsc#1231114). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49908: drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (bsc#1232335). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown" (bsc#1228269). * Revert "ALSA: hda: Conditionally use snooping for AMD HDMI" (stable-fixes). * Revert "KEYS: encrypted: Add check for strsep" (git-fixes). * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "driver core: Fix uevent_show() vs driver detach race" (git-fixes). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path" (git-fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Revert "wifi: iwlwifi: remove retry loops in start" (git-fixes). * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config: Disable LAM on x86 (bsc#1217845). * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: enable NFSv2 caused by upstream commit (bsc#1230914). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation (bsc#1218644). * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035). * supported.conf: mark ultravisor userspace access as supported (bsc#1232090). * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4318=1 openSUSE-SLE-15.6-2024-4318=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4318=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4318=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4318=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4318=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4318=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-4318=1 ## Package List: * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (noarch) * kernel-macros-6.4.0-150600.23.30.1 * kernel-devel-6.4.0-150600.23.30.1 * kernel-docs-html-6.4.0-150600.23.30.1 * kernel-source-vanilla-6.4.0-150600.23.30.1 * kernel-source-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-debugsource-6.4.0-150600.23.30.1 * kernel-debug-devel-debuginfo-6.4.0-150600.23.30.1 * kernel-debug-devel-6.4.0-150600.23.30.1 * kernel-debug-debuginfo-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (x86_64) * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.30.1 * kernel-default-vdso-debuginfo-6.4.0-150600.23.30.1 * kernel-kvmsmall-vdso-6.4.0-150600.23.30.1 * kernel-debug-vdso-6.4.0-150600.23.30.1 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.30.1 * kernel-default-vdso-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-default-base-rebuild-6.4.0-150600.23.30.1.150600.12.12.6 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.30.1 * kernel-default-base-6.4.0-150600.23.30.1.150600.12.12.6 * kernel-kvmsmall-debugsource-6.4.0-150600.23.30.1 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.30.1 * kernel-kvmsmall-devel-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150600.23.30.1 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.30.1 * cluster-md-kmp-default-6.4.0-150600.23.30.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.30.1 * kernel-obs-build-6.4.0-150600.23.30.1 * kernel-obs-build-debugsource-6.4.0-150600.23.30.1 * kselftests-kmp-default-6.4.0-150600.23.30.1 * kernel-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-optional-debuginfo-6.4.0-150600.23.30.1 * kernel-syms-6.4.0-150600.23.30.1 * kernel-default-extra-6.4.0-150600.23.30.1 * kernel-obs-qa-6.4.0-150600.23.30.1 * kernel-default-debugsource-6.4.0-150600.23.30.1 * kernel-default-devel-6.4.0-150600.23.30.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.30.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-livepatch-6.4.0-150600.23.30.1 * kernel-default-optional-6.4.0-150600.23.30.1 * ocfs2-kmp-default-6.4.0-150600.23.30.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.30.1 * gfs2-kmp-default-6.4.0-150600.23.30.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.30.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1 * dlm-kmp-default-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-1-150600.13.3.5 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-1-150600.13.3.5 * kernel-default-livepatch-devel-6.4.0-150600.23.30.1 * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-1-150600.13.3.5 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.30.1 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (aarch64) * dtb-amazon-6.4.0-150600.23.30.1 * dtb-allwinner-6.4.0-150600.23.30.1 * dtb-arm-6.4.0-150600.23.30.1 * kernel-64kb-extra-6.4.0-150600.23.30.1 * kernel-64kb-optional-6.4.0-150600.23.30.1 * dtb-cavium-6.4.0-150600.23.30.1 * dtb-apm-6.4.0-150600.23.30.1 * dtb-freescale-6.4.0-150600.23.30.1 * reiserfs-kmp-64kb-6.4.0-150600.23.30.1 * cluster-md-kmp-64kb-6.4.0-150600.23.30.1 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.30.1 * dtb-mediatek-6.4.0-150600.23.30.1 * dtb-broadcom-6.4.0-150600.23.30.1 * kernel-64kb-devel-6.4.0-150600.23.30.1 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.30.1 * dtb-apple-6.4.0-150600.23.30.1 * dlm-kmp-64kb-6.4.0-150600.23.30.1 * dtb-amd-6.4.0-150600.23.30.1 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.30.1 * dtb-sprd-6.4.0-150600.23.30.1 * dtb-hisilicon-6.4.0-150600.23.30.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.30.1 * kernel-64kb-debuginfo-6.4.0-150600.23.30.1 * kernel-64kb-debugsource-6.4.0-150600.23.30.1 * dtb-altera-6.4.0-150600.23.30.1 * dtb-nvidia-6.4.0-150600.23.30.1 * gfs2-kmp-64kb-6.4.0-150600.23.30.1 * kselftests-kmp-64kb-6.4.0-150600.23.30.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.30.1 * dtb-socionext-6.4.0-150600.23.30.1 * dtb-amlogic-6.4.0-150600.23.30.1 * dtb-lg-6.4.0-150600.23.30.1 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.30.1 * dtb-rockchip-6.4.0-150600.23.30.1 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.30.1 * dtb-renesas-6.4.0-150600.23.30.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.30.1 * dtb-exynos-6.4.0-150600.23.30.1 * dtb-xilinx-6.4.0-150600.23.30.1 * dtb-qcom-6.4.0-150600.23.30.1 * dtb-marvell-6.4.0-150600.23.30.1 * ocfs2-kmp-64kb-6.4.0-150600.23.30.1 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.30.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-debuginfo-6.4.0-150600.23.30.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.30.1 * kernel-64kb-devel-6.4.0-150600.23.30.1 * kernel-64kb-debugsource-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.30.1.150600.12.12.6 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.4.0-150600.23.30.1 * kernel-default-debugsource-6.4.0-150600.23.30.1 * kernel-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (noarch) * kernel-devel-6.4.0-150600.23.30.1 * kernel-macros-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.30.1 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.30.1 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.30.1 * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.30.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.4.0-150600.23.30.1 * kernel-obs-build-debugsource-6.4.0-150600.23.30.1 * kernel-syms-6.4.0-150600.23.30.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.30.1 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.30.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150600.23.30.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-debugsource-6.4.0-150600.23.30.1 * kernel-default-debuginfo-6.4.0-150600.23.30.1 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.30.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-default-livepatch-6.4.0-150600.23.30.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-1-150600.13.3.5 * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-1-150600.13.3.5 * kernel-default-debuginfo-6.4.0-150600.23.30.1 * kernel-livepatch-6_4_0-150600_23_30-default-1-150600.13.3.5 * kernel-default-debugsource-6.4.0-150600.23.30.1 * kernel-default-livepatch-devel-6.4.0-150600.23.30.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-6.4.0-150600.23.30.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.30.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.30.1 * ocfs2-kmp-default-6.4.0-150600.23.30.1 * gfs2-kmp-default-6.4.0-150600.23.30.1 * kernel-default-debuginfo-6.4.0-150600.23.30.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-debugsource-6.4.0-150600.23.30.1 * dlm-kmp-default-6.4.0-150600.23.30.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.30.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.30.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-extra-6.4.0-150600.23.30.1 * kernel-default-debugsource-6.4.0-150600.23.30.1 * kernel-default-debuginfo-6.4.0-150600.23.30.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.30.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9899 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 13 16:44:34 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 13 Dec 2024 16:44:34 -0000 Subject: SUSE-SU-2024:4317-1: important: Security update for the Linux Kernel Message-ID: <173410827425.1470.7879349968205854087@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4317-1 Release Date: 2024-12-13T15:32:18Z Rating: important References: * bsc#1154353 * bsc#1198778 * bsc#1218644 * bsc#1220927 * bsc#1231939 * bsc#1231940 * bsc#1231958 * bsc#1231962 * bsc#1231991 * bsc#1231992 * bsc#1231995 * bsc#1232006 * bsc#1232163 * bsc#1232172 * bsc#1232224 * bsc#1232436 * bsc#1232860 * bsc#1232907 * bsc#1232919 * bsc#1232928 * bsc#1233070 * bsc#1233117 * bsc#1233293 * bsc#1233453 * bsc#1233456 * bsc#1233468 * bsc#1233479 * bsc#1233490 * bsc#1233491 * bsc#1233555 * bsc#1233557 * jsc#SLE-8100 Cross-References: * CVE-2022-48985 * CVE-2022-49006 * CVE-2022-49010 * CVE-2022-49011 * CVE-2022-49019 * CVE-2022-49021 * CVE-2022-49022 * CVE-2022-49029 * CVE-2022-49031 * CVE-2022-49032 * CVE-2023-52524 * CVE-2024-49925 * CVE-2024-50089 * CVE-2024-50115 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50154 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50264 * CVE-2024-50267 * CVE-2024-50279 * CVE-2024-50290 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53061 * CVE-2024-53063 CVSS scores: * CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49006 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49010 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 27 vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52524: net: nfc: llcp: Add lock when modifying device list (bsc#1220927). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224). * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490). * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). The following non-security bugs were fixed: * e1000e: Correct NVM checksum verification flow (jsc#SLE-8100). * e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100). * ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198778). * ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1198778). * initramfs: avoid filename buffer overrun (bsc#1232436). * kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644). * net: ena: Add capabilities field with support for ENI stats capability (bsc#1198778). * net: ena: Add debug prints for invalid req_id resets (bsc#1198778). * net: ena: Change ENI stats support check to use capabilities field (bsc#1198778). * net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1198778). * net: ena: Change the name of bad_csum variable (bsc#1198778). * net: ena: Extract recurring driver reset code into a function (bsc#1198778). * net: ena: Flush XDP packets on error (bsc#1198778). * net: ena: Improve error logging in driver (bsc#1198778). * net: ena: Move reset completion print to the reset function (bsc#1198778). * net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198778). * net: ena: Remove module param and change message severity (bsc#1198778). * net: ena: Remove redundant return code check (bsc#1198778). * net: ena: Remove unused code (bsc#1198778). * net: ena: Set tx_info->xdpf value to NULL (bsc#1198778). * net: ena: Update XDP verdict upon failure (bsc#1198778). * net: ena: Use bitmask to indicate packet redirection (bsc#1198778). * net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198778). * net: ena: add device distinct log prefix to files (bsc#1198778). * net: ena: add jiffies of last napi call to stats (bsc#1198778). * net: ena: aggregate doorbell common operations into a function (bsc#1198778). * net: ena: aggregate stats increase into a function (bsc#1198778). * net: ena: fix DMA mapping function issues in XDP (bsc#1198778). * net: ena: fix coding style nits (bsc#1198778). * net: ena: fix inaccurate print type (bsc#1198778). * net: ena: introduce XDP redirect implementation (bsc#1198778). * net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198778). * net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198778). * net: ena: re-organize code to improve readability (bsc#1198778). * net: ena: remove extra words from comments (bsc#1198778). * net: ena: store values in their appropriate variables types (bsc#1198778). * net: ena: use build_skb() in RX path (bsc#1198778). * net: ena: use constant value for net_device allocation (bsc#1198778). * net: ena: use xdp_frame in XDP TX flow (bsc#1198778). * net: ena: use xdp_return_frame() to free xdp frames (bsc#1198778). * tools headers: Grab copy of linux/const.h, needed by linux/bits.h (bsc#1154353). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4317=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4317=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4317=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debugsource-5.3.18-150300.194.1 * kernel-rt-debuginfo-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * kernel-source-rt-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.194.1 * kernel-rt-debuginfo-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.194.1 * kernel-rt-debuginfo-5.3.18-150300.194.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.194.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48985.html * https://www.suse.com/security/cve/CVE-2022-49006.html * https://www.suse.com/security/cve/CVE-2022-49010.html * https://www.suse.com/security/cve/CVE-2022-49011.html * https://www.suse.com/security/cve/CVE-2022-49019.html * https://www.suse.com/security/cve/CVE-2022-49021.html * https://www.suse.com/security/cve/CVE-2022-49022.html * https://www.suse.com/security/cve/CVE-2022-49029.html * https://www.suse.com/security/cve/CVE-2022-49031.html * https://www.suse.com/security/cve/CVE-2022-49032.html * https://www.suse.com/security/cve/CVE-2023-52524.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1198778 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220927 * https://bugzilla.suse.com/show_bug.cgi?id=1231939 * https://bugzilla.suse.com/show_bug.cgi?id=1231940 * https://bugzilla.suse.com/show_bug.cgi?id=1231958 * https://bugzilla.suse.com/show_bug.cgi?id=1231962 * https://bugzilla.suse.com/show_bug.cgi?id=1231991 * https://bugzilla.suse.com/show_bug.cgi?id=1231992 * https://bugzilla.suse.com/show_bug.cgi?id=1231995 * https://bugzilla.suse.com/show_bug.cgi?id=1232006 * https://bugzilla.suse.com/show_bug.cgi?id=1232163 * https://bugzilla.suse.com/show_bug.cgi?id=1232172 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://jira.suse.com/browse/SLE-8100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 13 16:47:47 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 13 Dec 2024 16:47:47 -0000 Subject: SUSE-SU-2024:4316-1: important: Security update for the Linux Kernel Message-ID: <173410846791.1470.2744565556436540637@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4316-1 Release Date: 2024-12-13T15:24:05Z Rating: important References: * bsc#1012628 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1218644 * bsc#1220355 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223656 * bsc#1223733 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224948 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226130 * bsc#1226748 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228430 * bsc#1228850 * bsc#1229165 * bsc#1230231 * bsc#1230557 * bsc#1230558 * bsc#1230733 * bsc#1230807 * bsc#1230817 * bsc#1230827 * bsc#1230971 * bsc#1231076 * bsc#1231114 * bsc#1231182 * bsc#1231453 * bsc#1231465 * bsc#1231630 * bsc#1231920 * bsc#1231930 * bsc#1231946 * bsc#1231952 * bsc#1232096 * bsc#1232103 * bsc#1232104 * bsc#1232157 * bsc#1232165 * bsc#1232166 * bsc#1232198 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232224 * bsc#1232258 * bsc#1232264 * bsc#1232272 * bsc#1232318 * bsc#1232335 * bsc#1232357 * bsc#1232358 * bsc#1232361 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232371 * bsc#1232374 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232704 * bsc#1232757 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233201 * bsc#1233203 * bsc#1233204 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233485 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233523 * bsc#1233524 * bsc#1233540 * bsc#1233547 * bsc#1233548 * bsc#1233550 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233568 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233642 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234078 * bsc#1234081 * bsc#1234083 * bsc#1234085 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * bsc#1234223 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-9943 Cross-References: * CVE-2023-52778 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2024-26596 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38589 * CVE-2024-40914 * CVE-2024-41023 * CVE-2024-42102 * CVE-2024-44995 * CVE-2024-46680 * CVE-2024-46681 * CVE-2024-46765 * CVE-2024-46788 * CVE-2024-46800 * CVE-2024-46828 * CVE-2024-46845 * CVE-2024-47666 * CVE-2024-47679 * CVE-2024-47701 * CVE-2024-47703 * CVE-2024-49868 * CVE-2024-49884 * CVE-2024-49888 * CVE-2024-49899 * CVE-2024-49905 * CVE-2024-49908 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49944 * CVE-2024-49945 * CVE-2024-49952 * CVE-2024-49968 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49983 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50014 * CVE-2024-50026 * CVE-2024-50067 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50228 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50252 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50296 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53043 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53051 * CVE-2024-53052 * CVE-2024-53055 * CVE-2024-53056 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53095 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53110 * CVE-2024-53112 * CVE-2024-53114 * CVE-2024-53121 * CVE-2024-53138 CVSS scores: * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50252 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 228 vulnerabilities, contains four features and has 44 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non- DSA netdevice events (bsc#1220355). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547). * CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550). * CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). * CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). * CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078). * CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223). The following non-security bugs were fixed: * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable- fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable- fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557) * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Documentation: kgdb: Correct parameter error (git-fixes). * Drop OCFS2 patch causing a regression (bsc#1233255) * HID: core: zero-initialize the report buffer (git-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * HID: wacom: fix when get product name maybe null pointer (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * Move kabi netfilter fix into patches.kabi * Move upstreamed crypto patches into sorted section * Move upstreamed patches into sorted section * NFS: remove revoked delegation from server's delegation list (git-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1" (bsc#1215199). * Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes) * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable- fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * Update config files (bsc#1218644). * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * add bugreference to a hv_netvsc patch (bsc#1232413). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git- fixes) * arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git- fixes) * arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes) * arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes) * arm64: dts: imx93: add nvmem property for eqos (git-fixes) * arm64: dts: imx93: add nvmem property for fec1 (git-fixes) * arm64: dts: imx93: add ocotp node (git-fixes) * arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes) * arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes) * arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git- fixes) * arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes) * arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git- fixes) * arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes) * arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git- fixes) * arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes) * arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes) * arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes) * arm64: dts: rockchip: remove num-slots property from (git-fixes) * arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git- fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tegra: Move AGX Orin nodes to correct location (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes) * bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes) * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes). * can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dma-fence: Fix reference leak on fence merge failure path (git-fixes). * dma-fence: Use kernel's sort for merging fences (git-fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Enable Performance Counters before clearing them (git-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * kABI workaround for ASoC SOF (bsc#1233305). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: move checks to do_strncpy_from_user (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: core: Further prevent card detect during shutdown (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: copy addresses for both in and out paths (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199). * powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199). * powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * regmap: detach regmap from dev on regmap_exit (git-fixes). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Fix utf8_load() error path (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * vsock: Update msg_count on read_skb() (git-fixes). * watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4316=1 openSUSE-SLE-15.6-2024-4316=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4316=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.20.1 * gfs2-kmp-azure-6.4.0-150600.8.20.1 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.20.1 * kernel-azure-extra-debuginfo-6.4.0-150600.8.20.1 * kernel-azure-debuginfo-6.4.0-150600.8.20.1 * kselftests-kmp-azure-6.4.0-150600.8.20.1 * kernel-syms-azure-6.4.0-150600.8.20.1 * kernel-azure-optional-6.4.0-150600.8.20.1 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1 * ocfs2-kmp-azure-6.4.0-150600.8.20.1 * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1 * kernel-azure-devel-6.4.0-150600.8.20.1 * kernel-azure-optional-debuginfo-6.4.0-150600.8.20.1 * reiserfs-kmp-azure-6.4.0-150600.8.20.1 * cluster-md-kmp-azure-6.4.0-150600.8.20.1 * kernel-azure-debugsource-6.4.0-150600.8.20.1 * dlm-kmp-azure-6.4.0-150600.8.20.1 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.20.1 * kernel-azure-extra-6.4.0-150600.8.20.1 * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.20.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.20.1 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-6.4.0-150600.8.20.1 * kernel-azure-vdso-debuginfo-6.4.0-150600.8.20.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-azure-6.4.0-150600.8.20.1 * kernel-source-azure-6.4.0-150600.8.20.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-syms-azure-6.4.0-150600.8.20.1 * kernel-azure-devel-6.4.0-150600.8.20.1 * kernel-azure-debugsource-6.4.0-150600.8.20.1 * kernel-azure-debuginfo-6.4.0-150600.8.20.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.20.1 * Public Cloud Module 15-SP6 (noarch) * kernel-devel-azure-6.4.0-150600.8.20.1 * kernel-source-azure-6.4.0-150600.8.20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26596.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-46680.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46765.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49944.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50228.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50252.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53043.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53051.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53055.html * https://www.suse.com/security/cve/CVE-2024-53056.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53095.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53121.html * https://www.suse.com/security/cve/CVE-2024-53138.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220355 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230807 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232166 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233201 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233204 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233523 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233547 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233550 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233568 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233642 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234078 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://bugzilla.suse.com/show_bug.cgi?id=1234223 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 13 16:49:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 13 Dec 2024 16:49:13 -0000 Subject: SUSE-SU-2024:4313-1: important: Security update for the Linux Kernel Message-ID: <173410855302.1470.5311976259290779747@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4313-1 Release Date: 2024-12-13T15:20:18Z Rating: important References: * bsc#1154353 * bsc#1198778 * bsc#1218644 * bsc#1220927 * bsc#1231939 * bsc#1231940 * bsc#1231958 * bsc#1231962 * bsc#1231991 * bsc#1231992 * bsc#1231995 * bsc#1232006 * bsc#1232163 * bsc#1232172 * bsc#1232224 * bsc#1232436 * bsc#1232860 * bsc#1232907 * bsc#1232919 * bsc#1232928 * bsc#1233070 * bsc#1233117 * bsc#1233293 * bsc#1233453 * bsc#1233456 * bsc#1233468 * bsc#1233479 * bsc#1233490 * bsc#1233491 * bsc#1233555 * bsc#1233557 * jsc#SLE-8100 Cross-References: * CVE-2022-48985 * CVE-2022-49006 * CVE-2022-49010 * CVE-2022-49011 * CVE-2022-49019 * CVE-2022-49021 * CVE-2022-49022 * CVE-2022-49029 * CVE-2022-49031 * CVE-2022-49032 * CVE-2023-52524 * CVE-2024-49925 * CVE-2024-50089 * CVE-2024-50115 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50154 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50264 * CVE-2024-50267 * CVE-2024-50279 * CVE-2024-50290 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53061 * CVE-2024-53063 CVSS scores: * CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49006 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49010 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 27 vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070) * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490). * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). The following non-security bugs were fixed: * Update config files (bsc#1218644). * e1000e: Correct NVM checksum verification flow (jsc#SLE-8100). * e1000e: Correct NVM checksum verification flow (jsc#SLE-8100). * e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100). * e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100). * ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198778). * ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1198778). * initramfs: avoid filename buffer overrun (bsc#1232436). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * net: ena: Add capabilities field with support for ENI stats capability (bsc#1198778). * net: ena: Add debug prints for invalid req_id resets (bsc#1198778). * net: ena: Change ENI stats support check to use capabilities field (bsc#1198778). * net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1198778). * net: ena: Change the name of bad_csum variable (bsc#1198778). * net: ena: Extract recurring driver reset code into a function (bsc#1198778). * net: ena: Flush XDP packets on error (bsc#1198778). * net: ena: Improve error logging in driver (bsc#1198778). * net: ena: Move reset completion print to the reset function (bsc#1198778). * net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198778). * net: ena: Remove module param and change message severity (bsc#1198778). * net: ena: Remove redundant return code check (bsc#1198778). * net: ena: Remove unused code (bsc#1198778). * net: ena: Set tx_info->xdpf value to NULL (bsc#1198778). * net: ena: Update XDP verdict upon failure (bsc#1198778). * net: ena: Use bitmask to indicate packet redirection (bsc#1198778). * net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198778). * net: ena: add device distinct log prefix to files (bsc#1198778). * net: ena: add jiffies of last napi call to stats (bsc#1198778). * net: ena: aggregate doorbell common operations into a function (bsc#1198778). * net: ena: aggregate stats increase into a function (bsc#1198778). * net: ena: fix DMA mapping function issues in XDP (bsc#1198778). * net: ena: fix coding style nits (bsc#1198778). * net: ena: fix inaccurate print type (bsc#1198778). * net: ena: introduce XDP redirect implementation (bsc#1198778). * net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198778). * net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198778). * net: ena: re-organize code to improve readability (bsc#1198778). * net: ena: remove extra words from comments (bsc#1198778). * net: ena: store values in their appropriate variables types (bsc#1198778). * net: ena: use build_skb() in RX path (bsc#1198778). * net: ena: use constant value for net_device allocation (bsc#1198778). * net: ena: use xdp_frame in XDP TX flow (bsc#1198778). * net: ena: use xdp_return_frame() to free xdp frames (bsc#1198778). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * tools headers: Grab copy of linux/const.h, needed by linux/bits.h (bsc#1154353). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4313=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4313=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4313=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4313=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4313=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4313=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4313=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4313=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (noarch) * kernel-docs-html-5.3.18-150300.59.185.1 * kernel-source-vanilla-5.3.18-150300.59.185.1 * kernel-source-5.3.18-150300.59.185.1 * kernel-devel-5.3.18-150300.59.185.1 * kernel-macros-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.185.1 * kernel-debug-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-debug-debuginfo-5.3.18-150300.59.185.1 * kernel-debug-debugsource-5.3.18-150300.59.185.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.185.1 * kernel-debug-devel-5.3.18-150300.59.185.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.185.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-kvmsmall-devel-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.185.1 * kernel-default-base-rebuild-5.3.18-150300.59.185.1.150300.18.109.1 * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * cluster-md-kmp-default-5.3.18-150300.59.185.1 * ocfs2-kmp-default-5.3.18-150300.59.185.1 * kernel-obs-build-5.3.18-150300.59.185.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-devel-5.3.18-150300.59.185.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.185.1 * gfs2-kmp-default-5.3.18-150300.59.185.1 * kernel-default-livepatch-5.3.18-150300.59.185.1 * kernel-default-extra-5.3.18-150300.59.185.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-obs-qa-5.3.18-150300.59.185.1 * dlm-kmp-default-5.3.18-150300.59.185.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.185.1 * reiserfs-kmp-default-5.3.18-150300.59.185.1 * kernel-obs-build-debugsource-5.3.18-150300.59.185.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kselftests-kmp-default-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-optional-5.3.18-150300.59.185.1 * kernel-syms-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-1-150300.7.3.1 * kernel-default-livepatch-devel-5.3.18-150300.59.185.1 * kernel-livepatch-SLE15-SP3_Update_51-debugsource-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_185-preempt-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * kselftests-kmp-preempt-5.3.18-150300.59.185.1 * kernel-preempt-optional-5.3.18-150300.59.185.1 * kernel-preempt-debugsource-5.3.18-150300.59.185.1 * reiserfs-kmp-preempt-5.3.18-150300.59.185.1 * ocfs2-kmp-preempt-5.3.18-150300.59.185.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1 * cluster-md-kmp-preempt-5.3.18-150300.59.185.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.185.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.185.1 * gfs2-kmp-preempt-5.3.18-150300.59.185.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-5.3.18-150300.59.185.1 * dlm-kmp-preempt-5.3.18-150300.59.185.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-extra-5.3.18-150300.59.185.1 * kernel-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.185.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.185.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (aarch64) * dtb-xilinx-5.3.18-150300.59.185.1 * dtb-altera-5.3.18-150300.59.185.1 * dtb-zte-5.3.18-150300.59.185.1 * dtb-sprd-5.3.18-150300.59.185.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-extra-5.3.18-150300.59.185.1 * dtb-al-5.3.18-150300.59.185.1 * dtb-broadcom-5.3.18-150300.59.185.1 * kernel-64kb-optional-5.3.18-150300.59.185.1 * dtb-apm-5.3.18-150300.59.185.1 * dtb-exynos-5.3.18-150300.59.185.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.185.1 * ocfs2-kmp-64kb-5.3.18-150300.59.185.1 * reiserfs-kmp-64kb-5.3.18-150300.59.185.1 * dtb-rockchip-5.3.18-150300.59.185.1 * kselftests-kmp-64kb-5.3.18-150300.59.185.1 * dtb-marvell-5.3.18-150300.59.185.1 * gfs2-kmp-64kb-5.3.18-150300.59.185.1 * dtb-freescale-5.3.18-150300.59.185.1 * dtb-amlogic-5.3.18-150300.59.185.1 * kernel-64kb-debugsource-5.3.18-150300.59.185.1 * dtb-nvidia-5.3.18-150300.59.185.1 * dtb-hisilicon-5.3.18-150300.59.185.1 * dtb-amd-5.3.18-150300.59.185.1 * dtb-qcom-5.3.18-150300.59.185.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.185.1 * dtb-renesas-5.3.18-150300.59.185.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.185.1 * dtb-lg-5.3.18-150300.59.185.1 * dlm-kmp-64kb-5.3.18-150300.59.185.1 * kernel-64kb-devel-5.3.18-150300.59.185.1 * dtb-mediatek-5.3.18-150300.59.185.1 * dtb-socionext-5.3.18-150300.59.185.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.185.1 * dtb-allwinner-5.3.18-150300.59.185.1 * dtb-cavium-5.3.18-150300.59.185.1 * cluster-md-kmp-64kb-5.3.18-150300.59.185.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.185.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1 * dtb-arm-5.3.18-150300.59.185.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-default-livepatch-devel-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-livepatch-5.3.18-150300.59.185.1 * kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debugsource-5.3.18-150300.59.185.1 * ocfs2-kmp-default-5.3.18-150300.59.185.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1 * dlm-kmp-default-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * gfs2-kmp-default-5.3.18-150300.59.185.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1 * cluster-md-kmp-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-debugsource-5.3.18-150300.59.185.1 * kernel-64kb-devel-5.3.18-150300.59.185.1 * kernel-64kb-debuginfo-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.185.1 * kernel-preempt-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-obs-build-5.3.18-150300.59.185.1 * kernel-preempt-debugsource-5.3.18-150300.59.185.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * reiserfs-kmp-default-5.3.18-150300.59.185.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-devel-5.3.18-150300.59.185.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-5.3.18-150300.59.185.1 * kernel-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-syms-5.3.18-150300.59.185.1 * kernel-obs-build-debugsource-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-macros-5.3.18-150300.59.185.1 * kernel-source-5.3.18-150300.59.185.1 * kernel-devel-5.3.18-150300.59.185.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-debugsource-5.3.18-150300.59.185.1 * kernel-64kb-devel-5.3.18-150300.59.185.1 * kernel-64kb-debuginfo-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-obs-build-5.3.18-150300.59.185.1 * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * reiserfs-kmp-default-5.3.18-150300.59.185.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-devel-5.3.18-150300.59.185.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-syms-5.3.18-150300.59.185.1 * kernel-obs-build-debugsource-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * kernel-macros-5.3.18-150300.59.185.1 * kernel-source-5.3.18-150300.59.185.1 * kernel-devel-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc) * kernel-docs-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-5.3.18-150300.59.185.1 * kernel-preempt-debugsource-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-obs-build-5.3.18-150300.59.185.1 * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * reiserfs-kmp-default-5.3.18-150300.59.185.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-devel-5.3.18-150300.59.185.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-syms-5.3.18-150300.59.185.1 * kernel-obs-build-debugsource-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-macros-5.3.18-150300.59.185.1 * kernel-source-5.3.18-150300.59.185.1 * kernel-devel-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-5.3.18-150300.59.185.1 * kernel-preempt-debugsource-5.3.18-150300.59.185.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.185.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-64kb-debugsource-5.3.18-150300.59.185.1 * kernel-64kb-devel-5.3.18-150300.59.185.1 * kernel-64kb-debuginfo-5.3.18-150300.59.185.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.185.1 * kernel-preempt-5.3.18-150300.59.185.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-obs-build-5.3.18-150300.59.185.1 * kernel-preempt-debugsource-5.3.18-150300.59.185.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * reiserfs-kmp-default-5.3.18-150300.59.185.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-devel-5.3.18-150300.59.185.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-preempt-devel-5.3.18-150300.59.185.1 * kernel-preempt-debuginfo-5.3.18-150300.59.185.1 * kernel-syms-5.3.18-150300.59.185.1 * kernel-obs-build-debugsource-5.3.18-150300.59.185.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-macros-5.3.18-150300.59.185.1 * kernel-source-5.3.18-150300.59.185.1 * kernel-devel-5.3.18-150300.59.185.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * kernel-default-debugsource-5.3.18-150300.59.185.1 * kernel-default-debuginfo-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debugsource-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.185.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.185.1 * kernel-default-debugsource-5.3.18-150300.59.185.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48985.html * https://www.suse.com/security/cve/CVE-2022-49006.html * https://www.suse.com/security/cve/CVE-2022-49010.html * https://www.suse.com/security/cve/CVE-2022-49011.html * https://www.suse.com/security/cve/CVE-2022-49019.html * https://www.suse.com/security/cve/CVE-2022-49021.html * https://www.suse.com/security/cve/CVE-2022-49022.html * https://www.suse.com/security/cve/CVE-2022-49029.html * https://www.suse.com/security/cve/CVE-2022-49031.html * https://www.suse.com/security/cve/CVE-2022-49032.html * https://www.suse.com/security/cve/CVE-2023-52524.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1198778 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220927 * https://bugzilla.suse.com/show_bug.cgi?id=1231939 * https://bugzilla.suse.com/show_bug.cgi?id=1231940 * https://bugzilla.suse.com/show_bug.cgi?id=1231958 * https://bugzilla.suse.com/show_bug.cgi?id=1231962 * https://bugzilla.suse.com/show_bug.cgi?id=1231991 * https://bugzilla.suse.com/show_bug.cgi?id=1231992 * https://bugzilla.suse.com/show_bug.cgi?id=1231995 * https://bugzilla.suse.com/show_bug.cgi?id=1232006 * https://bugzilla.suse.com/show_bug.cgi?id=1232163 * https://bugzilla.suse.com/show_bug.cgi?id=1232172 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://jira.suse.com/browse/SLE-8100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 08:30:25 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 08:30:25 -0000 Subject: SUSE-SU-2024:4319-1: important: Security update for docker Message-ID: <173433782539.13579.2641569339897671009@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2024:4319-1 Release Date: 2024-12-13T20:16:51Z Rating: important References: * bsc#1217070 * bsc#1228324 * bsc#1228553 * bsc#1229806 * bsc#1230294 * bsc#1230331 * bsc#1230333 * bsc#1231348 * bsc#1232999 * bsc#1233819 Cross-References: * CVE-2023-45142 * CVE-2023-47108 * CVE-2024-41110 CVSS scores: * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities and has seven security fixes can now be installed. ## Description: This update for docker fixes the following issues: * Update docker-buildx to v0.19.2. See upstream changelog online at . Some notable changelogs from the last update: * * * Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * Disable docker-buildx builds for SLES. It turns out that build containers with docker-buildx don't currently get the SUSE secrets mounts applied, meaning that container-suseconnect doesn't work when building images. bsc#1233819 * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Allow a parallel docker-stable RPM to exists in repositories. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Allow users to disable SUSE secrets support by setting DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker. (bsc#1231348) * Mark docker-buildx as required since classic "docker build" has been deprecated since Docker 23.0. (bsc#1230331) * Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate package, but with docker-stable it will be necessary to maintain the packages together and it makes more sense to have them live in the same OBS package. (bsc#1230333) * Update to Docker 26.1.5-ce. See upstream changelog online at bsc#1230294 * This update includes fixes for: * CVE-2024-41110. bsc#1228324 * CVE-2023-47108. bsc#1217070 bsc#1229806 * CVE-2023-45142. bsc#1228553 bsc#1229806 * Update to Docker 26.1.4-ce. See upstream changelog online at * Update to Docker 26.1.0-ce. See upstream changelog online at * Update --add-runtime to point to correct binary path. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4319=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4319=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-98.120.1 * docker-debuginfo-26.1.5_ce-98.120.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * docker-bash-completion-26.1.5_ce-98.120.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-26.1.5_ce-98.120.1 * docker-debuginfo-26.1.5_ce-98.120.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-bash-completion-26.1.5_ce-98.120.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 * https://bugzilla.suse.com/show_bug.cgi?id=1229806 * https://bugzilla.suse.com/show_bug.cgi?id=1230294 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://bugzilla.suse.com/show_bug.cgi?id=1232999 * https://bugzilla.suse.com/show_bug.cgi?id=1233819 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 16:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 16:30:10 -0000 Subject: SUSE-SU-2024:4330-1: low: Security update for vim Message-ID: <173436661024.13380.8076807431752841091@smelt2.prg2.suse.org> # Security update for vim Announcement ID: SUSE-SU-2024:4330-1 Release Date: 2024-12-16T13:17:36Z Rating: low References: * bsc#1229238 * bsc#1231373 Cross-References: * CVE-2024-43374 * CVE-2024-47814 CVSS scores: * CVE-2024-43374 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-47814 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L * CVE-2024-47814 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2024-47814 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for vim fixes the following issues: * CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373) * CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238) Other fixes: * Updated to version 9.1.0836 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4330=1 openSUSE-SLE-15.5-2024-4330=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4330=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4330=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4330=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4330=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4330=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4330=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4330=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * vim-small-9.1.0836-150500.20.15.1 * gvim-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * gvim-debuginfo-9.1.0836-150500.20.15.1 * vim-small-debuginfo-9.1.0836-150500.20.15.1 * vim-debugsource-9.1.0836-150500.20.15.1 * vim-9.1.0836-150500.20.15.1 * openSUSE Leap 15.5 (noarch) * vim-data-common-9.1.0836-150500.20.15.1 * vim-data-9.1.0836-150500.20.15.1 * openSUSE Leap Micro 5.5 (noarch) * vim-data-common-9.1.0836-150500.20.15.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * vim-debugsource-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * vim-small-9.1.0836-150500.20.15.1 * vim-small-debuginfo-9.1.0836-150500.20.15.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * vim-small-9.1.0836-150500.20.15.1 * gvim-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * gvim-debuginfo-9.1.0836-150500.20.15.1 * vim-small-debuginfo-9.1.0836-150500.20.15.1 * vim-debugsource-9.1.0836-150500.20.15.1 * vim-9.1.0836-150500.20.15.1 * openSUSE Leap 15.6 (noarch) * vim-data-common-9.1.0836-150500.20.15.1 * vim-data-9.1.0836-150500.20.15.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * vim-data-common-9.1.0836-150500.20.15.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * vim-debugsource-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * vim-small-9.1.0836-150500.20.15.1 * vim-small-debuginfo-9.1.0836-150500.20.15.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * vim-small-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * vim-small-debuginfo-9.1.0836-150500.20.15.1 * vim-debugsource-9.1.0836-150500.20.15.1 * vim-9.1.0836-150500.20.15.1 * Basesystem Module 15-SP5 (noarch) * vim-data-common-9.1.0836-150500.20.15.1 * vim-data-9.1.0836-150500.20.15.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * vim-small-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * vim-small-debuginfo-9.1.0836-150500.20.15.1 * vim-debugsource-9.1.0836-150500.20.15.1 * vim-9.1.0836-150500.20.15.1 * Basesystem Module 15-SP6 (noarch) * vim-data-common-9.1.0836-150500.20.15.1 * vim-data-9.1.0836-150500.20.15.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * vim-debugsource-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * gvim-debuginfo-9.1.0836-150500.20.15.1 * gvim-9.1.0836-150500.20.15.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * vim-debugsource-9.1.0836-150500.20.15.1 * vim-debuginfo-9.1.0836-150500.20.15.1 * gvim-debuginfo-9.1.0836-150500.20.15.1 * gvim-9.1.0836-150500.20.15.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43374.html * https://www.suse.com/security/cve/CVE-2024-47814.html * https://bugzilla.suse.com/show_bug.cgi?id=1229238 * https://bugzilla.suse.com/show_bug.cgi?id=1231373 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 16:30:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 16:30:13 -0000 Subject: SUSE-SU-2024:4329-1: critical: Security update for aws-iam-authenticator Message-ID: <173436661353.13380.14822123166970270627@smelt2.prg2.suse.org> # Security update for aws-iam-authenticator Announcement ID: SUSE-SU-2024:4329-1 Release Date: 2024-12-16T13:16:54Z Rating: critical References: * bsc#1200528 Cross-References: * CVE-2022-1996 CVSS scores: * CVE-2022-1996 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1996 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1996 ( NVD ): 9.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for aws-iam-authenticator fixes the following issues: * CVE-2022-1996: Fixed CORS bypass (bsc#1200528). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4329=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4329=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-4329=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-4329=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4329=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4329=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4329=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 * Public Cloud Module 15-SP2 (x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * aws-iam-authenticator-0.5.3-150000.1.12.1 ## References: * https://www.suse.com/security/cve/CVE-2022-1996.html * https://bugzilla.suse.com/show_bug.cgi?id=1200528 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 16:30:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 16:30:16 -0000 Subject: SUSE-SU-2024:4328-1: important: Security update for python-aiohttp Message-ID: <173436661631.13380.18294021896226181451@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:4328-1 Release Date: 2024-12-16T13:16:13Z Rating: important References: * bsc#1223726 Cross-References: * CVE-2024-30251 CVSS scores: * CVE-2024-30251 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2024-30251: Fixed infinite loop on specially crafted POST request (bsc#1223726). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4328=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-4328=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-4328=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4328=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4328=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4328=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.21.1 * python3-aiohttp-3.6.0-150100.3.21.1 * python-aiohttp-doc-3.6.0-150100.3.21.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.21.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.21.1 * python3-aiohttp-3.6.0-150100.3.21.1 * python-aiohttp-doc-3.6.0-150100.3.21.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.21.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.21.1 * python3-aiohttp-3.6.0-150100.3.21.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.21.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.21.1 * python3-aiohttp-3.6.0-150100.3.21.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.21.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.21.1 * python3-aiohttp-3.6.0-150100.3.21.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.21.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.21.1 * python3-aiohttp-3.6.0-150100.3.21.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2024-30251.html * https://bugzilla.suse.com/show_bug.cgi?id=1223726 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 16:30:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 16:30:18 -0000 Subject: SUSE-SU-2024:4327-1: important: Security update for python-aiohttp Message-ID: <173436661876.13380.2653589104425892285@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:4327-1 Release Date: 2024-12-16T13:14:43Z Rating: important References: * bsc#1223726 Cross-References: * CVE-2024-30251 CVSS scores: * CVE-2024-30251 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP5 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2024-30251: Fixed infinite loop on specially crafted POST request (bsc#1223726). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4327=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4327=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4327=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4327=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4327=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4327=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4327=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4327=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-4327=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4327=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4327=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-3.9.3-150400.10.30.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.30.1 * python311-aiohttp-3.9.3-150400.10.30.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.30.1 ## References: * https://www.suse.com/security/cve/CVE-2024-30251.html * https://bugzilla.suse.com/show_bug.cgi?id=1223726 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 16:30:21 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 16:30:21 -0000 Subject: SUSE-SU-2024:4326-1: moderate: Security update for MozillaThunderbird Message-ID: <173436662133.13380.817128659832873997@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:4326-1 Release Date: 2024-12-16T13:11:21Z Rating: moderate References: * bsc#1234413 Cross-References: * CVE-2024-50336 CVSS scores: * CVE-2024-50336 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50336 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: * CVE-2024-50336: Fixed insufficient MXC URI validation which could allow client-side path traversal (bsc#1234413) Other fixes: \- Updated to Mozilla Thunderbird 128.5.2i (bsc#1234413): * fixed: Large virtual folders could be very slow * fixed: Message could disappear after moving from IMAP folder followed by Undo and Redo * fixed: XMPP chat did not display messages sent inside a CDATA element * fixed: Selected calendar day did not move forward at midnight * fixed: Today pane agenda sometimes scrolled for no apparent reason * fixed: CalDAV calendars without offline support could degrade start-up performance * fixed: Visual and UX improvements * fixed: Security fixes * Updated to Mozilla Thunderbird 128.5.1: * new: Add end of year donation appeal * fixed: Total message count for favorite folders did not work consistently ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4326=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4326=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4326=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4326=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-4326=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-4326=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1 * MozillaThunderbird-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 * MozillaThunderbird-debugsource-128.5.2-150200.8.194.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1 * MozillaThunderbird-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 * MozillaThunderbird-debugsource-128.5.2-150200.8.194.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1 * MozillaThunderbird-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 * MozillaThunderbird-debugsource-128.5.2-150200.8.194.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1 * MozillaThunderbird-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 * MozillaThunderbird-debugsource-128.5.2-150200.8.194.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1 * MozillaThunderbird-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 * MozillaThunderbird-debugsource-128.5.2-150200.8.194.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1 * MozillaThunderbird-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 * MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 * MozillaThunderbird-debugsource-128.5.2-150200.8.194.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50336.html * https://bugzilla.suse.com/show_bug.cgi?id=1234413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 16:30:28 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 16:30:28 -0000 Subject: SUSE-SU-2024:4324-1: important: Security update for MozillaFirefox Message-ID: <173436662834.13380.12743352646888916387@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:4324-1 Release Date: 2024-12-16T12:06:05Z Rating: important References: * bsc#1234326 Affected Products: * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one security fix can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.5.1 ESR (bsc#1234326): \- Fixed an issue that prevented some websites from loading when using SSL Inspection. (bmo#1933747) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4324=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4324=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4324=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4324=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4324=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4324=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4324=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4324=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4324=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4324=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4324=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-branding-upstream-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * openSUSE Leap 15.5 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-branding-upstream-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * Desktop Applications Module 15-SP5 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-128.5.1-150200.152.164.1 * MozillaFirefox-debuginfo-128.5.1-150200.152.164.1 * MozillaFirefox-translations-common-128.5.1-150200.152.164.1 * MozillaFirefox-debugsource-128.5.1-150200.152.164.1 * MozillaFirefox-translations-other-128.5.1-150200.152.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-128.5.1-150200.152.164.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234326 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 16 20:30:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 16 Dec 2024 20:30:12 -0000 Subject: SUSE-SU-2024:4333-1: moderate: Security update for libaom, libyuv Message-ID: <173438101267.14609.9289170314233025507@smelt2.prg2.suse.org> # Security update for libaom, libyuv Announcement ID: SUSE-SU-2024:4333-1 Release Date: 2024-12-16T16:43:25Z Rating: moderate References: * jsc#PED-11042 * jsc#PED-11100 Cross-References: * CVE-2023-6879 CVSS scores: * CVE-2023-6879 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for libaom, libyuv fixes the following issues: libaom was updated to version 3.7.1: * Bug Fixes: * aomedia:3349: heap overflow when increasing resolution * aomedia:3478: GCC 12.2.0 emits a -Wstringop-overflow warning on aom/av1/encoder/motion_search_facade.c * aomedia:3489: Detect encoder and image high bit depth mismatch * aomedia:3491: heap-buffer-overflow on frame size change * b/303023614: Segfault at encoding time for high bit depth images * New upstream release 3.7.0 * New Features * New codec controls: * AV1E_SET_QUANTIZER_ONE_PASS: Set quantizer for each frame. * AV1E_ENABLE_RATE_GUIDE_DELTAQ: enable the rate distribution guided delta quantization in all intra mode. The "enable-rate-guide-deltaq" option is added for this control. * AV1E_SET_RATE_DISTRIBUTION_INFO: set the input file for rate distribution used in all intra mode. The "rate-distribution-info" option is added for this control. * AV1E_GET_LUMA_CDEF_STRENGTH * AV1E_SET_BITRATE_ONE_PASS_CBR * AOM_SCALING_MODE is extended to include 2/3 and 1/3 scaling. * aom_tune_metric is extended to include AOM_TUNE_VMAF_SALIENCY_MAP. The "tune" option is extended to include "vmaf_saliency_map". * SVC example encoder svc_encoder_rtc is able to use the rate control library. * Loopfilter level and CDEF filter level is supported by RTC rate control library. * New speed (--cpu-used) 11, intended for RTC screen sharing, added for faster encoding with ~3% bdrate loss with 16% IC (instruction count) speedup compared to speed 10. * Compression Efficiency Improvements * Improved VoD encoding performance * 0.1-0.6% BDrate gains for encoding speeds 2 to 6 * Rate control accuracy improvement in VBR mode * RTC encoding improvements * Screen content mode: 10-19% BDrate gains for speeds 6 - 10 * Temporal layers video mode, for speed 10: * 2 temporal layers on low resolutions: 13-15% BDrate gain * 3 temporal layers on VGA/HD: 3-4% BDrate gain * Perceptual Quality Improvements * Fixed multiple block and color artifacts for RTC screen content by * Incorporating color into RD cost for IDTX * Reducing thresholds for palette mode in non RD mode * Allowing more palette mode testing * Improved color sensitivity for altref in non-RD mode. * Reduced video flickering for temporal layer encoding. * Speedup and Memory Optimizations * Speed up the VoD encoder * 2-5% for encoding speed 2 to 4 * 9-15% for encoding speed 5 to 6 * ARM * Standard bitdepth * speed 5: +31% * speed 4: +2% * speed 3: +9% * speed 2: +157% * High bitdepth * speed 5: +85% * RTC speedups * Screen content mode * 15% IC speedup for speeds 6-8 * ARM: 7% for speed 9, 3% for speed 10 * Temporal layers video mode * 7% speedup for 3 temporal layers on VGA/HD, for speed 10 * Single layer video * x86: 2% IC speedup for speeds 7-10 * ARM: 2-4% speedup across speeds 5-10 * Bug Fixes * aomedia:3261 Assertion failed when encoding av1 with film grain and '\--monochrome' flag * aomedia:3276 ensure all allocations are checked (partial fix) * aomedia:3451 The libaom library calls exit() * aomedia:3450 enable -Wshadow for C++ sources * aomedia:3449 Test Seg Faults After b459af3e345be402db052a143fcc5383d4b74cbd * aomedia:3416 prune unused symbols / restrict symbol visibility * aomedia:3443 Jenkins failure: UninstantiatedParameterizedTestSuite * aomedia:3434 realtime failures with CONFIG_BITSTREAM_DEBUG=1 * aomedia:3433 DeltaqModeTest crash w/row_mt=0 * aomedia:3429 Encoder crash when turn on both ExternalResize and g_threads > 2 * aomedia:3438 Build failure with `-DSANITIZE=address -DBUILD_SHARED_LIBS=ON` when using clang. * aomedia:3435 Block artifacts when scrolling with AV1 in screen sharing scenarios * aomedia:3170 vmaf tune presets produce extreme glitches in one scene * aomedia:3401 Building shared libaom with MSVC results in a race condition with the export library * aomedia:3420 Floating point exception in av1_tpl_get_frame_importance() * aomedia:3424 heap-buffer-overflow in ScaleFilterCols_16_C() (SIGABRT) * aomedia:3417 examples/svc_encoder_rtc.c is using internal macros and functions * aomedia:3372 SEGV in assign_frame_buffer_p av1_common_int.h * aomedia:3130 'cpu-features.h' file not found on Android NDK 22 * aomedia:3415 Encoder/decoder mismatch for svc_encoder_rtc running 1 SL 3 TL * aomedia:3412 Lossless Mode Fails Loopback Bit Test * aomedia:3409 The use of AV1_VAR_OFFS in av1/encoder/var_based_part.c is incorrect for high bit depths * aomedia:3403 test_libaom fails with error message "feenableexcept() failed" on Linux arm * aomedia:3370 Random color block at fast motion area * aomedia:3393 Assertion failure in av1_convolve_2d_sr_c() * aomedia:3392 Strong artifacting for high bit-depth real-time * aomedia:3376 aomenc --threads=10 --deltaq-mode=3 crashes after "Allintra: multi-threading of calculating differential contrast" * aomedia:3380 Crashes and ASan and TSan errors in deltaq-mode=3 multithreading code * chromium:1410766 heap-buffer-overflow in aom_yv12_copy_v_c * Cannot set level via AV1E_SET_TARGET_SEQ_LEVEL_IDX * Encoding failure due to the use of loop restoration with unintended use of lossless mode. * Signed integer overflow in scan_past_frames * Signed integer overflow in update_a_sep_sym * Flickering in AV1 1440p/2160p HDR transcodes * Fixed artifacts with screen share at encoder speed 10 * Fixed prediction setup for IDTX * Update to version 3.6.1: * aomedia:2871: Guard the support of the 7.x and 8.x levels for AV1 under the CONFIG_CWG_C013 config flag, and only output the 7.x and 8.x levels when explicitly requested. * aomedia:3382: Choose sb_size by ppi instead of svc. * aomedia:3384: Fix fullpel search limits. * aomedia:3388: Replace left shift of xq_active by multiplication. * aomedia:3389: Fix MV clamping in av1_mv_pred. * aomedia:3390: set_ld_layer_depth: cap max_layer_depth to MAX_ARF_LAYERS. * aomedia:3418: Fix MV clamping in av1_int_pro_motion_estimation. * aomedia:3429: Move lpf thread data init to lpf_pipeline_mt_init(). * b:266719111: Fix undefined behavior in Arm Neon code. * b:269840681: nonrd_opt: align scan tables. * rtc: Fix is_key_frame setting in variance partition. * Build: Fix build with clang-cl and Visual Studio. * Update to version 3.6.0: * This release includes compression efficiency and perceptual quality improvements, speedup and memory optimizations, and some new features. This release is ABI compatible with the last release. * New Features: * New values 20-27 (corresponding to levels 7.0-7.3 and 8.0-8.3) for the encoder control AV1E_SET_TARGET_SEQ_LEVEL_IDX (note that the proposal to add the new levels are still in draft status). The original special value 24 (keep level stats only for level monitoring) is renumbered as 32. * New encoder control AV1E_SET_SKIP_POSTPROC_FILTERING to skip the application of post-processing filters on reconstructed frame in all intra mode. * New encoder option "kf-max-pyr-height": Maximum height of pyramid structure used for the GOP starting with a key frame (-1 to 5). * Make SVC work for screen content. * Rate control improvements to reduce frame-size spikes for screen content coding. * RISC-V architecture support with gcc toolchain. * Compression Efficiency Improvements: * Peak compression efficiency in VOD setting is improved by 1%. * 0.7% - 2.2% RTC encoding BDrate gains for real time speed 8 to 10. * 15% RTC encoding BDrate gains for screen content speed 10. * Perceptual Quality Improvements: * Resolved a visual quality issue that was reported for high resolution clips (2K) for speed 4 and above in VOD use case. * Visual quality improvements to screen content coding. * Quality improvements to temporal layer RTC coding. * Speedup and Memory Optimizations: * RTC single-thread encoder speedup: . ~6% instruction count reduction for speed 5 and 6. . ~15% instruction count reduction for speed 7. . ~10% instruction count reduction for speed 8 to 10 (>=360p resolutions). * RTC multi-thread encoder speedup (beyond single-thread speedup): . 5-8% encode time reduction for speed 7 to 10. * RTC screen-content encoder speedup: . 11% instruction count reduction for speed 9 and 10 (>=720p resolutions). * ~5% reduction in heap memory requirements for RTC, speed 6 to 10. * AVIF: . 4-5% speedup for speed 9 in still-picture encoding mode. . 3-4% heap memory reduction in still-picture encoding mode for 360p-720p resolutions with multiple threads. * Bug Fixes: * Added a workaround for an AV1 specification bug which makes TRANSLATION type global motion models unusable. * Fixed AddressSanitizer global-buffer-overflow errors in av1/encoder/arm/neon/av1_fwd_txfm2d_neon.c. * Fixed AddressSanitizer heap-buffer-overflow error in av1_wiener_convolve_add_src_neon(). * chromium:1393384 Avoid scene detection on spatial resize. * aomedia:3308 Remove color artifacts under high motion. * aomedia:3310 Avoid out of memory failures with Visual Studio 2017, 2019, and 2022 for Win32 x86 builds. * aomedia:3346 Make SVC work properly for screen content. * aomedia:3348 Fix a bug where an uninitialized search_site is used. * aomedia:3365 Work around what seems like a Visual Studio 2022 compiler optimization bug. * aomedia:3369 Incorrect PSNR values reported by libaom for 12-bit encode. * Update to version 3.5.0: * This release is ABI compatible with the last one, including speedup and memory optimizations, and new APIs and features. * New Features * Support for frame parallel encode for larger number of threads. --fp-mt flag is available for all build configurations. * New codec control AV1E_GET_NUM_OPERATING_POINTS * Speedup and Memory Optimizations * Speed-up multithreaded encoding for good quality mode for larger number of threads through frame parallel encoding: . 30-34% encode time reduction for 1080p, 16 threads, 1x1 tile configuration (tile_rows x tile_columns) . 18-28% encode time reduction for 1080p, 16 threads, 2x4 tile configuration . 18-20% encode time reduction for 2160p, 32 threads, 2x4 tile configuration \- 16-20% speed-up for speed=6 to 8 in still-picture encoding mode \- 5-6% heap memory reduction for speed=6 to 10 in real-time encoding mode \- Improvements to the speed for speed=7, 8 in real-time encoding mode \- Improvements to the speed for speed=9, 10 in real-time screen encoding mode \- Optimizations to improve multi-thread efficiency in real-time encoding mode \- 10-15% speed up for SVC with temporal layers \- SIMD optimizations: . Improve av1_quantize_fp_32x32_neon() 1.05x to 1.24x faster . Add aom_highbd_quantize_b{,_32x32,_64x64}_adaptive_neon() 3.15x to 5.6x faster than "C" . Improve av1_quantize_fp_64x64_neon() 1.17x to 1.66x faster . Add aom_quantize_b_avx2() 1.4x to 1.7x faster than aom_quantize_b_avx() . Add aom_quantize_b_32x32_avx2() 1.4x to 2.3x faster than aom_quantize_b_32x32_avx() . Add aom_quantize_b_64x64_avx2() 2.0x to 2.4x faster than aom_quantize_b_64x64_ssse3() . Add aom_highbd_quantize_b_32x32_avx2() 9.0x to 10.5x faster than aom_highbd_quantize_b_32x32_c() . Add aom_highbd_quantize_b_64x64_avx2() 7.3x to 9.7x faster than aom_highbd_quantize_b_64x64_c() . Improve aom_highbd_quantize_b_avx2() 1.07x to 1.20x faster . Improve av1_quantize_fp_avx2() 1.13x to 1.49x faster . Improve av1_quantize_fp_32x32_avx2() 1.07x to 1.54x faster . Improve av1_quantize_fp_64x64_avx2() 1.03x to 1.25x faster . Improve av1_quantize_lp_avx2() 1.07x to 1.16x faster * Bug fixes including but not limited to * aomedia:3206 Assert that skip_width > 0 for deconvolve function * aomedia:3278 row_mt enc: Delay top-right sync when intraBC is enabled * aomedia:3282 blend_a64_*_neon: fix bus error in armv7 * aomedia:3283 FRAME_PARALLEL: Propagate border size to all cpis * aomedia:3283 RESIZE_MODE: Fix incorrect strides being used for motion search * aomedia:3286 rtc-svc: Fix to dynamic_enable spatial layers * aomedia:3289 rtc-screen: Fix to skipping inter-mode test in nonrd * aomedia:3289 rtc-screen: Fix for skip newmv on flat blocks * aomedia:3299 Fix build failure with CONFIG_TUNE_VMAF=1 * aomedia:3296 Fix the conflict --enable-tx-size-search=0 with nonrd mode --enable-tx-size-search will be ignored in non-rd pick mode * aomedia:3304 Fix off-by-one error of max w/h in validate_config * aomedia:3306 Do not use pthread_setname_np on GNU/Hurd * aomedia:3325 row-multithreading produces invalid bitstream in some cases * chromium:1346938, chromium:1338114 * compiler_flags.cmake: fix flag detection w/cmake 3.17-3.18.2 * tools/*.py: update to python3 * aom_configure.cmake: detect PIE and set CONFIG_PIC * test/simd_cmp_impl: use explicit types w/CompareSimd* * rtc: Fix to disable segm for aq-mode=3 * rtc: Fix to color_sensitivity in variance partition * rtc-screen: Fix bsize in model rd computation for intra chroma * Fixes to ensure the correct behavior of the encoder algorithms (like segmentation, computation of statistics, etc.) * Update to version 3.4.0: * This release includes compression efficiency and perceptual quality improvements, speedup and memory optimizations, and some new features. There are no ABI or API breaking changes in this release. * New Features: * New --dist-metric flag with "qm-psnr" value to use quantization matrices in the distortion computation for RD search. The default value is "psnr". * New command line option "\--auto-intra-tools-off=1" to make all-intra encoding faster for high bit rate under "\--deltaq-mode=3" mode. * New rate control library aom_av1_rc for real-time hardware encoders. Supports CBR for both one spatial layer and SVC. * New image format AOM_IMG_FMT_NV12 can be used as input to the encoder. The presence of AOM_IMG_FMT_NV12 can be detected at compile time by checking if the macro AOM_HAVE_IMG_FMT_NV12 is defined. * New codec controls for the encoder: o AV1E_SET_AUTO_INTRA_TOOLS_OFF. Only in effect if \--deltaq-mode=3. o AV1E_SET_RTC_EXTERNAL_RC o AV1E_SET_FP_MT. Only supported if libaom is built with -DCONFIG_FRAME_PARALLEL_ENCODE=1. o AV1E_GET_TARGET_SEQ_LEVEL_IDX * New key-value pairs for the key-value API: o --auto-intra-tools-off=0 (default) or 1. Only in effect if \--deltaq-mode=3. o --strict-level-conformance=0 (default) or 1 o --fp-mt=0 (default) or 1. Only supported if libaom is built with -DCONFIG_FRAME_PARALLEL_ENCODE=1. \- New aomenc options (not supported by the key-value API): o --nv12 * Compression Efficiency Improvements: * Correctly calculate SSE for high bitdepth in skip mode, 0.2% to 0.6% coding gain. * RTC at speed 9/10: BD-rate gain of ~4/5% * RTC screen content coding: many improvements for real-time screen at speed 10 (quality, speedup, and rate control), up to high resolutions (1080p). * RTC-SVC: fixes to make intra-only frames work for spatial layers. * RTC-SVC: quality improvements for temporal layers. * AV1 RT: A new passive rate control strategy for screen content, an average of 7.5% coding gain, with some clips of 20+%. The feature is turned off by default due to higher bit rate variation. * Perceptual Quality Improvements: * RTC: Visual quality improvements for high speeds (9/10) * Improvements in coding quality for all intra mode * Speedup and Memory Optimizations: * ~10% speedup in good quality mode encoding. * ~7% heap memory reduction in good quality encoding mode for speed 5 and 6. * Ongoing improvements to intra-frame encoding performance on Arm * Faster encoding speed for "\--deltaq-mode=3" mode. * ~10% speedup for speed 5/6, ~15% speedup for speed 7/8, and ~10% speedup for speed 9/10 in real time encoding mode * ~20% heap memory reduction in still-picture encoding mode for 360p-720p resolutions with multiple threads * ~13% speedup for speed 6 and ~12% speedup for speed 9 in still-picture encoding mode. * Optimizations to improve multi-thread efficiency for still-picture encoding mode. * Bug Fixes: * b/204460717: README.md: replace master with main * b/210677928: libaom disable_order is surprising for max_reference_frames=3 * b/222461449: -DCONFIG_TUNE_BUTTERAUGLI=1 broken * b/227207606: write_greyscale writes incorrect chroma in highbd mode * b/229955363: Integer-overflow in linsolve_wiener Update to version 3.3.0: * This release includes compression efficiency and perceptual quality improvements, speedup and memory optimizations, some new features, and several bug fixes. * New Features * AV1 RT: Introducing CDEF search level 5 * Changed real time speed 4 to behave the same as real time speed 5 * Add --deltaq-strength * rtc: Allow scene-change and overshoot detection for svc * rtc: Intra-only frame for svc * AV1 RT: Option 2 for codec control AV1E_SET_ENABLE_CDEF to disable CDEF on non-ref frames * New codec controls AV1E_SET_LOOPFILTER_CONTROL and AOME_GET_LOOPFILTER_LEVEL * Improvements to three pass encoding * Compression Efficiency Improvements: Overall compression gains: 0.6% * Perceptual Quality Improvements * Improves the perceptual quality of high QP encoding for delta-q mode 4 * Auto select noise synthesis level for all intra * Speedup and Memory Optimizations * Added many SSE2 optimizations. * Good quality 2-pass encoder speedups: o Speed 2: 9% o Speed 3: 12.5% o Speed 4: 8% o Speed 5: 3% o Speed 6: 4% * Real time mode encoder speedups: o Speed 5: 2.6% BDRate gain, 4% speedup o Speed 6: 3.5% BDRate gain, 4% speedup o Speed 9: 1% BDRate gain, 3% speedup o Speed 10: 3% BDRate gain, neutral speedup * All intra encoding speedups (AVIF): o Single thread - speed 6: 8% o Single thread - speed 9: 15% o Multi thread(8) - speed 6: 14% o Multi thread(8) - speed 9: 34% * Bug Fixes * Issue 3163: Segmentation fault when using \--enable-keyframe-filtering=2 * Issue 2436: Integer overflow in av1_warp_affine_c() * Issue 3226: armv7 build failure due to gcc-11 * Issue 3195: Bug report on libaom (AddressSanitizer: heap-buffer-overflow) * Issue 3191: Bug report on libaom (AddressSanitizer: SEGV on unknown address) * Drop libaom-devel Requires from libaom-devel-doc sub-package: We do not need the devel package to be able to read the devel documentation. libyuv was added new in version 20230517+a377993. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4333=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4333=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4333=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4333=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4333=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4333=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4333=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4333=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4333=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4333=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4333=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * openSUSE Leap 15.4 (x86_64) * libaom3-32bit-debuginfo-3.7.1-150400.3.9.1 * libyuv0-32bit-20230517+a377993-150400.9.3.1 * libaom3-32bit-3.7.1-150400.3.9.1 * libyuv0-32bit-debuginfo-20230517+a377993-150400.9.3.1 * openSUSE Leap 15.4 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libaom3-64bit-3.7.1-150400.3.9.1 * libaom3-64bit-debuginfo-3.7.1-150400.3.9.1 * libyuv0-64bit-debuginfo-20230517+a377993-150400.9.3.1 * libyuv0-64bit-20230517+a377993-150400.9.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * openSUSE Leap 15.5 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * openSUSE Leap 15.5 (x86_64) * libaom3-32bit-debuginfo-3.7.1-150400.3.9.1 * libyuv0-32bit-20230517+a377993-150400.9.3.1 * libaom3-32bit-3.7.1-150400.3.9.1 * libyuv0-32bit-debuginfo-20230517+a377993-150400.9.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * Basesystem Module 15-SP5 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64_ilp32) * libyuv0-64bit-debuginfo-20230517+a377993-150400.9.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Manager Proxy 4.3 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libyuv-debugsource-20230517+a377993-150400.9.3.1 * libaom-debugsource-3.7.1-150400.3.9.1 * libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1 * libyuv-devel-20230517+a377993-150400.9.3.1 * libaom3-debuginfo-3.7.1-150400.3.9.1 * libyuv-tools-20230517+a377993-150400.9.3.1 * libyuv0-debuginfo-20230517+a377993-150400.9.3.1 * libaom-devel-3.7.1-150400.3.9.1 * libyuv0-20230517+a377993-150400.9.3.1 * libaom3-3.7.1-150400.3.9.1 * aom-tools-3.7.1-150400.3.9.1 * aom-tools-debuginfo-3.7.1-150400.3.9.1 * SUSE Manager Server 4.3 (noarch) * libaom-devel-doc-3.7.1-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6879.html * https://jira.suse.com/browse/PED-11042 * https://jira.suse.com/browse/PED-11100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:08 -0000 Subject: SUSE-SU-2024:4352-1: important: Security update for libsoup Message-ID: <173443860836.13579.2378790872568264147@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2024:4352-1 Release Date: 2024-12-17T10:01:45Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285) * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292) * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287) Other fixes: * websocket-test: disconnect error copy after the test ends (glgo#GNOME/libsoup#391). * fix an intermittent test failure (glgo#GNOME/soup#399). * Increase test timeout on s390x. The http2-body-stream test can be slow and sometimes times out in our builds. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4352=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4352=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4352=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4352=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4352=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4352=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4352=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4352=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4352=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4352=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4352=1 ## Package List: * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Manager Server 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.3.1 * libsoup-3_0-0-32bit-3.0.4-150400.3.3.1 * libsoup-devel-32bit-3.0.4-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.3.1 * libsoup-3_0-0-64bit-3.0.4-150400.3.3.1 * libsoup-devel-64bit-3.0.4-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.3.1 * libsoup-3_0-0-32bit-3.0.4-150400.3.3.1 * libsoup-devel-32bit-3.0.4-150400.3.3.1 * openSUSE Leap 15.5 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * Basesystem Module 15-SP5 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Manager Proxy 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 * libsoup-3_0-0-3.0.4-150400.3.3.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1 * libsoup-debugsource-3.0.4-150400.3.3.1 * libsoup-devel-3.0.4-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libsoup-lang-3.0.4-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:11 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:11 -0000 Subject: SUSE-SU-2024:4351-1: important: Security update for installation-images Message-ID: <173443861166.13579.15014769707830470552@smelt2.prg2.suse.org> # Security update for installation-images Announcement ID: SUSE-SU-2024:4351-1 Release Date: 2024-12-17T09:33:35Z Rating: important References: * bsc#1233813 Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that has one security fix can now be installed. ## Description: This update updates installation-images and tftpboot images to contain the latest shim for secure boot. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4351=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4351=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (noarch) * tftpboot-installation-SLE-Micro-5.2-x86_64-16.56.14-150300.3.4.1 * tftpboot-installation-SLE-Micro-5.2-s390x-16.56.14-150300.3.4.1 * tftpboot-installation-SLE-Micro-5.2-aarch64-16.56.14-150300.3.4.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * tftpboot-installation-SLE-Micro-5.2-x86_64-16.56.14-150300.3.4.1 * tftpboot-installation-SLE-Micro-5.2-s390x-16.56.14-150300.3.4.1 * tftpboot-installation-SLE-Micro-5.2-aarch64-16.56.14-150300.3.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233813 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:16 -0000 Subject: SUSE-SU-2024:4350-1: important: Security update for installation-images Message-ID: <173443861668.13579.2369401831408670531@smelt2.prg2.suse.org> # Security update for installation-images Announcement ID: SUSE-SU-2024:4350-1 Release Date: 2024-12-17T09:05:12Z Rating: important References: * bsc#1233813 Affected Products: * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that has one security fix can now be installed. ## Description: This update updates installation-images and tftpboot images to contain the latest shim for secure boot. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4350=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4350=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * tftpboot-installation-SLE-Micro-5.4-aarch64-16.57.26-150400.3.4.1 * tftpboot-installation-SLE-Micro-5.4-x86_64-16.57.26-150400.3.4.1 * tftpboot-installation-SLE-Micro-5.4-s390x-16.57.26-150400.3.4.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * tftpboot-installation-SLE-Micro-5.4-aarch64-16.57.26-150400.3.4.1 * tftpboot-installation-SLE-Micro-5.4-x86_64-16.57.26-150400.3.4.1 * tftpboot-installation-SLE-Micro-5.4-s390x-16.57.26-150400.3.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233813 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:20 -0000 Subject: SUSE-SU-2024:4349-1: important: Security update for libsoup2 Message-ID: <173443862033.13579.9151810910157438348@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2024:4349-1 Release Date: 2024-12-17T08:53:04Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285) * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292) * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4349=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4349=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4349=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4349=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4349=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4349=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4349=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4349=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4349=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4349=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4349=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4349=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4349=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4349=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4349=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4349=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4349=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libsoup2-devel-32bit-2.74.2-150400.3.3.1 * libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.3.1 * libsoup-2_4-1-32bit-2.74.2-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-2_4-1-64bit-2.74.2-150400.3.3.1 * libsoup2-devel-64bit-2.74.2-150400.3.3.1 * libsoup-2_4-1-64bit-debuginfo-2.74.2-150400.3.3.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libsoup2-devel-32bit-2.74.2-150400.3.3.1 * libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.3.1 * libsoup-2_4-1-32bit-2.74.2-150400.3.3.1 * openSUSE Leap 15.5 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * Basesystem Module 15-SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Manager Proxy 4.3 (x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Manager Proxy 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libsoup2-devel-2.74.2-150400.3.3.1 * libsoup-2_4-1-2.74.2-150400.3.3.1 * typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1 * libsoup2-debugsource-2.74.2-150400.3.3.1 * SUSE Manager Server 4.3 (noarch) * libsoup2-lang-2.74.2-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:24 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:24 -0000 Subject: SUSE-SU-2024:4348-1: moderate: Security update for socat Message-ID: <173443862446.13579.9933069964751517958@smelt2.prg2.suse.org> # Security update for socat Announcement ID: SUSE-SU-2024:4348-1 Release Date: 2024-12-17T08:36:49Z Rating: moderate References: * bsc#1225462 Cross-References: * CVE-2024-54661 CVSS scores: * CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for socat fixes the following issues: * CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp directory (bsc#1225462) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4348=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4348=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * socat-1.7.3.2-150000.6.3.1 * socat-debuginfo-1.7.3.2-150000.6.3.1 * socat-debugsource-1.7.3.2-150000.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * socat-1.7.3.2-150000.6.3.1 * socat-debuginfo-1.7.3.2-150000.6.3.1 * socat-debugsource-1.7.3.2-150000.6.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54661.html * https://bugzilla.suse.com/show_bug.cgi?id=1225462 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:26 -0000 Subject: SUSE-SU-2024:4347-1: important: Security update for installation-images Message-ID: <173443862667.13579.1075222592089573988@smelt2.prg2.suse.org> # Security update for installation-images Announcement ID: SUSE-SU-2024:4347-1 Release Date: 2024-12-17T08:36:40Z Rating: important References: * bsc#1233813 Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro for Rancher 5.3 An update that has one security fix can now be installed. ## Description: This update updates installation-images and tftpboot images to contain the latest shim for secure boot. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4347=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4347=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * tftpboot-installation-SLE-Micro-5.3-s390x-16.57.21-150400.3.4.2 * tftpboot-installation-SLE-Micro-5.3-x86_64-16.57.21-150400.3.4.2 * tftpboot-installation-SLE-Micro-5.3-aarch64-16.57.21-150400.3.4.2 * SUSE Linux Enterprise Micro 5.3 (noarch) * tftpboot-installation-SLE-Micro-5.3-s390x-16.57.21-150400.3.4.2 * tftpboot-installation-SLE-Micro-5.3-x86_64-16.57.21-150400.3.4.2 * tftpboot-installation-SLE-Micro-5.3-aarch64-16.57.21-150400.3.4.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1233813 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:30:47 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:30:47 -0000 Subject: SUSE-SU-2024:4346-1: important: Security update for the Linux Kernel Message-ID: <173443864781.13579.13027213571218478086@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4346-1 Release Date: 2024-12-17T08:32:55Z Rating: important References: * bsc#1218644 * bsc#1220382 * bsc#1221309 * bsc#1222590 * bsc#1229808 * bsc#1230220 * bsc#1231646 * bsc#1232187 * bsc#1232312 * bsc#1232860 * bsc#1232907 * bsc#1232919 * bsc#1232928 * bsc#1233070 * bsc#1233214 * bsc#1233293 * bsc#1233453 * bsc#1233456 * bsc#1233463 * bsc#1233468 * bsc#1233479 * bsc#1233490 * bsc#1233491 * bsc#1233555 * bsc#1233557 * bsc#1233561 * bsc#1233977 Cross-References: * CVE-2023-52922 * CVE-2024-26782 * CVE-2024-44932 * CVE-2024-44964 * CVE-2024-47757 * CVE-2024-50017 * CVE-2024-50089 * CVE-2024-50115 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50154 * CVE-2024-50205 * CVE-2024-50259 * CVE-2024-50264 * CVE-2024-50267 * CVE-2024-50274 * CVE-2024-50279 * CVE-2024-50290 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53068 CVSS scores: * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50259 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 23 vulnerabilities and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808). * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220). * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187). * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490). * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561). The following non-security bugs were fixed: * Update config files (bsc#1218644). * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4346=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4346=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4346=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4346=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4346=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4346=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4346=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4346=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4346=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-4346=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4346=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4346=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4346=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4346=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4346=1 ## Package List: * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.144.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.144.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * kernel-devel-5.14.21-150400.24.144.1 * kernel-source-vanilla-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-debug-devel-5.14.21-150400.24.144.1 * kernel-debug-debugsource-5.14.21-150400.24.144.1 * kernel-debug-debuginfo-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-kvmsmall-devel-5.14.21-150400.24.144.1 * kernel-default-base-rebuild-5.14.21-150400.24.144.1.150400.24.70.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.144.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-livepatch-5.14.21-150400.24.144.1 * kernel-obs-qa-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.144.1 * kernel-default-optional-5.14.21-150400.24.144.1 * kernel-default-extra-5.14.21-150400.24.144.1 * gfs2-kmp-default-5.14.21-150400.24.144.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.144.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-debugsource-5.14.21-150400.24.144.1 * dlm-kmp-default-5.14.21-150400.24.144.1 * ocfs2-kmp-default-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * kselftests-kmp-default-5.14.21-150400.24.144.1 * reiserfs-kmp-default-5.14.21-150400.24.144.1 * cluster-md-kmp-default-5.14.21-150400.24.144.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.144.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_144-default-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.144.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.144.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (aarch64) * dtb-nvidia-5.14.21-150400.24.144.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.144.1 * gfs2-kmp-64kb-5.14.21-150400.24.144.1 * dlm-kmp-64kb-5.14.21-150400.24.144.1 * dtb-apple-5.14.21-150400.24.144.1 * dtb-lg-5.14.21-150400.24.144.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.144.1 * dtb-renesas-5.14.21-150400.24.144.1 * dtb-arm-5.14.21-150400.24.144.1 * dtb-broadcom-5.14.21-150400.24.144.1 * reiserfs-kmp-64kb-5.14.21-150400.24.144.1 * dtb-amazon-5.14.21-150400.24.144.1 * dtb-qcom-5.14.21-150400.24.144.1 * dtb-altera-5.14.21-150400.24.144.1 * ocfs2-kmp-64kb-5.14.21-150400.24.144.1 * dtb-amd-5.14.21-150400.24.144.1 * dtb-xilinx-5.14.21-150400.24.144.1 * dtb-cavium-5.14.21-150400.24.144.1 * dtb-mediatek-5.14.21-150400.24.144.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-devel-5.14.21-150400.24.144.1 * dtb-apm-5.14.21-150400.24.144.1 * kernel-64kb-debugsource-5.14.21-150400.24.144.1 * dtb-freescale-5.14.21-150400.24.144.1 * kernel-64kb-extra-5.14.21-150400.24.144.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.144.1 * dtb-exynos-5.14.21-150400.24.144.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.144.1 * dtb-sprd-5.14.21-150400.24.144.1 * dtb-socionext-5.14.21-150400.24.144.1 * dtb-allwinner-5.14.21-150400.24.144.1 * kselftests-kmp-64kb-5.14.21-150400.24.144.1 * kernel-64kb-optional-5.14.21-150400.24.144.1 * dtb-amlogic-5.14.21-150400.24.144.1 * dtb-hisilicon-5.14.21-150400.24.144.1 * dtb-marvell-5.14.21-150400.24.144.1 * dtb-rockchip-5.14.21-150400.24.144.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.144.1 * cluster-md-kmp-64kb-5.14.21-150400.24.144.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-5.14.21-150400.24.144.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-livepatch-devel-5.14.21-150400.24.144.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_144-default-1-150400.9.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1 * cluster-md-kmp-default-5.14.21-150400.24.144.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.144.1 * gfs2-kmp-default-5.14.21-150400.24.144.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * dlm-kmp-default-5.14.21-150400.24.144.1 * ocfs2-kmp-default-5.14.21-150400.24.144.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-devel-5.14.21-150400.24.144.1 * kernel-64kb-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * reiserfs-kmp-default-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-obs-build-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-devel-5.14.21-150400.24.144.1 * kernel-64kb-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * reiserfs-kmp-default-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-obs-build-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (nosrc x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-obs-build-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.144.1 * kernel-default-extra-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-debuginfo-5.14.21-150400.24.144.1 * kernel-64kb-devel-5.14.21-150400.24.144.1 * kernel-64kb-debugsource-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-obs-build-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.144.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 * reiserfs-kmp-default-5.14.21-150400.24.144.1 * kernel-default-debugsource-5.14.21-150400.24.144.1 * kernel-obs-build-debugsource-5.14.21-150400.24.144.1 * kernel-default-debuginfo-5.14.21-150400.24.144.1 * kernel-default-devel-5.14.21-150400.24.144.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.144.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1 * kernel-obs-build-5.14.21-150400.24.144.1 * kernel-syms-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.144.1 * kernel-macros-5.14.21-150400.24.144.1 * kernel-source-5.14.21-150400.24.144.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.144.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50259.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1231646 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233214 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 12:31:14 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 12:31:14 -0000 Subject: SUSE-SU-2024:4345-1: important: Security update for the Linux Kernel Message-ID: <173443867466.13579.7252773158216003728@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4345-1 Release Date: 2024-12-17T08:31:01Z Rating: important References: * bsc#1218644 * bsc#1220382 * bsc#1221309 * bsc#1222590 * bsc#1229345 * bsc#1229808 * bsc#1230220 * bsc#1231646 * bsc#1232165 * bsc#1232187 * bsc#1232224 * bsc#1232312 * bsc#1232436 * bsc#1232860 * bsc#1232907 * bsc#1232919 * bsc#1232928 * bsc#1233070 * bsc#1233117 * bsc#1233214 * bsc#1233293 * bsc#1233453 * bsc#1233456 * bsc#1233463 * bsc#1233468 * bsc#1233479 * bsc#1233490 * bsc#1233491 * bsc#1233555 * bsc#1233557 * bsc#1233561 * bsc#1233977 Cross-References: * CVE-2023-52922 * CVE-2024-26782 * CVE-2024-43854 * CVE-2024-44932 * CVE-2024-44964 * CVE-2024-47757 * CVE-2024-49925 * CVE-2024-49945 * CVE-2024-50017 * CVE-2024-50089 * CVE-2024-50115 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50154 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50259 * CVE-2024-50264 * CVE-2024-50267 * CVE-2024-50274 * CVE-2024-50279 * CVE-2024-50290 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53068 CVSS scores: * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50259 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves 27 vulnerabilities and has five security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345) * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808). * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220). * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490). * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561). The following non-security bugs were fixed: * Update config files (bsc#1218644). * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * initramfs: avoid filename buffer overrun (bsc#1232436). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382). * x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4345=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4345=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4345=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4345=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.103.1 * kernel-rt-debugsource-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.103.1 * kernel-rt-debugsource-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.103.1 * kernel-rt-debugsource-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.103.1 * kernel-rt-debugsource-5.14.21-150400.15.103.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.103.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-43854.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50259.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1229345 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1231646 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233214 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 16:35:52 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 16:35:52 -0000 Subject: SUSE-SU-2024:4364-1: important: Security update for the Linux Kernel Message-ID: <173445335299.13386.9044841776667136797@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4364-1 Release Date: 2024-12-17T15:57:52Z Rating: important References: * bsc#1054914 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1204171 * bsc#1205796 * bsc#1206188 * bsc#1206344 * bsc#1209290 * bsc#1210449 * bsc#1210627 * bsc#1213034 * bsc#1216813 * bsc#1218562 * bsc#1218644 * bsc#1220382 * bsc#1221309 * bsc#1221333 * bsc#1222364 * bsc#1222590 * bsc#1223202 * bsc#1223384 * bsc#1223524 * bsc#1223656 * bsc#1223824 * bsc#1223848 * bsc#1223919 * bsc#1223942 * bsc#1224518 * bsc#1224526 * bsc#1224574 * bsc#1225189 * bsc#1225336 * bsc#1225611 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225762 * bsc#1225764 * bsc#1225812 * bsc#1226498 * bsc#1226560 * bsc#1226592 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226872 * bsc#1227437 * bsc#1227853 * bsc#1227885 * bsc#1228119 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228486 * bsc#1228650 * bsc#1228709 * bsc#1228743 * bsc#1228747 * bsc#1228857 * bsc#1229005 * bsc#1229019 * bsc#1229312 * bsc#1229429 * bsc#1229450 * bsc#1229454 * bsc#1229456 * bsc#1229556 * bsc#1229585 * bsc#1229752 * bsc#1229769 * bsc#1229808 * bsc#1229837 * bsc#1229891 * bsc#1230055 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230270 * bsc#1230289 * bsc#1230405 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230550 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230715 * bsc#1230722 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230827 * bsc#1230903 * bsc#1230918 * bsc#1231016 * bsc#1231072 * bsc#1231073 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231101 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231132 * bsc#1231135 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231178 * bsc#1231179 * bsc#1231180 * bsc#1231181 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231277 * bsc#1231293 * bsc#1231327 * bsc#1231344 * bsc#1231375 * bsc#1231383 * bsc#1231434 * bsc#1231439 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231578 * bsc#1231646 * bsc#1231673 * bsc#1231849 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231861 * bsc#1231864 * bsc#1231872 * bsc#1231883 * bsc#1231885 * bsc#1231887 * bsc#1231888 * bsc#1231889 * bsc#1231890 * bsc#1231892 * bsc#1231893 * bsc#1231895 * bsc#1231896 * bsc#1231897 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231907 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231923 * bsc#1231929 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231936 * bsc#1231937 * bsc#1231938 * bsc#1231939 * bsc#1231940 * bsc#1231941 * bsc#1231942 * bsc#1231944 * bsc#1231947 * bsc#1231950 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231958 * bsc#1231959 * bsc#1231960 * bsc#1231961 * bsc#1231962 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231972 * bsc#1231973 * bsc#1231976 * bsc#1231978 * bsc#1231979 * bsc#1231987 * bsc#1231988 * bsc#1231990 * bsc#1231991 * bsc#1231992 * bsc#1231995 * bsc#1231996 * bsc#1231997 * bsc#1231998 * bsc#1232001 * bsc#1232004 * bsc#1232005 * bsc#1232006 * bsc#1232007 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232025 * bsc#1232026 * bsc#1232027 * bsc#1232028 * bsc#1232033 * bsc#1232034 * bsc#1232035 * bsc#1232036 * bsc#1232037 * bsc#1232038 * bsc#1232039 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232067 * bsc#1232069 * bsc#1232070 * bsc#1232071 * bsc#1232075 * bsc#1232076 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232104 * bsc#1232105 * bsc#1232108 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232119 * bsc#1232120 * bsc#1232123 * bsc#1232124 * bsc#1232126 * bsc#1232133 * bsc#1232134 * bsc#1232135 * bsc#1232136 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232149 * bsc#1232150 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232163 * bsc#1232164 * bsc#1232165 * bsc#1232170 * bsc#1232172 * bsc#1232174 * bsc#1232175 * bsc#1232180 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232191 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232224 * bsc#1232229 * bsc#1232232 * bsc#1232233 * bsc#1232237 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232286 * bsc#1232287 * bsc#1232293 * bsc#1232304 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232364 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232413 * bsc#1232416 * bsc#1232418 * bsc#1232424 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232500 * bsc#1232501 * bsc#1232503 * bsc#1232504 * bsc#1232507 * bsc#1232519 * bsc#1232520 * bsc#1232552 * bsc#1232630 * bsc#1232631 * bsc#1232632 * bsc#1232757 * bsc#1232819 * bsc#1232860 * bsc#1232870 * bsc#1232873 * bsc#1232877 * bsc#1232878 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232919 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233035 * bsc#1233049 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233117 * bsc#1233123 * bsc#1233125 * bsc#1233129 * bsc#1233130 * bsc#1233134 * bsc#1233135 * bsc#1233150 * bsc#1233189 * bsc#1233191 * bsc#1233197 * bsc#1233205 * bsc#1233206 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233214 * bsc#1233216 * bsc#1233238 * bsc#1233241 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233350 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233528 * bsc#1233548 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233570 * bsc#1233577 * bsc#1233580 * bsc#1233977 * bsc#1234012 * bsc#1234025 * bsc#1234085 * bsc#1234093 * bsc#1234098 * bsc#1234108 * jsc#PED-1166 * jsc#PED-1168 * jsc#PED-1170 * jsc#PED-1218 * jsc#PED-1220 * jsc#PED-1222 * jsc#PED-1223 * jsc#PED-1225 * jsc#PED-2849 Cross-References: * CVE-2021-47416 * CVE-2021-47534 * CVE-2021-47594 * CVE-2022-3435 * CVE-2022-45934 * CVE-2022-48664 * CVE-2022-48674 * CVE-2022-48879 * CVE-2022-48946 * CVE-2022-48947 * CVE-2022-48948 * CVE-2022-48949 * CVE-2022-48951 * CVE-2022-48953 * CVE-2022-48954 * CVE-2022-48955 * CVE-2022-48956 * CVE-2022-48957 * CVE-2022-48958 * CVE-2022-48959 * CVE-2022-48960 * CVE-2022-48961 * CVE-2022-48962 * CVE-2022-48966 * CVE-2022-48967 * CVE-2022-48968 * CVE-2022-48969 * CVE-2022-48970 * CVE-2022-48971 * CVE-2022-48972 * CVE-2022-48973 * CVE-2022-48975 * CVE-2022-48977 * CVE-2022-48978 * CVE-2022-48979 * CVE-2022-48980 * CVE-2022-48981 * CVE-2022-48982 * CVE-2022-48983 * CVE-2022-48985 * CVE-2022-48987 * CVE-2022-48988 * CVE-2022-48989 * CVE-2022-48990 * CVE-2022-48991 * CVE-2022-48992 * CVE-2022-48994 * CVE-2022-48995 * CVE-2022-48997 * CVE-2022-48999 * CVE-2022-49000 * CVE-2022-49002 * CVE-2022-49003 * CVE-2022-49005 * CVE-2022-49006 * CVE-2022-49007 * CVE-2022-49010 * CVE-2022-49011 * CVE-2022-49012 * CVE-2022-49014 * CVE-2022-49015 * CVE-2022-49016 * CVE-2022-49017 * CVE-2022-49019 * CVE-2022-49020 * CVE-2022-49021 * CVE-2022-49022 * CVE-2022-49023 * CVE-2022-49024 * CVE-2022-49025 * CVE-2022-49026 * CVE-2022-49027 * CVE-2022-49028 * CVE-2022-49029 * CVE-2022-49031 * CVE-2022-49032 * CVE-2023-2166 * CVE-2023-28327 * CVE-2023-52766 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52915 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26782 * CVE-2024-26906 * CVE-2024-26953 * CVE-2024-27043 * CVE-2024-35888 * CVE-2024-35937 * CVE-2024-35980 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36953 * CVE-2024-36954 * CVE-2024-36957 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38615 * CVE-2024-39476 * CVE-2024-40965 * CVE-2024-40997 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41049 * CVE-2024-42131 * CVE-2024-42145 * CVE-2024-42226 * CVE-2024-42253 * CVE-2024-43817 * CVE-2024-43897 * CVE-2024-44931 * CVE-2024-44932 * CVE-2024-44947 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46681 * CVE-2024-46716 * CVE-2024-46719 * CVE-2024-46754 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46826 * CVE-2024-46828 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46864 * CVE-2024-46871 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47679 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47718 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47742 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49863 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49924 * CVE-2024-49925 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50041 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50067 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50138 * CVE-2024-50141 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50160 * CVE-2024-50167 * CVE-2024-50171 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50215 * CVE-2024-50218 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50249 * CVE-2024-50255 * CVE-2024-50259 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53052 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53079 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53104 * CVE-2024-53110 CVSS scores: * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47534 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-45934 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-45934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48879 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48946 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48948 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48949 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48951 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48953 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48954 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48954 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48955 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48956 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48959 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48959 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48960 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48960 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48962 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48962 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2022-48962 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48966 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48966 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-48966 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-48967 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48967 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-48967 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-48968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-48968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48972 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48973 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48973 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-48973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48975 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48977 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48978 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48978 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-48978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48980 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48980 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-48980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48981 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-48981 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-48981 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48987 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48987 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48988 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48988 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48988 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48990 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48991 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48992 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48994 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-48994 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-48994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48995 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48995 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48997 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-48997 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2022-48997 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49000 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49002 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49002 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49003 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49003 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49003 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49005 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-49005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49006 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49010 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49015 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49017 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49020 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49020 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49023 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42226 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42253 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44931 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44947 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50259 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 439 vulnerabilities, contains nine features and has 68 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560). * CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556). * CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893). * CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973). * CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889). * CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976). * CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979). * CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286). * CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191). * CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233). * CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959). * CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070). * CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938). * CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004). * CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592). * CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437). * CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885). * CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709). * CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005). * CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837). * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715). * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148). * CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193). * CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200). * CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma (bsc#1231114). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072). * CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502). * CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540). * CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174). * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187). * CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251). * CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861). * CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253). * CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260). * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma (bsc#1232104). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310). * CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329). * CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263). * CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435). * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890). * CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056). * CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107). * CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily- mapped VPEs (bsc#1233106). * CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103). * CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580). * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). The following non-security bugs were fixed: * acpi: battery: Call power_supply_changed() when adding hooks (bsc#1232154) * acpi: battery: Simplify battery hook locking (bsc#1232154) * acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * acpi: CPPC: Fix _CPC register setting issue (git-fixes). * acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * acpi: EC: Do not release locks during operation region accesses (stable- fixes). * acpi: PAD: fix crash in exit_round_robin() (stable-fixes). * acpi: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * acpi: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * acpi: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * acpi: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * acpi: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * acpica: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * acpica: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * acpica: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * acpica: iasl: handle empty connection_node (stable-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed with "suse_" to make it more obvious its a downstream thing. * add bug reference for a mana change (bsc#1229769). * add bug references to existing mana changes (bsc#1232033, bsc#1232034, bsc#1232036). * add bugreference to a hv_netvsc patch (bsc#1232413). * afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes). * alsa: 6fire: Release resources at card release (git-fixes). * alsa: ac97: bus: Fix the mistake in the comment (git-fixes). * alsa: asihpi: Fix potential OOB array access (stable-fixes). * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: core: add isascii() check to card ID generator (stable-fixes). * alsa: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * alsa: hda: cs35l41: fix module autoloading (git-fixes). * alsa: hda: Fix kctl->id initialization (git-fixes). * alsa: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * alsa: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * alsa: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * alsa: hda/cs8409: Fix possible NULL dereference (git-fixes). * alsa: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes). * alsa: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes). * alsa: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes). * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * alsa: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * alsa: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * alsa: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes). * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes). * alsa: hda/realtek: Update default depop procedure (git-fixes). * alsa: hdsp: Break infinite MIDI input flush loop (stable-fixes). * alsa: line6: add hw monitor volume control to POD HD500X (stable-fixes). * alsa: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * alsa: usb-audio: Add input value sanity checks for standard types (stable- fixes). * alsa: usb-audio: Add logitech Audio profile quirk (stable-fixes). * alsa: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes). * alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * alsa: usb-audio: Define macros for quirk table entries (stable-fixes). * alsa: usb-audio: Replace complex quirk lines with macros (stable-fixes). * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes) * arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes) * asoc: allow module autoloading for table db1200_pids (stable-fixes). * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * asoc: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * asoc: intel: fix module autoloading (stable-fixes). * asoc: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * asoc: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git- fixes). * asoc: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes). * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * asoc: tda7419: fix module autoloading (stable-fixes). * blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528). * block: Avoid leaking hctx->nr_active counter on batched completion (bsc#1231923). * block: print symbolic error name instead of error code (bsc#1231872). * bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * bluetooth: Call iso_exit() on module unload (git-fixes). * bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * bluetooth: Remove debugfs directory on module init failure (git-fixes). * bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: Wait for FLR to complete during probe (git-fixes). * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25 (bsc#1230414 bsc#1229450). * bpf: Allow helpers to accept pointers with a fixed size (git-fixes). * bpf: Check for helper calls in check_subprogs() (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450). * bus: integrator-lm: fix OF node leak in probe() (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231383). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git- fixes). * chtls: fix tp->rcv_tstamp initialization (git-fixes). * clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885). * clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call (bsc#1232075) * crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813). * drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes). * drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: net: prevent tun_build_skb() to exceed the packet size limit (git- fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: komeda: Fix an issue related to normalized zpos (stable-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes). * drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (stable-fixes). * drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Check null pointers before using dc->clk_mgr (stable- fixes). * drm/amd/display: Check stream before comparing them (stable-fixes). * drm/amd/display: Fix index out of bounds in DCN30 color transformation (stable-fixes). * drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (stable-fixes). * drm/amd/display: Fix index out of bounds in degamma hardware format translation (stable-fixes). * drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable- fixes). * drm/amd/display: Fix system hang while resume with TBT monitor (stable- fixes). * drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (stable-fixes). * drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable- fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: add raven1 gfxoff quirk (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable- fixes). * drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes). * drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable- fixes). * drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdgpu: properly handle vbios fake edid sizing (git-fixes). * drm/amdgpu: Replace one-element array with flexible-array member (stable- fixes). * drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/printer: Allow NULL data in devcoredump printer (stable-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/radeon: properly handle vbios fake edid sizing (git-fixes). * drm/radeon: Replace one-element array with flexible-array member (stable- fixes). * drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable- fixes). * drm/rockchip: define gamma registers for RK3399 (stable-fixes). * drm/rockchip: support gamma control on RK3399 (stable-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drop HD-audio conexant patch that caused a regression on Thinkpad (bsc#1228269) * Drop OCFS2 patch causing a regression (bsc#1233255) * drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342) * e1000e: Fix S0ix residency on corporate systems (git-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * erofs: avoid consecutive detection for Highmem memory (git-fixes). * erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF (git-fixes). * erofs: fix pcluster use-after-free on UP platforms (git-fixes). * erofs: fix potential overflow calculating xattr_isize (git-fixes). * erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git- fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * exportfs: use pr_debug for unreachable debug statements (git-fixes). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * fat: fix uninitialized variable (git-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filelock: fix potential use-after-free in posix_lock_inode (git-fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes). * Fix regression on AMDGPU driver (bsc#1233134) * fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes). * fs/namespace: fnic: Switch to use %ptTd (git-fixes). * fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: Fix skb truesize underestimation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * hid: core: zero-initialize the report buffer (git-fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * hid: multitouch: Add support for B2402FVA track point (stable-fixes). * hid: multitouch: Add support for GT7868Q (stable-fixes). * hid: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * hid: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * hid: wacom: fix when get product name maybe null pointer (git-fixes). * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work (bsc#1227885). * i2c: imx-lpi2c: use bulk clk API (bsc#1227885). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: xiic: Fix broken locking on tx_msg (stable-fixes). * i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * i2c: xiic: Fix RX IRQ busy check (stable-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i2c: xiic: Switch from waitqueue to completion (stable-fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: Use devm_clk_get_enabled() (stable-fixes). * i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: Fix filter input checks to prevent config with invalid values (git- fixes). * i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes). * i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: Restore VF MSI-X state during PCI reset (git-fixes). * i40e: take into account XDP Tx queues when stopping rings (git-fixes). * iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git- fixes). * iavf: fix FDIR rule fields masks validation (git-fixes). * iavf: Fix promiscuous mode configuration flow messages (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * iavf: in iavf_down, disable queues when removing the driver (git-fixes). * iavf: initialize waitqueues before starting watchdog_task (git-fixes). * iavf: Introduce new state machines for flow director (git-fixes). * iavf: send VLAN offloading caps once after VFR (git-fixes). * iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git- fixes). * ibmvnic: Do partial reset on login failure (bsc#1233150). * ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150). * ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150). * ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150). * ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150). * ice: avoid executing commands on other ports when driving sync (git-fixes). * ice: Block switchdev mode when ADQ is active and vice versa (git-fixes). * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: Fix link_down_on_close message (git-fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix NULL pointer deref during VF reset (git-fixes). * ice: fix over-shifted variable (git-fixes). * ice: fix receive buffer size miscalculation (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: ice_aq_check_events: fix off-by-one check when filling buffer (git- fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: reset first in crash dump kernels (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: Shut down VSI with "link-down-on-close" enabled (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: Unbind the workqueue (bsc#1231344). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git- fixes). * idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: distinguish vports by the dev_port attribute (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igb: Fix missing time sync events (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Check VLAN EtherType mask (git-fixes). * igc: Check VLAN TCI mask (git-fixes). * igc: Fix hicredit calculation (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove temporary workaround (git-fixes). * igc: Report VLAN EtherType matching back to user (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * input: adp5589-keys - fix NULL pointer dereference (git-fixes). * input: ads7846 - ratelimit the spi_sync error message (stable-fixes). * input: goodix - use the new soc_intel_is_byt() helper (stable-fixes). * input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes). * input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes). * input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes). * input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes). * input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git- fixes). * input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813). * ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * itco_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * ixgbe: fix crash with empty VF macvlan list (git-fixes). * ixgbe: fix timestamp configuration code (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git- fixes). * kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes). * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes). * kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes). * kabi: fix after KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes). * kabi: Restore exported __arm_smccc_sve_check (git-fixes) * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes) * kexec: fix a memory leak in crash_shrink_memory() (git-fixes). * kvm: add guest_state_{enter,exit}_irqoff() (git-fixes). * kvm: Add support for arch compat vm ioctls (git-fixes). * kvm: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes). * kvm: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git- fixes). * kvm: arm64: Fix AArch32 register narrowing on userspace write (git-fixes). * kvm: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes). * kvm: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes). * kvm: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes). * kvm: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes). * kvm: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes). * kvm: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes). * kvm: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes). * kvm: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git- fixes). * kvm: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes). * kvm: arm64: vgic-v4: Restore pending state on host userspace write (git- fixes). * kvm: eventfd: Fix false positive RCU usage warning (git-fixes). * kvm: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * kvm: Fix lockdep false negative during host resume (git-fixes). * kvm: fix memoryleak in kvm_init() (git-fixes). * kvm: Grab a reference to KVM for VM and vCPU stats file descriptors (git- fixes). * kvm: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes). * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869). * kvm: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git- fixes). * kvm: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes). * kvm: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232631). * kvm: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277). * kvm: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232630). * kvm: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * kvm: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes). * kvm: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes). * kvm: Unconditionally get a ref to /dev/kvm module when creating a VM (git- fixes). * kvm: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * kvm: x86: Use a stable condition around all VT-d PI paths (git-fixes). * kvm: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes). * kvm: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes). * kvm/arm64: rework guest entry logic (git-fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * Makefile.compiler: replace cc-ifversion with compiler-specific macros (bsc#1230414 bsc#1229450). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvb-usb-v2: af9035: fix missing unlock (git-fixes). * media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * mei: use kvmalloc for read buffer (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: socket: suppress unused warning (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (git-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Allow 0 for total host VFs (git-fixes). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes). * net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes). * net/mlx5: DR, Use the right GVMI number for drop action (git-fixes). * net/mlx5: Drain health before unregistering devlink (git-fixes). * net/mlx5: E-switch, register event handler before arming the event (git- fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix fw tracer first block check (git-fixes). * net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes). * net/mlx5: fs, lock FTE when checking if active (git-fixes). * net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes). * net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Skip clock update work when device is in error state (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes). * net/mlx5: Use recovery timeout on sync reset flow (git-fixes). * net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes). * net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Check return value of snprintf writing to fw_version buffer (git- fixes). * net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes). * net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git- fixes). * net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Do not offload internal port if filter device is out device (git- fixes). * net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes). * net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes). * net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git- fixes). * net/mlx5e: fix double free of encap_header (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix pedit endianness (git-fixes). * net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes). * net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git- fixes). * net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git- fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes). * net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes). * net/mlx5e: Reduce the size of icosq_str (git-fixes). * net/mlx5e: Take state lock during tx timeout reporter (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX (bsc#1226797) * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * nfs: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: Fix NFSv4's PUTPUBFH operation (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: Mark filecache "down" if init fails (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nfsv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * nfsv4: Fix clearing of layout segments in layoutreturn (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (stable-fixes). * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-multipath: system fails to create generic nvme device (git-fixes). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * parport: Proper fix for array out-of-bounds access (git-fixes). * pci: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * pci: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * pci: Add T_PVPERL macro (git-fixes). * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * pci: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * pci: Fix reset_method_store() memory leak (git-fixes). * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * pci: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * pci: rockchip-ep: Fix address translation unit programming (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869). * powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869). * powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869). * powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869). * powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869). * powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869). * powerpc/code-patching: introduce patch_instructions() (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/code-patching: Pre-map patch area (bsc#1194869). * powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869). * powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869). * powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869). * powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869). * powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869). * powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869). * powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869). * powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869). * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git- fixes). * powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git- fixes). * powerpc/inst: Refactor ___get_user_instr() (bsc#1194869). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/lib: Add __init attribute to eligible functions (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869). * powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869). * powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327) * rdma/bnxt_re: Add a check for memory allocation (git-fixes) * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * rdma/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * rdma/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * rdma/bnxt_re: Fix the GID table length (git-fixes) * rdma/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * rdma/bnxt_re: Fix the usage of control path spin locks (git-fixes) * rdma/bnxt_re: Return more meaningful error (git-fixes) * rdma/bnxt_re: synchronize the qp-handle table array (git-fixes) * rdma/cxgb4: Dump vendor specific QP details (git-fixes) * rdma/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * rdma/hns: Add clear_hem return value to log (git-fixes) * rdma/hns: Add mutex_destroy() (git-fixes) * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes) * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * rdma/hns: Remove unnecessary QP type checks (git-fixes) * rdma/hns: Remove unused abnormal interrupt of type RAS (git-fixes) * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * rdma/hns: Use macro instead of magic number (git-fixes) * rdma/irdma: Fix misspelling of "accept*" (git-fixes) * rdma/mad: Improve handling of timed out WRs of mad agent (git-fixes) * rdma/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * rdma/mana_ib: use the correct page table index based on hardware page size (git-fixes). * rdma/mlx5: Move events notifier registration to be after device registration (git-fixes) * rdma/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * rdma/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * rdma/rxe: Fix the qp flush warnings in req (git-fixes) * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * rdma/srpt: Make slab cache names unique (git-fixes) * Removed the duplicated check of static_assert(sizeof(struct work_struct) >= sizeof(struct rcu_head)). * Removed unnecessary white-space change in kernel/bpf/syscall.c * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Revert "usb: yurex: Replace snprintf() with the safer scnprintf() variant" (stable-fixes). * Revert PM changes that caused a regression on S4 resume (bsc#1231578). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232632). * sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327) * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * sfc: Check firmware supports Ethernet PTP filter (git-fixes). * sfc: do not unregister flow_indr if it was never registered (git-fixes). * sfc: fix a double-free bug in efx_probe_filters (git-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: bcm63xx: Enable module autoloading (stable-fixes). * spi: bcm63xx: Fix module autoloading (git-fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: lpspi: release requested DMA channels (stable-fixes). * spi: lpspi: Silence error message upon deferred probe (stable-fixes). * spi: lpspi: Simplify some error message (git-fixes). * spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes). * spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * static_call: Do not make __static_call_return0 static (git-fixes). * sunrpc: clnt.c: Remove misleading comment (git-fixes). * sunrpc: Fix integer overflow in decode_rc_list() (git-fixes). * sunrpc: Fixup gss_status tracepoint error output (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes). * tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes). * tun: prevent negative ifindex (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * usb: appledisplay: close race between probe and completion handler (stable- fixes). * usb: chaoskey: fail open after removal (git-fixes). * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: misc: cypress_cy7c63: check for short transfer (stable-fixes). * usb: misc: yurex: fix race between read and write (stable-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes). * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * usb: serial: option: add Quectel RG650V (stable-fixes). * usb: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * usb: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * usb: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes). * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable- fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes). * Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450). * vdpa/mlx5: preserve CVQ vringh index (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * virtio_net: fixing XDP for fully checksummed packets handling (git-fixes). * virtio-net: synchronize probe with ndo_set_features (git-fixes). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock/virtio: fix packet delivery to tap device (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes). * wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes). * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable- fixes). * wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * workqueue: Avoid using isolated cpus' timers on (bsc#1231327) * workqueue: mark power efficient workqueue as unbounded if (bsc#1231327) * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405). * x86/kvm: fix is_stale_page_fault() (bsc#1221333). * xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4364=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4364=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4364=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4364=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4364=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-4364=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc ppc64le s390x) * kernel-default-5.14.21-150500.55.88.1 * SUSE Linux Enterprise Micro 5.5 (aarch64) * kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x) * kernel-default-debuginfo-5.14.21-150500.55.88.1 * kernel-default-debugsource-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.88.1 * kernel-64kb-debuginfo-5.14.21-150500.55.88.1 * kernel-64kb-devel-5.14.21-150500.55.88.1 * kernel-64kb-debugsource-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.88.1 * kernel-default-devel-5.14.21-150500.55.88.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.88.1 * kernel-default-debugsource-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (noarch) * kernel-macros-5.14.21-150500.55.88.1 * kernel-devel-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.88.1 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.88.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.88.1 * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.88.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-syms-5.14.21-150500.55.88.1 * kernel-obs-build-5.14.21-150500.55.88.1 * kernel-obs-build-debugsource-5.14.21-150500.55.88.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.88.1 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.88.1 * Legacy Module 15-SP5 (aarch64) * kernel-default-debuginfo-5.14.21-150500.55.88.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.88.1 * kernel-default-debugsource-5.14.21-150500.55.88.1 * reiserfs-kmp-default-5.14.21-150500.55.88.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.88.1 * SUSE Linux Enterprise Live Patching 15-SP5 (s390x x86_64) * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-1-150500.11.5.1 * kernel-default-livepatch-5.14.21-150500.55.88.1 * kernel-default-debugsource-5.14.21-150500.55.88.1 * kernel-livepatch-5_14_21-150500_55_88-default-1-150500.11.5.1 * kernel-default-livepatch-devel-5.14.21-150500.55.88.1 * kernel-default-debuginfo-5.14.21-150500.55.88.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-1-150500.11.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (ppc64le x86_64) * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.88.1 * ocfs2-kmp-default-5.14.21-150500.55.88.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.88.1 * dlm-kmp-default-5.14.21-150500.55.88.1 * cluster-md-kmp-default-5.14.21-150500.55.88.1 * gfs2-kmp-default-5.14.21-150500.55.88.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.88.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.88.1 * kernel-default-debugsource-5.14.21-150500.55.88.1 * kernel-default-debuginfo-5.14.21-150500.55.88.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.88.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47534.html * https://www.suse.com/security/cve/CVE-2021-47594.html * https://www.suse.com/security/cve/CVE-2022-3435.html * https://www.suse.com/security/cve/CVE-2022-45934.html * https://www.suse.com/security/cve/CVE-2022-48664.html * https://www.suse.com/security/cve/CVE-2022-48674.html * https://www.suse.com/security/cve/CVE-2022-48879.html * https://www.suse.com/security/cve/CVE-2022-48946.html * https://www.suse.com/security/cve/CVE-2022-48947.html * https://www.suse.com/security/cve/CVE-2022-48948.html * https://www.suse.com/security/cve/CVE-2022-48949.html * https://www.suse.com/security/cve/CVE-2022-48951.html * https://www.suse.com/security/cve/CVE-2022-48953.html * https://www.suse.com/security/cve/CVE-2022-48954.html * https://www.suse.com/security/cve/CVE-2022-48955.html * https://www.suse.com/security/cve/CVE-2022-48956.html * https://www.suse.com/security/cve/CVE-2022-48957.html * https://www.suse.com/security/cve/CVE-2022-48958.html * https://www.suse.com/security/cve/CVE-2022-48959.html * https://www.suse.com/security/cve/CVE-2022-48960.html * https://www.suse.com/security/cve/CVE-2022-48961.html * https://www.suse.com/security/cve/CVE-2022-48962.html * https://www.suse.com/security/cve/CVE-2022-48966.html * https://www.suse.com/security/cve/CVE-2022-48967.html * https://www.suse.com/security/cve/CVE-2022-48968.html * https://www.suse.com/security/cve/CVE-2022-48969.html * https://www.suse.com/security/cve/CVE-2022-48970.html * https://www.suse.com/security/cve/CVE-2022-48971.html * https://www.suse.com/security/cve/CVE-2022-48972.html * https://www.suse.com/security/cve/CVE-2022-48973.html * https://www.suse.com/security/cve/CVE-2022-48975.html * https://www.suse.com/security/cve/CVE-2022-48977.html * https://www.suse.com/security/cve/CVE-2022-48978.html * https://www.suse.com/security/cve/CVE-2022-48979.html * https://www.suse.com/security/cve/CVE-2022-48980.html * https://www.suse.com/security/cve/CVE-2022-48981.html * https://www.suse.com/security/cve/CVE-2022-48982.html * https://www.suse.com/security/cve/CVE-2022-48983.html * https://www.suse.com/security/cve/CVE-2022-48985.html * https://www.suse.com/security/cve/CVE-2022-48987.html * https://www.suse.com/security/cve/CVE-2022-48988.html * https://www.suse.com/security/cve/CVE-2022-48989.html * https://www.suse.com/security/cve/CVE-2022-48990.html * https://www.suse.com/security/cve/CVE-2022-48991.html * https://www.suse.com/security/cve/CVE-2022-48992.html * https://www.suse.com/security/cve/CVE-2022-48994.html * https://www.suse.com/security/cve/CVE-2022-48995.html * https://www.suse.com/security/cve/CVE-2022-48997.html * https://www.suse.com/security/cve/CVE-2022-48999.html * https://www.suse.com/security/cve/CVE-2022-49000.html * https://www.suse.com/security/cve/CVE-2022-49002.html * https://www.suse.com/security/cve/CVE-2022-49003.html * https://www.suse.com/security/cve/CVE-2022-49005.html * https://www.suse.com/security/cve/CVE-2022-49006.html * https://www.suse.com/security/cve/CVE-2022-49007.html * https://www.suse.com/security/cve/CVE-2022-49010.html * https://www.suse.com/security/cve/CVE-2022-49011.html * https://www.suse.com/security/cve/CVE-2022-49012.html * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49015.html * https://www.suse.com/security/cve/CVE-2022-49016.html * https://www.suse.com/security/cve/CVE-2022-49017.html * https://www.suse.com/security/cve/CVE-2022-49019.html * https://www.suse.com/security/cve/CVE-2022-49020.html * https://www.suse.com/security/cve/CVE-2022-49021.html * https://www.suse.com/security/cve/CVE-2022-49022.html * https://www.suse.com/security/cve/CVE-2022-49023.html * https://www.suse.com/security/cve/CVE-2022-49024.html * https://www.suse.com/security/cve/CVE-2022-49025.html * https://www.suse.com/security/cve/CVE-2022-49026.html * https://www.suse.com/security/cve/CVE-2022-49027.html * https://www.suse.com/security/cve/CVE-2022-49028.html * https://www.suse.com/security/cve/CVE-2022-49029.html * https://www.suse.com/security/cve/CVE-2022-49031.html * https://www.suse.com/security/cve/CVE-2022-49032.html * https://www.suse.com/security/cve/CVE-2023-2166.html * https://www.suse.com/security/cve/CVE-2023-28327.html * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36957.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38615.html * https://www.suse.com/security/cve/CVE-2024-39476.html * https://www.suse.com/security/cve/CVE-2024-40965.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-42226.html * https://www.suse.com/security/cve/CVE-2024-42253.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-44931.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44947.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46716.html * https://www.suse.com/security/cve/CVE-2024-46719.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50259.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://bugzilla.suse.com/show_bug.cgi?id=1054914 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1204171 * https://bugzilla.suse.com/show_bug.cgi?id=1205796 * https://bugzilla.suse.com/show_bug.cgi?id=1206188 * https://bugzilla.suse.com/show_bug.cgi?id=1206344 * https://bugzilla.suse.com/show_bug.cgi?id=1209290 * https://bugzilla.suse.com/show_bug.cgi?id=1210449 * https://bugzilla.suse.com/show_bug.cgi?id=1210627 * https://bugzilla.suse.com/show_bug.cgi?id=1213034 * https://bugzilla.suse.com/show_bug.cgi?id=1216813 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1221333 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223524 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1223919 * https://bugzilla.suse.com/show_bug.cgi?id=1223942 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1225189 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225762 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226560 * https://bugzilla.suse.com/show_bug.cgi?id=1226592 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227437 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1227885 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228709 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229005 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229454 * https://bugzilla.suse.com/show_bug.cgi?id=1229456 * https://bugzilla.suse.com/show_bug.cgi?id=1229556 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229837 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230405 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230715 * https://bugzilla.suse.com/show_bug.cgi?id=1230722 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230903 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231180 * https://bugzilla.suse.com/show_bug.cgi?id=1231181 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231277 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231327 * https://bugzilla.suse.com/show_bug.cgi?id=1231344 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1231383 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231578 * https://bugzilla.suse.com/show_bug.cgi?id=1231646 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231883 * https://bugzilla.suse.com/show_bug.cgi?id=1231885 * https://bugzilla.suse.com/show_bug.cgi?id=1231887 * https://bugzilla.suse.com/show_bug.cgi?id=1231888 * https://bugzilla.suse.com/show_bug.cgi?id=1231889 * https://bugzilla.suse.com/show_bug.cgi?id=1231890 * https://bugzilla.suse.com/show_bug.cgi?id=1231892 * https://bugzilla.suse.com/show_bug.cgi?id=1231893 * https://bugzilla.suse.com/show_bug.cgi?id=1231895 * https://bugzilla.suse.com/show_bug.cgi?id=1231896 * https://bugzilla.suse.com/show_bug.cgi?id=1231897 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231923 * https://bugzilla.suse.com/show_bug.cgi?id=1231929 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231936 * https://bugzilla.suse.com/show_bug.cgi?id=1231937 * https://bugzilla.suse.com/show_bug.cgi?id=1231938 * https://bugzilla.suse.com/show_bug.cgi?id=1231939 * https://bugzilla.suse.com/show_bug.cgi?id=1231940 * https://bugzilla.suse.com/show_bug.cgi?id=1231941 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231958 * https://bugzilla.suse.com/show_bug.cgi?id=1231959 * https://bugzilla.suse.com/show_bug.cgi?id=1231960 * https://bugzilla.suse.com/show_bug.cgi?id=1231961 * https://bugzilla.suse.com/show_bug.cgi?id=1231962 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231972 * https://bugzilla.suse.com/show_bug.cgi?id=1231973 * https://bugzilla.suse.com/show_bug.cgi?id=1231976 * https://bugzilla.suse.com/show_bug.cgi?id=1231978 * https://bugzilla.suse.com/show_bug.cgi?id=1231979 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231991 * https://bugzilla.suse.com/show_bug.cgi?id=1231992 * https://bugzilla.suse.com/show_bug.cgi?id=1231995 * https://bugzilla.suse.com/show_bug.cgi?id=1231996 * https://bugzilla.suse.com/show_bug.cgi?id=1231997 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232001 * https://bugzilla.suse.com/show_bug.cgi?id=1232004 * https://bugzilla.suse.com/show_bug.cgi?id=1232005 * https://bugzilla.suse.com/show_bug.cgi?id=1232006 * https://bugzilla.suse.com/show_bug.cgi?id=1232007 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232025 * https://bugzilla.suse.com/show_bug.cgi?id=1232026 * https://bugzilla.suse.com/show_bug.cgi?id=1232027 * https://bugzilla.suse.com/show_bug.cgi?id=1232028 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232035 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232037 * https://bugzilla.suse.com/show_bug.cgi?id=1232038 * https://bugzilla.suse.com/show_bug.cgi?id=1232039 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232067 * https://bugzilla.suse.com/show_bug.cgi?id=1232069 * https://bugzilla.suse.com/show_bug.cgi?id=1232070 * https://bugzilla.suse.com/show_bug.cgi?id=1232071 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232108 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232119 * https://bugzilla.suse.com/show_bug.cgi?id=1232120 * https://bugzilla.suse.com/show_bug.cgi?id=1232123 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232133 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232136 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232150 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232163 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232170 * https://bugzilla.suse.com/show_bug.cgi?id=1232172 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232175 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232191 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232229 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232233 * https://bugzilla.suse.com/show_bug.cgi?id=1232237 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232286 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232293 * https://bugzilla.suse.com/show_bug.cgi?id=1232304 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232630 * https://bugzilla.suse.com/show_bug.cgi?id=1232631 * https://bugzilla.suse.com/show_bug.cgi?id=1232632 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233134 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233150 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233214 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233528 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://jira.suse.com/browse/PED-1166 * https://jira.suse.com/browse/PED-1168 * https://jira.suse.com/browse/PED-1170 * https://jira.suse.com/browse/PED-1218 * https://jira.suse.com/browse/PED-1220 * https://jira.suse.com/browse/PED-1222 * https://jira.suse.com/browse/PED-1223 * https://jira.suse.com/browse/PED-1225 * https://jira.suse.com/browse/PED-2849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 16:36:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 16:36:07 -0000 Subject: SUSE-SU-2024:4360-1: important: Security update for docker Message-ID: <173445336727.13386.15121921261291220978@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2024:4360-1 Release Date: 2024-12-17T14:36:29Z Rating: important References: * bsc#1217070 * bsc#1228324 * bsc#1228553 * bsc#1229806 * bsc#1230294 * bsc#1230331 * bsc#1230333 * bsc#1231348 * bsc#1232999 * bsc#1233819 Cross-References: * CVE-2023-45142 * CVE-2023-47108 * CVE-2024-41110 CVSS scores: * CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP5 * Containers Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities and has seven security fixes can now be installed. ## Description: This update for docker fixes the following issues: * Update docker-buildx to v0.19.2. See upstream changelog online at . Some notable changelogs from the last update: * * * Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * Disable docker-buildx builds for SLES. It turns out that build containers with docker-buildx don't currently get the SUSE secrets mounts applied, meaning that container-suseconnect doesn't work when building images. bsc#1233819 * Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. * Allow a parallel docker-stable RPM to exists in repositories. * Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at * Allow users to disable SUSE secrets support by setting DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker. (bsc#1231348) * Mark docker-buildx as required since classic "docker build" has been deprecated since Docker 23.0. (bsc#1230331) * Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate package, but with docker-stable it will be necessary to maintain the packages together and it makes more sense to have them live in the same OBS package. (bsc#1230333) * Update to Docker 26.1.5-ce. See upstream changelog online at bsc#1230294 * This update includes fixes for: * CVE-2024-41110. bsc#1228324 * CVE-2023-47108. bsc#1217070 bsc#1229806 * CVE-2023-45142. bsc#1228553 bsc#1229806 * Update to Docker 26.1.4-ce. See upstream changelog online at * Update to Docker 26.1.0-ce. See upstream changelog online at * Update --add-runtime to point to correct binary path. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4360=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4360=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4360=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4360=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4360=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4360=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4360=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4360=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-4360=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-4360=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4360=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4360=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4360=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4360=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4360=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4360=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4360=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4360=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4360=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4360=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4360=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4360=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4360=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4360=1 ## Package List: * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * openSUSE Leap 15.5 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-fish-completion-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * docker-zsh-completion-26.1.5_ce-150000.212.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * openSUSE Leap 15.6 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-fish-completion-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * docker-zsh-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * Containers Module 15-SP5 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * Containers Module 15-SP6 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * docker-fish-completion-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * docker-fish-completion-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * docker-fish-completion-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * docker-rootless-extras-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Enterprise Storage 7.1 (noarch) * docker-fish-completion-26.1.5_ce-150000.212.1 * docker-bash-completion-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * docker-26.1.5_ce-150000.212.1 * docker-debuginfo-26.1.5_ce-150000.212.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45142.html * https://www.suse.com/security/cve/CVE-2023-47108.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://bugzilla.suse.com/show_bug.cgi?id=1217070 * https://bugzilla.suse.com/show_bug.cgi?id=1228324 * https://bugzilla.suse.com/show_bug.cgi?id=1228553 * https://bugzilla.suse.com/show_bug.cgi?id=1229806 * https://bugzilla.suse.com/show_bug.cgi?id=1230294 * https://bugzilla.suse.com/show_bug.cgi?id=1230331 * https://bugzilla.suse.com/show_bug.cgi?id=1230333 * https://bugzilla.suse.com/show_bug.cgi?id=1231348 * https://bugzilla.suse.com/show_bug.cgi?id=1232999 * https://bugzilla.suse.com/show_bug.cgi?id=1233819 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 16:36:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 16:36:10 -0000 Subject: SUSE-SU-2024:4359-1: moderate: Security update for curl Message-ID: <173445337088.13386.7790308584920160372@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:4359-1 Release Date: 2024-12-17T13:19:51Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4359=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4359=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4359=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4359=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4359=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4359=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4359=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4359=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4359=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * libcurl-devel-8.0.1-150400.5.59.1 * Basesystem Module 15-SP5 (x86_64) * libcurl4-32bit-debuginfo-8.0.1-150400.5.59.1 * libcurl4-32bit-8.0.1-150400.5.59.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * libcurl-devel-8.0.1-150400.5.59.1 * openSUSE Leap 15.4 (x86_64) * libcurl-devel-32bit-8.0.1-150400.5.59.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.59.1 * libcurl4-32bit-8.0.1-150400.5.59.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libcurl4-64bit-debuginfo-8.0.1-150400.5.59.1 * libcurl4-64bit-8.0.1-150400.5.59.1 * libcurl-devel-64bit-8.0.1-150400.5.59.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * libcurl-devel-8.0.1-150400.5.59.1 * openSUSE Leap 15.5 (x86_64) * libcurl-devel-32bit-8.0.1-150400.5.59.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.59.1 * libcurl4-32bit-8.0.1-150400.5.59.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * curl-debuginfo-8.0.1-150400.5.59.1 * curl-8.0.1-150400.5.59.1 * curl-debugsource-8.0.1-150400.5.59.1 * libcurl4-debuginfo-8.0.1-150400.5.59.1 * libcurl4-8.0.1-150400.5.59.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 16:36:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 16:36:13 -0000 Subject: SUSE-SU-2024:4358-1: moderate: Security update for python-urllib3_1 Message-ID: <173445337327.13386.6603512354161031525@smelt2.prg2.suse.org> # Security update for python-urllib3_1 Announcement ID: SUSE-SU-2024:4358-1 Release Date: 2024-12-17T13:17:48Z Rating: moderate References: * bsc#1226469 Cross-References: * CVE-2024-37891 CVSS scores: * CVE-2024-37891 ( SUSE ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for python-urllib3_1 fixes the following issues: * CVE-2024-37891: Fixed proxy-authorization request header not stripped during cross-origin redirects (bsc#1226469) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4358=1 openSUSE-SLE-15.6-2024-4358=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4358=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-urllib3_1-1.26.18-150600.3.3.1 * Python 3 Module 15-SP6 (noarch) * python311-urllib3_1-1.26.18-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-37891.html * https://bugzilla.suse.com/show_bug.cgi?id=1226469 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 16:36:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 16:36:16 -0000 Subject: SUSE-SU-2024:4357-1: moderate: Security update for ovmf Message-ID: <173445337604.13386.16050894318915102936@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2024:4357-1 Release Date: 2024-12-17T12:52:23Z Rating: moderate References: * bsc#1225889 Cross-References: * CVE-2024-1298 CVSS scores: * CVE-2024-1298 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2024-1298: MdeModulePkg: Potential UINT32 overflow in S3 ResumeCount (bsc#1225889) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-4357=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4357=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4357=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4357=1 ## Package List: * openSUSE Leap 15.3 (aarch64 x86_64) * ovmf-tools-202008-150300.10.23.1 * ovmf-202008-150300.10.23.1 * openSUSE Leap 15.3 (noarch) * qemu-ovmf-ia32-202008-150300.10.23.1 * qemu-ovmf-x86_64-202008-150300.10.23.1 * qemu-uefi-aarch32-202008-150300.10.23.1 * qemu-uefi-aarch64-202008-150300.10.23.1 * openSUSE Leap 15.3 (x86_64) * qemu-ovmf-x86_64-debug-202008-150300.10.23.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * qemu-ovmf-x86_64-202008-150300.10.23.1 * qemu-uefi-aarch64-202008-150300.10.23.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * qemu-ovmf-x86_64-202008-150300.10.23.1 * qemu-uefi-aarch64-202008-150300.10.23.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * qemu-ovmf-x86_64-202008-150300.10.23.1 * qemu-uefi-aarch64-202008-150300.10.23.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1298.html * https://bugzilla.suse.com/show_bug.cgi?id=1225889 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 16:36:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 16:36:26 -0000 Subject: SUSE-SU-2024:4355-1: important: Security update for libsoup Message-ID: <173445338680.13386.10752301432875056447@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2024:4355-1 Release Date: 2024-12-17T12:35:18Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285) * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292) * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287) Other fixes: \- websocket-test: disconnect error copy after the test ends (glgo#GNOME/libsoup#391). \- fix an intermittent test failure (glgo#GNOME/soup#399). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4355=1 openSUSE-SLE-15.6-2024-4355=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4355=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-3_0-0-3.4.4-150600.3.3.1 * libsoup-devel-3.4.4-150600.3.3.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.3.1 * libsoup-debugsource-3.4.4-150600.3.3.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libsoup-devel-32bit-3.4.4-150600.3.3.1 * libsoup-3_0-0-32bit-3.4.4-150600.3.3.1 * libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * libsoup-lang-3.4.4-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-3_0-0-64bit-3.4.4-150600.3.3.1 * libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.3.1 * libsoup-devel-64bit-3.4.4-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libsoup-3_0-0-3.4.4-150600.3.3.1 * libsoup-devel-3.4.4-150600.3.3.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.3.1 * libsoup-debugsource-3.4.4-150600.3.3.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * libsoup-lang-3.4.4-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 20:31:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 20:31:07 -0000 Subject: SUSE-SU-2024:4367-1: important: Security update for the Linux Kernel Message-ID: <173446746712.26726.30943915633497473@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4367-1 Release Date: 2024-12-17T17:59:55Z Rating: important References: * bsc#1082555 * bsc#1157160 * bsc#1218644 * bsc#1221977 * bsc#1222364 * bsc#1222413 * bsc#1223044 * bsc#1223057 * bsc#1223769 * bsc#1224526 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1228015 * bsc#1228650 * bsc#1228708 * bsc#1228779 * bsc#1230231 * bsc#1230429 * bsc#1230766 * bsc#1230773 * bsc#1230784 * bsc#1230827 * bsc#1231184 * bsc#1231439 * bsc#1231904 * bsc#1231920 * bsc#1231930 * bsc#1232157 * bsc#1232159 * bsc#1232165 * bsc#1232198 * bsc#1232201 * bsc#1232224 * bsc#1232251 * bsc#1232272 * bsc#1232329 * bsc#1232371 * bsc#1232436 * bsc#1232507 * bsc#1232520 * bsc#1232552 * bsc#1232873 * bsc#1232887 * bsc#1232888 * bsc#1232897 * bsc#1232919 * bsc#1232928 * bsc#1233049 * bsc#1233051 * bsc#1233057 * bsc#1233063 * bsc#1233070 * bsc#1233097 * bsc#1233103 * bsc#1233108 * bsc#1233111 * bsc#1233123 * bsc#1233130 * bsc#1233191 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233462 * bsc#1233467 * bsc#1233468 * bsc#1233478 * bsc#1233479 * bsc#1233485 * bsc#1233490 * bsc#1233491 * bsc#1233552 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233577 * bsc#1233580 * bsc#1234025 * bsc#1234072 * bsc#1234087 Cross-References: * CVE-2021-47162 * CVE-2022-48853 * CVE-2024-26801 * CVE-2024-26852 * CVE-2024-26886 * CVE-2024-27051 * CVE-2024-35937 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36954 * CVE-2024-42098 * CVE-2024-42131 * CVE-2024-42229 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-46771 * CVE-2024-46777 * CVE-2024-46800 * CVE-2024-47660 * CVE-2024-47679 * CVE-2024-47701 * CVE-2024-49858 * CVE-2024-49868 * CVE-2024-49884 * CVE-2024-49921 * CVE-2024-49925 * CVE-2024-49938 * CVE-2024-49945 * CVE-2024-49950 * CVE-2024-49952 * CVE-2024-50044 * CVE-2024-50055 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50095 * CVE-2024-50099 * CVE-2024-50115 * CVE-2024-50117 * CVE-2024-50125 * CVE-2024-50135 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50154 * CVE-2024-50167 * CVE-2024-50171 * CVE-2024-50179 * CVE-2024-50183 * CVE-2024-50187 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50210 * CVE-2024-50218 * CVE-2024-50234 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50273 * CVE-2024-50278 * CVE-2024-50279 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50296 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53058 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53104 * CVE-2024-53114 * CVE-2024-53142 CVSS scores: * CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26886 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27051 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46771 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 75 vulnerabilities and has eight security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-48853: swiotlb: fix info leak with DMA_FROM_DEVICE (bsc#1228015). * CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset (bsc#1222413). * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057). * CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044). * CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (bsc#1223769). * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779). * CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered (bsc#1230766). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49938: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (bsc#1232552). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157). * CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (bsc#1231904). * CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329). * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520). * CVE-2024-50074: parport: Proper fix for array out-of-bounds access (bsc#1232507). * CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent (bsc#1232873). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method (bsc#1232897). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888). * CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister (bsc#1233063). * CVE-2024-50150: usb: typec: altmode should keep reference to parent (bsc#1233051). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1233130). * CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed (bsc#1233108). * CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103). * CVE-2024-50218: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (bsc#1233191). * CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming device (bsc#1233211). * CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx (bsc#1233212). * CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (bsc#1233216). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (bsc#1233454). * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490). * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). * CVE-2024-53066: nfs: Fix KMSAN warning in decode_getfattr_attrs() (bsc#1233560). * CVE-2024-53085: tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 bsc#1233577). * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580). * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025). * CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072). The following non-security bugs were fixed: * drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108). * initramfs: avoid filename buffer overrun (bsc#1232436). * kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644). * lpfc: size cpu map by last cpu id set (bsc#1157160). * net: relax socket state check at accept time (git-fixes). * ocfs2: uncache inode which has failed entering the group (bsc#1234087). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4367=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4367=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4367=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.237.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-4.12.14-122.237.1 * kernel-default-debuginfo-4.12.14-122.237.1 * kernel-default-kgraft-devel-4.12.14-122.237.1 * kernel-default-debugsource-4.12.14-122.237.1 * kgraft-patch-4_12_14-122_237-default-1-8.3.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * kernel-syms-4.12.14-122.237.1 * kernel-default-devel-4.12.14-122.237.1 * kernel-default-base-4.12.14-122.237.1 * kernel-default-debuginfo-4.12.14-122.237.1 * kernel-default-debugsource-4.12.14-122.237.1 * kernel-default-base-debuginfo-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * kernel-devel-4.12.14-122.237.1 * kernel-source-4.12.14-122.237.1 * kernel-macros-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x) * kernel-default-man-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * kernel-default-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * kernel-syms-4.12.14-122.237.1 * kernel-default-devel-debuginfo-4.12.14-122.237.1 * kernel-default-devel-4.12.14-122.237.1 * kernel-default-base-4.12.14-122.237.1 * kernel-default-debuginfo-4.12.14-122.237.1 * kernel-default-debugsource-4.12.14-122.237.1 * kernel-default-base-debuginfo-4.12.14-122.237.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * kernel-devel-4.12.14-122.237.1 * kernel-source-4.12.14-122.237.1 * kernel-macros-4.12.14-122.237.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * gfs2-kmp-default-4.12.14-122.237.1 * ocfs2-kmp-default-4.12.14-122.237.1 * gfs2-kmp-default-debuginfo-4.12.14-122.237.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.237.1 * dlm-kmp-default-4.12.14-122.237.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.237.1 * kernel-default-debuginfo-4.12.14-122.237.1 * dlm-kmp-default-debuginfo-4.12.14-122.237.1 * cluster-md-kmp-default-4.12.14-122.237.1 * kernel-default-debugsource-4.12.14-122.237.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc) * kernel-default-4.12.14-122.237.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * gfs2-kmp-default-4.12.14-122.237.1 * ocfs2-kmp-default-4.12.14-122.237.1 * gfs2-kmp-default-debuginfo-4.12.14-122.237.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.237.1 * dlm-kmp-default-4.12.14-122.237.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.237.1 * kernel-default-debuginfo-4.12.14-122.237.1 * dlm-kmp-default-debuginfo-4.12.14-122.237.1 * cluster-md-kmp-default-4.12.14-122.237.1 * kernel-default-debugsource-4.12.14-122.237.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.237.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47162.html * https://www.suse.com/security/cve/CVE-2022-48853.html * https://www.suse.com/security/cve/CVE-2024-26801.html * https://www.suse.com/security/cve/CVE-2024-26852.html * https://www.suse.com/security/cve/CVE-2024-26886.html * https://www.suse.com/security/cve/CVE-2024-27051.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-46771.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49952.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50278.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50296.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1157160 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1221977 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222413 * https://bugzilla.suse.com/show_bug.cgi?id=1223044 * https://bugzilla.suse.com/show_bug.cgi?id=1223057 * https://bugzilla.suse.com/show_bug.cgi?id=1223769 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1228015 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230766 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230784 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1231184 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1232157 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233467 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233485 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 20:31:09 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 20:31:09 -0000 Subject: SUSE-SU-2024:4366-1: moderate: Security update for subversion Message-ID: <173446746980.26726.16458060441955105218@smelt2.prg2.suse.org> # Security update for subversion Announcement ID: SUSE-SU-2024:4366-1 Release Date: 2024-12-17T16:38:47Z Rating: moderate References: * bsc#1234317 Cross-References: * CVE-2024-46901 CVSS scores: * CVE-2024-46901 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46901 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for subversion fixes the following issues: * CVE-2024-46901: Fixed denial-of-service via control characters in paths in mod_dav_svn (bsc#1234317) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4366=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4366=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4366=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4366=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4366=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4366=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4366=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-4366=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-4366=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1 * subversion-devel-1.14.1-150400.5.3.1 * subversion-ruby-debuginfo-1.14.1-150400.5.3.1 * subversion-server-1.14.1-150400.5.3.1 * subversion-perl-1.14.1-150400.5.3.1 * subversion-python-1.14.1-150400.5.3.1 * libsvn_auth_kwallet-1-0-debuginfo-1.14.1-150400.5.3.1 * subversion-tools-debuginfo-1.14.1-150400.5.3.1 * subversion-python-debuginfo-1.14.1-150400.5.3.1 * subversion-perl-debuginfo-1.14.1-150400.5.3.1 * libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-tools-1.14.1-150400.5.3.1 * subversion-ruby-1.14.1-150400.5.3.1 * subversion-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-server-debuginfo-1.14.1-150400.5.3.1 * libsvn_auth_gnome_keyring-1-0-debuginfo-1.14.1-150400.5.3.1 * openSUSE Leap 15.4 (noarch) * subversion-bash-completion-1.14.1-150400.5.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1 * subversion-devel-1.14.1-150400.5.3.1 * subversion-ruby-debuginfo-1.14.1-150400.5.3.1 * subversion-server-1.14.1-150400.5.3.1 * subversion-perl-1.14.1-150400.5.3.1 * subversion-python-1.14.1-150400.5.3.1 * libsvn_auth_kwallet-1-0-debuginfo-1.14.1-150400.5.3.1 * subversion-tools-debuginfo-1.14.1-150400.5.3.1 * subversion-python-debuginfo-1.14.1-150400.5.3.1 * subversion-perl-debuginfo-1.14.1-150400.5.3.1 * libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-tools-1.14.1-150400.5.3.1 * subversion-ruby-1.14.1-150400.5.3.1 * subversion-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-server-debuginfo-1.14.1-150400.5.3.1 * libsvn_auth_gnome_keyring-1-0-debuginfo-1.14.1-150400.5.3.1 * openSUSE Leap 15.5 (noarch) * subversion-bash-completion-1.14.1-150400.5.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1 * subversion-devel-1.14.1-150400.5.3.1 * subversion-ruby-debuginfo-1.14.1-150400.5.3.1 * subversion-server-1.14.1-150400.5.3.1 * subversion-perl-1.14.1-150400.5.3.1 * subversion-python-1.14.1-150400.5.3.1 * libsvn_auth_kwallet-1-0-debuginfo-1.14.1-150400.5.3.1 * subversion-tools-debuginfo-1.14.1-150400.5.3.1 * subversion-python-debuginfo-1.14.1-150400.5.3.1 * subversion-perl-debuginfo-1.14.1-150400.5.3.1 * libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-tools-1.14.1-150400.5.3.1 * subversion-ruby-1.14.1-150400.5.3.1 * subversion-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-server-debuginfo-1.14.1-150400.5.3.1 * libsvn_auth_gnome_keyring-1-0-debuginfo-1.14.1-150400.5.3.1 * openSUSE Leap 15.6 (noarch) * subversion-bash-completion-1.14.1-150400.5.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * subversion-1.14.1-150400.5.3.1 * subversion-devel-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * subversion-1.14.1-150400.5.3.1 * subversion-devel-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * Development Tools Module 15-SP5 (noarch) * subversion-bash-completion-1.14.1-150400.5.3.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * subversion-perl-1.14.1-150400.5.3.1 * subversion-python-1.14.1-150400.5.3.1 * subversion-tools-debuginfo-1.14.1-150400.5.3.1 * subversion-python-debuginfo-1.14.1-150400.5.3.1 * subversion-perl-debuginfo-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-tools-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * Development Tools Module 15-SP6 (noarch) * subversion-bash-completion-1.14.1-150400.5.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * subversion-perl-1.14.1-150400.5.3.1 * subversion-python-1.14.1-150400.5.3.1 * subversion-tools-debuginfo-1.14.1-150400.5.3.1 * subversion-python-debuginfo-1.14.1-150400.5.3.1 * subversion-perl-debuginfo-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-tools-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * subversion-server-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-server-debuginfo-1.14.1-150400.5.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * subversion-server-1.14.1-150400.5.3.1 * subversion-debuginfo-1.14.1-150400.5.3.1 * subversion-debugsource-1.14.1-150400.5.3.1 * subversion-server-debuginfo-1.14.1-150400.5.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-46901.html * https://bugzilla.suse.com/show_bug.cgi?id=1234317 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 17 20:31:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 17 Dec 2024 20:31:13 -0000 Subject: SUSE-SU-2024:4365-1: important: Security update for libsoup Message-ID: <173446747375.26726.3468344221201989575@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2024:4365-1 Release Date: 2024-12-17T15:58:34Z Rating: important References: * bsc#1233285 * bsc#1233287 * bsc#1233292 Cross-References: * CVE-2024-52530 * CVE-2024-52531 * CVE-2024-52532 CVSS scores: * CVE-2024-52530 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-52532 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285) * CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292) * CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287) Other fixes: \- websocket-test: disconnect error copy after the test ends (glgo#GNOME/libsoup#391). \- fix an intermittent test failure (glgo#GNOME/soup#399). \- updated to version 2.68.4. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4365=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4365=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4365=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4365=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4365=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4365=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4365=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4365=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4365=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * libsoup-lang-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * libsoup-lang-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libsoup-lang-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libsoup-lang-2.68.4-150200.4.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Enterprise Storage 7.1 (noarch) * libsoup-lang-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * libsoup-lang-2.68.4-150200.4.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.68.4-150200.4.3.1 * libsoup-debugsource-2.68.4-150200.4.3.1 * libsoup-2_4-1-2.68.4-150200.4.3.1 * libsoup-devel-2.68.4-150200.4.3.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libsoup-lang-2.68.4-150200.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52530.html * https://www.suse.com/security/cve/CVE-2024-52531.html * https://www.suse.com/security/cve/CVE-2024-52532.html * https://bugzilla.suse.com/show_bug.cgi?id=1233285 * https://bugzilla.suse.com/show_bug.cgi?id=1233287 * https://bugzilla.suse.com/show_bug.cgi?id=1233292 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Dec 18 16:38:56 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 18 Dec 2024 16:38:56 -0000 Subject: SUSE-SU-2024:4376-1: important: Security update for the Linux Kernel Message-ID: <173453993661.13579.879143785511973356@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4376-1 Release Date: Rating: important References: * bsc#1082555 * bsc#1194869 * bsc#1218644 * bsc#1220382 * bsc#1221309 * bsc#1221333 * bsc#1222364 * bsc#1222590 * bsc#1223202 * bsc#1223656 * bsc#1223848 * bsc#1223919 * bsc#1223942 * bsc#1224518 * bsc#1224526 * bsc#1224574 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225812 * bsc#1226560 * bsc#1226592 * bsc#1226631 * bsc#1226748 * bsc#1226872 * bsc#1227853 * bsc#1228410 * bsc#1228430 * bsc#1228486 * bsc#1228650 * bsc#1228857 * bsc#1229312 * bsc#1229429 * bsc#1229585 * bsc#1229752 * bsc#1229808 * bsc#1230055 * bsc#1230220 * bsc#1230231 * bsc#1230270 * bsc#1230558 * bsc#1230827 * bsc#1230918 * bsc#1231083 * bsc#1231089 * bsc#1231098 * bsc#1231101 * bsc#1231108 * bsc#1231111 * bsc#1231132 * bsc#1231135 * bsc#1231138 * bsc#1231169 * bsc#1231178 * bsc#1231180 * bsc#1231181 * bsc#1231187 * bsc#1231202 * bsc#1231434 * bsc#1231441 * bsc#1231452 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231537 * bsc#1231541 * bsc#1231646 * bsc#1231849 * bsc#1231856 * bsc#1231858 * bsc#1231859 * bsc#1231864 * bsc#1231904 * bsc#1231916 * bsc#1231920 * bsc#1231923 * bsc#1231930 * bsc#1231931 * bsc#1231947 * bsc#1231952 * bsc#1231953 * bsc#1231959 * bsc#1231978 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232027 * bsc#1232028 * bsc#1232047 * bsc#1232048 * bsc#1232050 * bsc#1232056 * bsc#1232076 * bsc#1232080 * bsc#1232094 * bsc#1232096 * bsc#1232098 * bsc#1232111 * bsc#1232126 * bsc#1232134 * bsc#1232135 * bsc#1232141 * bsc#1232142 * bsc#1232147 * bsc#1232152 * bsc#1232159 * bsc#1232162 * bsc#1232165 * bsc#1232180 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232195 * bsc#1232198 * bsc#1232201 * bsc#1232218 * bsc#1232224 * bsc#1232232 * bsc#1232254 * bsc#1232255 * bsc#1232264 * bsc#1232272 * bsc#1232279 * bsc#1232287 * bsc#1232293 * bsc#1232312 * bsc#1232317 * bsc#1232318 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232339 * bsc#1232349 * bsc#1232357 * bsc#1232359 * bsc#1232362 * bsc#1232364 * bsc#1232370 * bsc#1232371 * bsc#1232378 * bsc#1232385 * bsc#1232387 * bsc#1232394 * bsc#1232413 * bsc#1232416 * bsc#1232436 * bsc#1232483 * bsc#1232500 * bsc#1232503 * bsc#1232504 * bsc#1232507 * bsc#1232520 * bsc#1232552 * bsc#1232757 * bsc#1232819 * bsc#1232860 * bsc#1232870 * bsc#1232873 * bsc#1232877 * bsc#1232878 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232919 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233035 * bsc#1233049 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233117 * bsc#1233123 * bsc#1233125 * bsc#1233129 * bsc#1233130 * bsc#1233134 * bsc#1233135 * bsc#1233150 * bsc#1233189 * bsc#1233191 * bsc#1233197 * bsc#1233205 * bsc#1233206 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233214 * bsc#1233216 * bsc#1233238 * bsc#1233241 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233350 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233528 * bsc#1233548 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233570 * bsc#1233577 * bsc#1233580 * bsc#1233977 * bsc#1234012 * bsc#1234025 * bsc#1234085 * bsc#1234093 * bsc#1234098 * bsc#1234108 * jsc#PED-1166 * jsc#PED-1168 * jsc#PED-1170 * jsc#PED-1218 * jsc#PED-1220 * jsc#PED-1222 * jsc#PED-1223 * jsc#PED-1225 * jsc#PED-2849 * jsc#SES-1880 Cross-References: * CVE-2021-47594 * CVE-2022-48674 * CVE-2022-48979 * CVE-2022-48982 * CVE-2022-48983 * CVE-2022-48989 * CVE-2022-48990 * CVE-2023-52915 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52921 * CVE-2023-52922 * CVE-2024-26782 * CVE-2024-26906 * CVE-2024-26953 * CVE-2024-35888 * CVE-2024-35937 * CVE-2024-35980 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36953 * CVE-2024-36954 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38615 * CVE-2024-40997 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41049 * CVE-2024-42131 * CVE-2024-43817 * CVE-2024-43897 * CVE-2024-44932 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-46681 * CVE-2024-46800 * CVE-2024-46802 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46807 * CVE-2024-46810 * CVE-2024-46812 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46835 * CVE-2024-46842 * CVE-2024-46853 * CVE-2024-46859 * CVE-2024-46864 * CVE-2024-46871 * CVE-2024-47663 * CVE-2024-47665 * CVE-2024-47667 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47679 * CVE-2024-47682 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47709 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47718 * CVE-2024-47723 * CVE-2024-47728 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47742 * CVE-2024-47745 * CVE-2024-47749 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49855 * CVE-2024-49861 * CVE-2024-49863 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49879 * CVE-2024-49884 * CVE-2024-49891 * CVE-2024-49900 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49921 * CVE-2024-49924 * CVE-2024-49925 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49938 * CVE-2024-49945 * CVE-2024-49947 * CVE-2024-49950 * CVE-2024-49957 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49968 * CVE-2024-49981 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49989 * CVE-2024-50003 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50013 * CVE-2024-50017 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50031 * CVE-2024-50044 * CVE-2024-50062 * CVE-2024-50067 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50082 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50138 * CVE-2024-50141 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50160 * CVE-2024-50167 * CVE-2024-50171 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50215 * CVE-2024-50218 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50249 * CVE-2024-50255 * CVE-2024-50259 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53052 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53079 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53104 * CVE-2024-53110 CVSS scores: * CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48979 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48990 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50259 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53110 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 230 vulnerabilities, contains 10 features and has 33 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560). * CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592). * CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808). * CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920). * CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135). * CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890). * CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056). * CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107). * CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily- mapped VPEs (bsc#1233106). * CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103). * CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). * CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580). * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025). * CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085). The following non-security bugs were fixed: * Drop OCFS2 patch causing a regression (bsc#1233255). * Fix regression on AMDGPU driver (bsc#1233134). * Removed the duplicated check of static_assert(sizeof(struct work_struct) >= sizeof(struct rcu_head)). * Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108). * Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes). * Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git- fixes). * Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git- fixes). * Update config files (bsc#1218644). * Update config files. Enabled IDPF for ARM64 (bsc#1221309) * acpi: CPPC: Fix _CPC register setting issue (git-fixes). * acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * add bugreference to a hv_netvsc patch (bsc#1232413). * alsa: 6fire: Release resources at card release (git-fixes). * alsa: ac97: bus: Fix the mistake in the comment (git-fixes). * alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * alsa: hda/realtek: Update ALC225 depop procedure (git-fixes). * alsa: hda/realtek: Update ALC256 depop procedure (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes). * alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes) * arm64: Force position-independent veneers (git-fixes). * arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes). * arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes) * arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git- fixes) * arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes) * arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git- fixes) * arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes) * asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528). * block: Avoid leaking hctx->nr_active counter on batched completion (bsc#1231923). * bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes). * bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes). * bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: Wait for FLR to complete during probe (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes). * can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes). * can: j1939: j1939_session_new(): fix skb reference counting (git-fixes). * can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git- fixes). * can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes). * can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * chtls: fix tp->rcv_tstamp initialization (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * drivers: net: prevent tun_build_skb() to exceed the packet size limit (git- fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: Fix skb truesize underestimation (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: core: zero-initialize the report buffer (git-fixes). * hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * hid: multitouch: Add support for B2402FVA track point (stable-fixes). * hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes). * hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * hid: wacom: fix when get product name maybe null pointer (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Fix filter input checks to prevent config with invalid values (git- fixes). * i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: Restore VF MSI-X state during PCI reset (git-fixes). * i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes). * i40e: disable NAPI right after disabling irqs when handling xsk_pool (git- fixes). * i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes). * i40e: take into account XDP Tx queues when stopping rings (git-fixes). * iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * iavf: Fix promiscuous mode configuration flow messages (git-fixes). * iavf: Introduce new state machines for flow director (git-fixes). * iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git- fixes). * iavf: fix FDIR rule fields masks validation (git-fixes). * iavf: in iavf_down, disable queues when removing the driver (git-fixes). * iavf: initialize waitqueues before starting watchdog_task (git-fixes). * iavf: send VLAN offloading caps once after VFR (git-fixes). * iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git- fixes). * ibmvnic: Do partial reset on login failure (bsc#1233150). * ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150). * ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150). * ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150). * ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150). * ice: Block switchdev mode when ADQ is active and vice versa (git-fixes). * ice: Fix NULL pointer deref during VF reset (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix link_down_on_close message (git-fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Shut down VSI with "link-down-on-close" enabled (git-fixes). * ice: avoid executing commands on other ports when driving sync (git-fixes). * ice: change q_index variable type to s16 to store -1 value (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix over-shifted variable (git-fixes). * ice: fix receive buffer size miscalculation (git-fixes). * ice: ice_aq_check_events: fix off-by-one check when filling buffer (git- fixes). * ice: reset first in crash dump kernels (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: virtchnl: stop pretending to support RSS over AQ or registers (git- fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git- fixes). * idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes). * idpf: disable local BH when scheduling napi for marker packets (git-fixes). * idpf: distinguish vports by the dev_port attribute (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Fix missing time sync events (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igb: extend PTP timestamp adjustments to i211 (git-fixes). * igc: Check VLAN EtherType mask (git-fixes). * igc: Check VLAN TCI mask (git-fixes). * igc: Fix hicredit calculation (git-fixes). * igc: Fix missing time sync events (git-fixes). * igc: Remove temporary workaround (git-fixes). * igc: Report VLAN EtherType matching back to user (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes). * input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes). * input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes). * input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git- fixes). * input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git- fixes). * ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes). * ixgbe: fix crash with empty VF macvlan list (git-fixes). * ixgbe: fix timestamp configuration code (git-fixes). * ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes). * kABI: Restore exported __arm_smccc_sve_check (git-fixes) * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes) * kexec: fix a memory leak in crash_shrink_memory() (git-fixes). * kvm: PPC: Book3S HV: remove unused varible (bsc#1194869). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes). * media: dvb-usb-v2: af9035: fix missing unlock (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Allow 0 for total host VFs (git-fixes). * net/mlx5: Correctly compare pkt reformat ids (git-fixes). * net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes). * net/mlx5: DR, Use the right GVMI number for drop action (git-fixes). * net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes). * net/mlx5: Drain health before unregistering devlink (git-fixes). * net/mlx5: E-switch, register event handler before arming the event (git- fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix fw tracer first block check (git-fixes). * net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes). * net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes). * net/mlx5: Skip clock update work when device is in error state (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes). * net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes). * net/mlx5: Use recovery timeout on sync reset flow (git-fixes). * net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes). * net/mlx5: fs, lock FTE when checking if active (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes). * net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes). * net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes). * net/mlx5e: Change the warning when ignore_flow_level is not supported (git- fixes). * net/mlx5e: Check return value of snprintf writing to fw_version buffer (git- fixes). * net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes). * net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git- fixes). * net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not offload internal port if filter device is out device (git- fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Fix pedit endianness (git-fixes). * net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes). * net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git- fixes). * net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes). * net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes). * net/mlx5e: Reduce the size of icosq_str (git-fixes). * net/mlx5e: Take state lock during tx timeout reporter (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes). * net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git- fixes). * net/mlx5e: fix double free of encap_header (git-fixes). * net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git- fixes). * net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes). * net: ena: Fix potential sign extension issue (git-fixes). * net: ena: Remove ena_select_queue (git-fixes). * net: ena: Wrong missing IO completions check order (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * pci: Add T_PVPERL macro (git-fixes). * pci: Fix reset_method_store() memory leak (git-fixes). * pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * pci: rockchip-ep: Fix address translation unit programming (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869). * powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869). * powerpc/kexec: Fix return of uninitialized variable (bsc#1194869). * powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869). * powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869). * powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869). * powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869). * powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869). * powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869). * powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869). * qed: avoid truncating work queue length (git-fixes). * rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * rdma/hns: Add clear_hem return value to log (git-fixes) * rdma/hns: Add mutex_destroy() (git-fixes) * rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes) * rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * rdma/hns: Remove unnecessary QP type checks (git-fixes) * rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * rdma/hns: Use macro instead of magic number (git-fixes) * rdma/mlx5: Move events notifier registration to be after device registration (git-fixes) * rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * rdma/rxe: Fix the qp flush warnings in req (git-fixes) * rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * sfc: Check firmware supports Ethernet PTP filter (git-fixes). * sfc: do not unregister flow_indr if it was never registered (git-fixes). * sfc: fix a double-free bug in efx_probe_filters (git-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes). * tun: prevent negative ifindex (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * usb: chaoskey: fail open after removal (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * usb: serial: io_edgeport: fix use after free in debug printk (git-fixes). * usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * usb: serial: option: add Quectel RG650V (stable-fixes). * usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * vdpa/mlx5: preserve CVQ vringh index (git-fixes). * watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes). * watchdog: rti: of: honor timeout-sec property (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * x86/kvm: fix is_stale_page_fault() (bsc#1221333). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4376=1 openSUSE-SLE-15.5-2024-4376=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4376=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * kernel-azure-extra-debuginfo-5.14.21-150500.33.75.1 * kernel-azure-debugsource-5.14.21-150500.33.75.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.75.1 * kernel-azure-devel-5.14.21-150500.33.75.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.75.1 * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.75.1 * cluster-md-kmp-azure-5.14.21-150500.33.75.1 * kernel-syms-azure-5.14.21-150500.33.75.1 * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.75.1 * kernel-azure-extra-5.14.21-150500.33.75.1 * kernel-azure-debuginfo-5.14.21-150500.33.75.1 * gfs2-kmp-azure-5.14.21-150500.33.75.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.75.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.75.1 * kernel-azure-optional-5.14.21-150500.33.75.1 * kselftests-kmp-azure-5.14.21-150500.33.75.1 * reiserfs-kmp-azure-5.14.21-150500.33.75.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.75.1 * dlm-kmp-azure-5.14.21-150500.33.75.1 * ocfs2-kmp-azure-5.14.21-150500.33.75.1 * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.75.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.75.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-5.14.21-150500.33.75.1 * kernel-azure-vdso-debuginfo-5.14.21-150500.33.75.1 * openSUSE Leap 15.5 (noarch) * kernel-devel-azure-5.14.21-150500.33.75.1 * kernel-source-azure-5.14.21-150500.33.75.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.75.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-azure-debugsource-5.14.21-150500.33.75.1 * kernel-syms-azure-5.14.21-150500.33.75.1 * kernel-azure-devel-5.14.21-150500.33.75.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.75.1 * kernel-azure-debuginfo-5.14.21-150500.33.75.1 * Public Cloud Module 15-SP5 (noarch) * kernel-devel-azure-5.14.21-150500.33.75.1 * kernel-source-azure-5.14.21-150500.33.75.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47594.html * https://www.suse.com/security/cve/CVE-2022-48674.html * https://www.suse.com/security/cve/CVE-2022-48979.html * https://www.suse.com/security/cve/CVE-2022-48982.html * https://www.suse.com/security/cve/CVE-2022-48983.html * https://www.suse.com/security/cve/CVE-2022-48989.html * https://www.suse.com/security/cve/CVE-2022-48990.html * https://www.suse.com/security/cve/CVE-2023-52915.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26906.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35937.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36953.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38615.html * https://www.suse.com/security/cve/CVE-2024-40997.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41049.html * https://www.suse.com/security/cve/CVE-2024-42131.html * https://www.suse.com/security/cve/CVE-2024-43817.html * https://www.suse.com/security/cve/CVE-2024-43897.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50259.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53110.html * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1221333 * https://bugzilla.suse.com/show_bug.cgi?id=1222364 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223202 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1223919 * https://bugzilla.suse.com/show_bug.cgi?id=1223942 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224526 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225812 * https://bugzilla.suse.com/show_bug.cgi?id=1226560 * https://bugzilla.suse.com/show_bug.cgi?id=1226592 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227853 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228486 * https://bugzilla.suse.com/show_bug.cgi?id=1228650 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229752 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230270 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231180 * https://bugzilla.suse.com/show_bug.cgi?id=1231181 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231646 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231923 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231959 * https://bugzilla.suse.com/show_bug.cgi?id=1231978 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232027 * https://bugzilla.suse.com/show_bug.cgi?id=1232028 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232293 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233134 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233150 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233214 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233528 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234085 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://jira.suse.com/browse/PED-1166 * https://jira.suse.com/browse/PED-1168 * https://jira.suse.com/browse/PED-1170 * https://jira.suse.com/browse/PED-1218 * https://jira.suse.com/browse/PED-1220 * https://jira.suse.com/browse/PED-1222 * https://jira.suse.com/browse/PED-1223 * https://jira.suse.com/browse/PED-1225 * https://jira.suse.com/browse/PED-2849 * https://jira.suse.com/browse/SES-1880 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 19 12:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 19 Dec 2024 12:30:06 -0000 Subject: SUSE-SU-2024:3927-2: moderate: Security update for curl Message-ID: <173461140658.18828.2694021910295639450@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:3927-2 Release Date: 2024-12-19T10:22:13Z Rating: moderate References: * bsc#1232528 Cross-References: * CVE-2024-9681 CVSS scores: * CVE-2024-9681 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-9681 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-9681 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-9681 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-9681: Fixed HSTS subdomain overwrites parent cache entry (bsc#1232528) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-3927=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3927=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libcurl-devel-8.0.1-11.98.1 * curl-debugsource-8.0.1-11.98.1 * curl-8.0.1-11.98.1 * libcurl4-debuginfo-8.0.1-11.98.1 * libcurl4-8.0.1-11.98.1 * curl-debuginfo-8.0.1-11.98.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libcurl4-32bit-8.0.1-11.98.1 * libcurl4-debuginfo-32bit-8.0.1-11.98.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libcurl-devel-8.0.1-11.98.1 * curl-debugsource-8.0.1-11.98.1 * curl-8.0.1-11.98.1 * libcurl4-debuginfo-8.0.1-11.98.1 * libcurl4-32bit-8.0.1-11.98.1 * libcurl4-debuginfo-32bit-8.0.1-11.98.1 * libcurl4-8.0.1-11.98.1 * curl-debuginfo-8.0.1-11.98.1 ## References: * https://www.suse.com/security/cve/CVE-2024-9681.html * https://bugzilla.suse.com/show_bug.cgi?id=1232528 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 19 12:30:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 19 Dec 2024 12:30:08 -0000 Subject: SUSE-SU-2024:4051-2: important: Security update for glib2 Message-ID: <173461140868.18828.10517551786480318060@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2024:4051-2 Release Date: 2024-12-19T10:22:08Z Rating: important References: * bsc#1233282 Cross-References: * CVE-2024-52533 CVSS scores: * CVE-2024-52533 ( SUSE ): 7.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2024-52533: Fixed a single byte buffer overflow (bsc#1233282). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4051=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4051=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * glib2-devel-debuginfo-2.48.2-12.43.1 * glib2-devel-2.48.2-12.43.1 * libgmodule-2_0-0-2.48.2-12.43.1 * libgio-2_0-0-debuginfo-2.48.2-12.43.1 * libgio-2_0-0-2.48.2-12.43.1 * libgthread-2_0-0-debuginfo-2.48.2-12.43.1 * libglib-2_0-0-debuginfo-2.48.2-12.43.1 * libgobject-2_0-0-2.48.2-12.43.1 * libgmodule-2_0-0-debuginfo-2.48.2-12.43.1 * glib2-debugsource-2.48.2-12.43.1 * glib2-tools-2.48.2-12.43.1 * libgthread-2_0-0-2.48.2-12.43.1 * libglib-2_0-0-2.48.2-12.43.1 * libgobject-2_0-0-debuginfo-2.48.2-12.43.1 * glib2-tools-debuginfo-2.48.2-12.43.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * glib2-lang-2.48.2-12.43.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libgio-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgobject-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgmodule-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libglib-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgio-2_0-0-32bit-2.48.2-12.43.1 * libgmodule-2_0-0-32bit-2.48.2-12.43.1 * libgobject-2_0-0-32bit-2.48.2-12.43.1 * libgthread-2_0-0-32bit-2.48.2-12.43.1 * libgthread-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libglib-2_0-0-32bit-2.48.2-12.43.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libgio-2_0-0-debuginfo-2.48.2-12.43.1 * libgthread-2_0-0-2.48.2-12.43.1 * libgobject-2_0-0-32bit-2.48.2-12.43.1 * libglib-2_0-0-2.48.2-12.43.1 * libgobject-2_0-0-debuginfo-2.48.2-12.43.1 * libgthread-2_0-0-32bit-2.48.2-12.43.1 * libglib-2_0-0-32bit-2.48.2-12.43.1 * libgmodule-2_0-0-2.48.2-12.43.1 * libgio-2_0-0-2.48.2-12.43.1 * libglib-2_0-0-debuginfo-2.48.2-12.43.1 * libgobject-2_0-0-2.48.2-12.43.1 * libglib-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgio-2_0-0-32bit-2.48.2-12.43.1 * glib2-tools-2.48.2-12.43.1 * libgthread-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * glib2-devel-debuginfo-2.48.2-12.43.1 * glib2-devel-2.48.2-12.43.1 * libgobject-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgio-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgthread-2_0-0-debuginfo-2.48.2-12.43.1 * libgmodule-2_0-0-debuginfo-32bit-2.48.2-12.43.1 * libgmodule-2_0-0-debuginfo-2.48.2-12.43.1 * glib2-debugsource-2.48.2-12.43.1 * libgmodule-2_0-0-32bit-2.48.2-12.43.1 * glib2-tools-debuginfo-2.48.2-12.43.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * glib2-lang-2.48.2-12.43.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52533.html * https://bugzilla.suse.com/show_bug.cgi?id=1233282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 19 12:30:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 19 Dec 2024 12:30:12 -0000 Subject: SUSE-SU-2024:4284-2: moderate: Security update for curl Message-ID: <173461141246.18828.5131983141124755080@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:4284-2 Release Date: 2024-12-19T10:22:01Z Rating: moderate References: * bsc#1234068 Cross-References: * CVE-2024-11053 CVSS scores: * CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4284=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libcurl4-32bit-8.0.1-11.101.1 * curl-8.0.1-11.101.1 * curl-debugsource-8.0.1-11.101.1 * libcurl-devel-8.0.1-11.101.1 * libcurl4-8.0.1-11.101.1 * libcurl4-debuginfo-32bit-8.0.1-11.101.1 * libcurl4-debuginfo-8.0.1-11.101.1 * curl-debuginfo-8.0.1-11.101.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11053.html * https://bugzilla.suse.com/show_bug.cgi?id=1234068 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 19 16:36:55 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 19 Dec 2024 16:36:55 -0000 Subject: SUSE-SU-2024:4387-1: important: Security update for the Linux Kernel Message-ID: <173462621517.20541.5228706502436369234@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4387-1 Release Date: 2024-12-19T15:39:03Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1082555 * bsc#1194869 * bsc#1215199 * bsc#1217845 * bsc#1218562 * bsc#1218644 * bsc#1219596 * bsc#1219803 * bsc#1220382 * bsc#1221309 * bsc#1222423 * bsc#1222587 * bsc#1222590 * bsc#1223112 * bsc#1223384 * bsc#1223656 * bsc#1223700 * bsc#1223733 * bsc#1223824 * bsc#1223848 * bsc#1224088 * bsc#1224429 * bsc#1224518 * bsc#1224548 * bsc#1224574 * bsc#1224948 * bsc#1225611 * bsc#1225713 * bsc#1225725 * bsc#1225730 * bsc#1225742 * bsc#1225764 * bsc#1225768 * bsc#1225813 * bsc#1225903 * bsc#1226003 * bsc#1226130 * bsc#1226498 * bsc#1226623 * bsc#1226631 * bsc#1226748 * bsc#1226797 * bsc#1226848 * bsc#1226872 * bsc#1227726 * bsc#1227842 * bsc#1228119 * bsc#1228244 * bsc#1228269 * bsc#1228410 * bsc#1228430 * bsc#1228454 * bsc#1228537 * bsc#1228620 * bsc#1228743 * bsc#1228747 * bsc#1228850 * bsc#1228857 * bsc#1229019 * bsc#1229165 * bsc#1229429 * bsc#1229450 * bsc#1229585 * bsc#1229677 * bsc#1229769 * bsc#1229808 * bsc#1229891 * bsc#1230055 * bsc#1230132 * bsc#1230179 * bsc#1230220 * bsc#1230231 * bsc#1230289 * bsc#1230295 * bsc#1230339 * bsc#1230341 * bsc#1230375 * bsc#1230414 * bsc#1230429 * bsc#1230456 * bsc#1230501 * bsc#1230527 * bsc#1230550 * bsc#1230558 * bsc#1230600 * bsc#1230620 * bsc#1230710 * bsc#1230733 * bsc#1230762 * bsc#1230763 * bsc#1230773 * bsc#1230774 * bsc#1230801 * bsc#1230817 * bsc#1230831 * bsc#1230914 * bsc#1230918 * bsc#1230971 * bsc#1231016 * bsc#1231035 * bsc#1231072 * bsc#1231073 * bsc#1231075 * bsc#1231076 * bsc#1231081 * bsc#1231082 * bsc#1231083 * bsc#1231084 * bsc#1231085 * bsc#1231087 * bsc#1231089 * bsc#1231092 * bsc#1231093 * bsc#1231094 * bsc#1231096 * bsc#1231098 * bsc#1231100 * bsc#1231101 * bsc#1231102 * bsc#1231105 * bsc#1231108 * bsc#1231111 * bsc#1231114 * bsc#1231115 * bsc#1231116 * bsc#1231117 * bsc#1231131 * bsc#1231132 * bsc#1231135 * bsc#1231136 * bsc#1231138 * bsc#1231148 * bsc#1231169 * bsc#1231170 * bsc#1231171 * bsc#1231178 * bsc#1231179 * bsc#1231182 * bsc#1231183 * bsc#1231187 * bsc#1231191 * bsc#1231193 * bsc#1231195 * bsc#1231197 * bsc#1231200 * bsc#1231202 * bsc#1231203 * bsc#1231276 * bsc#1231293 * bsc#1231384 * bsc#1231434 * bsc#1231435 * bsc#1231436 * bsc#1231439 * bsc#1231440 * bsc#1231441 * bsc#1231442 * bsc#1231452 * bsc#1231453 * bsc#1231465 * bsc#1231474 * bsc#1231481 * bsc#1231496 * bsc#1231502 * bsc#1231537 * bsc#1231539 * bsc#1231540 * bsc#1231541 * bsc#1231617 * bsc#1231630 * bsc#1231634 * bsc#1231635 * bsc#1231636 * bsc#1231637 * bsc#1231638 * bsc#1231639 * bsc#1231640 * bsc#1231673 * bsc#1231828 * bsc#1231849 * bsc#1231855 * bsc#1231856 * bsc#1231857 * bsc#1231858 * bsc#1231859 * bsc#1231860 * bsc#1231861 * bsc#1231864 * bsc#1231865 * bsc#1231868 * bsc#1231869 * bsc#1231871 * bsc#1231872 * bsc#1231901 * bsc#1231902 * bsc#1231903 * bsc#1231904 * bsc#1231906 * bsc#1231907 * bsc#1231908 * bsc#1231914 * bsc#1231916 * bsc#1231920 * bsc#1231924 * bsc#1231926 * bsc#1231930 * bsc#1231931 * bsc#1231935 * bsc#1231942 * bsc#1231944 * bsc#1231946 * bsc#1231947 * bsc#1231950 * bsc#1231951 * bsc#1231952 * bsc#1231953 * bsc#1231954 * bsc#1231955 * bsc#1231956 * bsc#1231957 * bsc#1231965 * bsc#1231967 * bsc#1231968 * bsc#1231987 * bsc#1231988 * bsc#1231989 * bsc#1231990 * bsc#1231998 * bsc#1232000 * bsc#1232003 * bsc#1232009 * bsc#1232013 * bsc#1232015 * bsc#1232016 * bsc#1232017 * bsc#1232018 * bsc#1232033 * bsc#1232034 * bsc#1232036 * bsc#1232043 * bsc#1232047 * bsc#1232048 * bsc#1232049 * bsc#1232050 * bsc#1232056 * bsc#1232075 * bsc#1232076 * bsc#1232079 * bsc#1232080 * bsc#1232083 * bsc#1232084 * bsc#1232085 * bsc#1232089 * bsc#1232090 * bsc#1232093 * bsc#1232094 * bsc#1232096 * bsc#1232097 * bsc#1232098 * bsc#1232103 * bsc#1232104 * bsc#1232105 * bsc#1232109 * bsc#1232111 * bsc#1232114 * bsc#1232116 * bsc#1232117 * bsc#1232124 * bsc#1232126 * bsc#1232127 * bsc#1232129 * bsc#1232130 * bsc#1232131 * bsc#1232132 * bsc#1232134 * bsc#1232135 * bsc#1232140 * bsc#1232141 * bsc#1232142 * bsc#1232145 * bsc#1232147 * bsc#1232148 * bsc#1232149 * bsc#1232151 * bsc#1232152 * bsc#1232154 * bsc#1232155 * bsc#1232156 * bsc#1232159 * bsc#1232160 * bsc#1232162 * bsc#1232164 * bsc#1232165 * bsc#1232174 * bsc#1232180 * bsc#1232182 * bsc#1232183 * bsc#1232185 * bsc#1232187 * bsc#1232189 * bsc#1232192 * bsc#1232195 * bsc#1232196 * bsc#1232198 * bsc#1232199 * bsc#1232200 * bsc#1232201 * bsc#1232207 * bsc#1232208 * bsc#1232217 * bsc#1232218 * bsc#1232220 * bsc#1232221 * bsc#1232222 * bsc#1232224 * bsc#1232232 * bsc#1232250 * bsc#1232251 * bsc#1232253 * bsc#1232254 * bsc#1232255 * bsc#1232256 * bsc#1232258 * bsc#1232259 * bsc#1232260 * bsc#1232262 * bsc#1232263 * bsc#1232264 * bsc#1232272 * bsc#1232275 * bsc#1232279 * bsc#1232282 * bsc#1232285 * bsc#1232287 * bsc#1232295 * bsc#1232305 * bsc#1232307 * bsc#1232309 * bsc#1232310 * bsc#1232312 * bsc#1232313 * bsc#1232314 * bsc#1232315 * bsc#1232316 * bsc#1232317 * bsc#1232318 * bsc#1232329 * bsc#1232332 * bsc#1232333 * bsc#1232334 * bsc#1232335 * bsc#1232337 * bsc#1232339 * bsc#1232340 * bsc#1232342 * bsc#1232345 * bsc#1232349 * bsc#1232352 * bsc#1232354 * bsc#1232355 * bsc#1232357 * bsc#1232358 * bsc#1232359 * bsc#1232361 * bsc#1232362 * bsc#1232366 * bsc#1232367 * bsc#1232368 * bsc#1232369 * bsc#1232370 * bsc#1232371 * bsc#1232374 * bsc#1232378 * bsc#1232381 * bsc#1232383 * bsc#1232385 * bsc#1232386 * bsc#1232387 * bsc#1232392 * bsc#1232394 * bsc#1232395 * bsc#1232396 * bsc#1232413 * bsc#1232416 * bsc#1232417 * bsc#1232418 * bsc#1232424 * bsc#1232427 * bsc#1232432 * bsc#1232435 * bsc#1232436 * bsc#1232442 * bsc#1232446 * bsc#1232483 * bsc#1232494 * bsc#1232498 * bsc#1232499 * bsc#1232500 * bsc#1232501 * bsc#1232502 * bsc#1232503 * bsc#1232504 * bsc#1232505 * bsc#1232506 * bsc#1232507 * bsc#1232511 * bsc#1232519 * bsc#1232520 * bsc#1232529 * bsc#1232552 * bsc#1232623 * bsc#1232626 * bsc#1232627 * bsc#1232628 * bsc#1232629 * bsc#1232704 * bsc#1232757 * bsc#1232768 * bsc#1232819 * bsc#1232823 * bsc#1232860 * bsc#1232869 * bsc#1232870 * bsc#1232873 * bsc#1232876 * bsc#1232877 * bsc#1232878 * bsc#1232880 * bsc#1232881 * bsc#1232884 * bsc#1232885 * bsc#1232887 * bsc#1232888 * bsc#1232890 * bsc#1232892 * bsc#1232894 * bsc#1232896 * bsc#1232897 * bsc#1232905 * bsc#1232907 * bsc#1232914 * bsc#1232919 * bsc#1232925 * bsc#1232926 * bsc#1232928 * bsc#1232935 * bsc#1233029 * bsc#1233032 * bsc#1233035 * bsc#1233036 * bsc#1233041 * bsc#1233044 * bsc#1233049 * bsc#1233050 * bsc#1233051 * bsc#1233056 * bsc#1233057 * bsc#1233061 * bsc#1233062 * bsc#1233063 * bsc#1233065 * bsc#1233067 * bsc#1233070 * bsc#1233073 * bsc#1233074 * bsc#1233088 * bsc#1233091 * bsc#1233092 * bsc#1233097 * bsc#1233100 * bsc#1233103 * bsc#1233104 * bsc#1233105 * bsc#1233106 * bsc#1233107 * bsc#1233108 * bsc#1233110 * bsc#1233111 * bsc#1233113 * bsc#1233114 * bsc#1233115 * bsc#1233117 * bsc#1233119 * bsc#1233123 * bsc#1233125 * bsc#1233127 * bsc#1233129 * bsc#1233130 * bsc#1233132 * bsc#1233135 * bsc#1233176 * bsc#1233179 * bsc#1233185 * bsc#1233188 * bsc#1233189 * bsc#1233191 * bsc#1233193 * bsc#1233197 * bsc#1233203 * bsc#1233205 * bsc#1233206 * bsc#1233207 * bsc#1233208 * bsc#1233209 * bsc#1233210 * bsc#1233211 * bsc#1233212 * bsc#1233216 * bsc#1233217 * bsc#1233219 * bsc#1233226 * bsc#1233238 * bsc#1233241 * bsc#1233244 * bsc#1233253 * bsc#1233255 * bsc#1233293 * bsc#1233298 * bsc#1233305 * bsc#1233320 * bsc#1233350 * bsc#1233443 * bsc#1233452 * bsc#1233453 * bsc#1233454 * bsc#1233456 * bsc#1233457 * bsc#1233458 * bsc#1233460 * bsc#1233462 * bsc#1233463 * bsc#1233464 * bsc#1233465 * bsc#1233468 * bsc#1233471 * bsc#1233476 * bsc#1233478 * bsc#1233479 * bsc#1233481 * bsc#1233484 * bsc#1233487 * bsc#1233490 * bsc#1233491 * bsc#1233524 * bsc#1233540 * bsc#1233548 * bsc#1233552 * bsc#1233553 * bsc#1233554 * bsc#1233555 * bsc#1233557 * bsc#1233560 * bsc#1233561 * bsc#1233564 * bsc#1233566 * bsc#1233567 * bsc#1233570 * bsc#1233572 * bsc#1233573 * bsc#1233577 * bsc#1233580 * bsc#1233640 * bsc#1233641 * bsc#1233721 * bsc#1233754 * bsc#1233756 * bsc#1233769 * bsc#1233771 * bsc#1233977 * bsc#1234009 * bsc#1234011 * bsc#1234012 * bsc#1234025 * bsc#1234034 * bsc#1234039 * bsc#1234040 * bsc#1234041 * bsc#1234042 * bsc#1234043 * bsc#1234044 * bsc#1234045 * bsc#1234046 * bsc#1234072 * bsc#1234081 * bsc#1234083 * bsc#1234087 * bsc#1234093 * bsc#1234098 * bsc#1234108 * bsc#1234121 * jsc#PED-10559 * jsc#PED-10978 * jsc#PED-11316 * jsc#PED-11442 * jsc#PED-11580 * jsc#PED-5865 * jsc#PED-6143 * jsc#PED-9899 * jsc#PED-9901 * jsc#PED-9943 Cross-References: * CVE-2023-52766 * CVE-2023-52778 * CVE-2023-52800 * CVE-2023-52881 * CVE-2023-52917 * CVE-2023-52918 * CVE-2023-52919 * CVE-2023-52920 * CVE-2023-52921 * CVE-2023-52922 * CVE-2023-6270 * CVE-2024-26703 * CVE-2024-26741 * CVE-2024-26758 * CVE-2024-26761 * CVE-2024-26767 * CVE-2024-26782 * CVE-2024-26864 * CVE-2024-26943 * CVE-2024-26953 * CVE-2024-27017 * CVE-2024-27026 * CVE-2024-27043 * CVE-2024-27407 * CVE-2024-35888 * CVE-2024-35980 * CVE-2024-36000 * CVE-2024-36031 * CVE-2024-36244 * CVE-2024-36484 * CVE-2024-36883 * CVE-2024-36886 * CVE-2024-36905 * CVE-2024-36920 * CVE-2024-36927 * CVE-2024-36954 * CVE-2024-36968 * CVE-2024-38576 * CVE-2024-38577 * CVE-2024-38589 * CVE-2024-38599 * CVE-2024-40914 * CVE-2024-41016 * CVE-2024-41023 * CVE-2024-41031 * CVE-2024-41047 * CVE-2024-41082 * CVE-2024-42102 * CVE-2024-42145 * CVE-2024-44932 * CVE-2024-44958 * CVE-2024-44964 * CVE-2024-44995 * CVE-2024-45016 * CVE-2024-45025 * CVE-2024-46678 * CVE-2024-46681 * CVE-2024-46721 * CVE-2024-46754 * CVE-2024-46766 * CVE-2024-46770 * CVE-2024-46775 * CVE-2024-46777 * CVE-2024-46788 * CVE-2024-46797 * CVE-2024-46802 * CVE-2024-46803 * CVE-2024-46804 * CVE-2024-46805 * CVE-2024-46806 * CVE-2024-46807 * CVE-2024-46809 * CVE-2024-46810 * CVE-2024-46811 * CVE-2024-46812 * CVE-2024-46813 * CVE-2024-46814 * CVE-2024-46815 * CVE-2024-46816 * CVE-2024-46817 * CVE-2024-46818 * CVE-2024-46819 * CVE-2024-46821 * CVE-2024-46825 * CVE-2024-46826 * CVE-2024-46827 * CVE-2024-46828 * CVE-2024-46830 * CVE-2024-46831 * CVE-2024-46834 * CVE-2024-46835 * CVE-2024-46836 * CVE-2024-46840 * CVE-2024-46841 * CVE-2024-46842 * CVE-2024-46843 * CVE-2024-46845 * CVE-2024-46846 * CVE-2024-46848 * CVE-2024-46849 * CVE-2024-46851 * CVE-2024-46852 * CVE-2024-46853 * CVE-2024-46854 * CVE-2024-46855 * CVE-2024-46857 * CVE-2024-46859 * CVE-2024-46860 * CVE-2024-46861 * CVE-2024-46864 * CVE-2024-46870 * CVE-2024-46871 * CVE-2024-47658 * CVE-2024-47660 * CVE-2024-47661 * CVE-2024-47662 * CVE-2024-47663 * CVE-2024-47664 * CVE-2024-47665 * CVE-2024-47666 * CVE-2024-47667 * CVE-2024-47668 * CVE-2024-47669 * CVE-2024-47670 * CVE-2024-47671 * CVE-2024-47672 * CVE-2024-47673 * CVE-2024-47674 * CVE-2024-47675 * CVE-2024-47679 * CVE-2024-47681 * CVE-2024-47682 * CVE-2024-47684 * CVE-2024-47685 * CVE-2024-47686 * CVE-2024-47687 * CVE-2024-47688 * CVE-2024-47692 * CVE-2024-47693 * CVE-2024-47695 * CVE-2024-47696 * CVE-2024-47697 * CVE-2024-47698 * CVE-2024-47699 * CVE-2024-47701 * CVE-2024-47702 * CVE-2024-47703 * CVE-2024-47704 * CVE-2024-47705 * CVE-2024-47706 * CVE-2024-47707 * CVE-2024-47709 * CVE-2024-47710 * CVE-2024-47712 * CVE-2024-47713 * CVE-2024-47714 * CVE-2024-47715 * CVE-2024-47718 * CVE-2024-47719 * CVE-2024-47720 * CVE-2024-47723 * CVE-2024-47727 * CVE-2024-47728 * CVE-2024-47730 * CVE-2024-47731 * CVE-2024-47732 * CVE-2024-47735 * CVE-2024-47737 * CVE-2024-47738 * CVE-2024-47739 * CVE-2024-47741 * CVE-2024-47742 * CVE-2024-47743 * CVE-2024-47744 * CVE-2024-47745 * CVE-2024-47747 * CVE-2024-47748 * CVE-2024-47749 * CVE-2024-47750 * CVE-2024-47751 * CVE-2024-47752 * CVE-2024-47753 * CVE-2024-47754 * CVE-2024-47756 * CVE-2024-47757 * CVE-2024-49850 * CVE-2024-49851 * CVE-2024-49852 * CVE-2024-49853 * CVE-2024-49855 * CVE-2024-49858 * CVE-2024-49860 * CVE-2024-49861 * CVE-2024-49862 * CVE-2024-49863 * CVE-2024-49864 * CVE-2024-49866 * CVE-2024-49867 * CVE-2024-49868 * CVE-2024-49870 * CVE-2024-49871 * CVE-2024-49874 * CVE-2024-49875 * CVE-2024-49877 * CVE-2024-49878 * CVE-2024-49879 * CVE-2024-49881 * CVE-2024-49882 * CVE-2024-49883 * CVE-2024-49884 * CVE-2024-49886 * CVE-2024-49888 * CVE-2024-49890 * CVE-2024-49891 * CVE-2024-49892 * CVE-2024-49894 * CVE-2024-49895 * CVE-2024-49896 * CVE-2024-49897 * CVE-2024-49898 * CVE-2024-49899 * CVE-2024-49900 * CVE-2024-49901 * CVE-2024-49902 * CVE-2024-49903 * CVE-2024-49905 * CVE-2024-49906 * CVE-2024-49907 * CVE-2024-49908 * CVE-2024-49909 * CVE-2024-49911 * CVE-2024-49912 * CVE-2024-49913 * CVE-2024-49914 * CVE-2024-49917 * CVE-2024-49918 * CVE-2024-49919 * CVE-2024-49920 * CVE-2024-49921 * CVE-2024-49922 * CVE-2024-49923 * CVE-2024-49925 * CVE-2024-49928 * CVE-2024-49929 * CVE-2024-49930 * CVE-2024-49931 * CVE-2024-49933 * CVE-2024-49934 * CVE-2024-49935 * CVE-2024-49936 * CVE-2024-49937 * CVE-2024-49938 * CVE-2024-49939 * CVE-2024-49945 * CVE-2024-49946 * CVE-2024-49947 * CVE-2024-49949 * CVE-2024-49950 * CVE-2024-49953 * CVE-2024-49954 * CVE-2024-49955 * CVE-2024-49957 * CVE-2024-49958 * CVE-2024-49959 * CVE-2024-49960 * CVE-2024-49961 * CVE-2024-49962 * CVE-2024-49963 * CVE-2024-49965 * CVE-2024-49966 * CVE-2024-49967 * CVE-2024-49968 * CVE-2024-49969 * CVE-2024-49972 * CVE-2024-49973 * CVE-2024-49974 * CVE-2024-49975 * CVE-2024-49976 * CVE-2024-49981 * CVE-2024-49982 * CVE-2024-49983 * CVE-2024-49985 * CVE-2024-49986 * CVE-2024-49987 * CVE-2024-49989 * CVE-2024-49991 * CVE-2024-49993 * CVE-2024-49995 * CVE-2024-49996 * CVE-2024-50000 * CVE-2024-50001 * CVE-2024-50002 * CVE-2024-50003 * CVE-2024-50004 * CVE-2024-50006 * CVE-2024-50007 * CVE-2024-50008 * CVE-2024-50009 * CVE-2024-50012 * CVE-2024-50013 * CVE-2024-50014 * CVE-2024-50015 * CVE-2024-50017 * CVE-2024-50019 * CVE-2024-50020 * CVE-2024-50021 * CVE-2024-50022 * CVE-2024-50023 * CVE-2024-50024 * CVE-2024-50025 * CVE-2024-50026 * CVE-2024-50027 * CVE-2024-50028 * CVE-2024-50031 * CVE-2024-50033 * CVE-2024-50035 * CVE-2024-50040 * CVE-2024-50041 * CVE-2024-50042 * CVE-2024-50044 * CVE-2024-50045 * CVE-2024-50046 * CVE-2024-50047 * CVE-2024-50048 * CVE-2024-50049 * CVE-2024-50055 * CVE-2024-50058 * CVE-2024-50059 * CVE-2024-50060 * CVE-2024-50061 * CVE-2024-50062 * CVE-2024-50063 * CVE-2024-50064 * CVE-2024-50067 * CVE-2024-50069 * CVE-2024-50073 * CVE-2024-50074 * CVE-2024-50075 * CVE-2024-50076 * CVE-2024-50077 * CVE-2024-50078 * CVE-2024-50080 * CVE-2024-50081 * CVE-2024-50082 * CVE-2024-50084 * CVE-2024-50087 * CVE-2024-50088 * CVE-2024-50089 * CVE-2024-50093 * CVE-2024-50095 * CVE-2024-50096 * CVE-2024-50098 * CVE-2024-50099 * CVE-2024-50100 * CVE-2024-50101 * CVE-2024-50102 * CVE-2024-50103 * CVE-2024-50108 * CVE-2024-50110 * CVE-2024-50115 * CVE-2024-50116 * CVE-2024-50117 * CVE-2024-50121 * CVE-2024-50124 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50128 * CVE-2024-50130 * CVE-2024-50131 * CVE-2024-50134 * CVE-2024-50135 * CVE-2024-50136 * CVE-2024-50138 * CVE-2024-50139 * CVE-2024-50141 * CVE-2024-50145 * CVE-2024-50146 * CVE-2024-50147 * CVE-2024-50148 * CVE-2024-50150 * CVE-2024-50153 * CVE-2024-50154 * CVE-2024-50155 * CVE-2024-50156 * CVE-2024-50157 * CVE-2024-50158 * CVE-2024-50159 * CVE-2024-50160 * CVE-2024-50166 * CVE-2024-50167 * CVE-2024-50169 * CVE-2024-50171 * CVE-2024-50172 * CVE-2024-50175 * CVE-2024-50176 * CVE-2024-50177 * CVE-2024-50179 * CVE-2024-50180 * CVE-2024-50181 * CVE-2024-50182 * CVE-2024-50183 * CVE-2024-50184 * CVE-2024-50186 * CVE-2024-50187 * CVE-2024-50188 * CVE-2024-50189 * CVE-2024-50192 * CVE-2024-50194 * CVE-2024-50195 * CVE-2024-50196 * CVE-2024-50198 * CVE-2024-50200 * CVE-2024-50201 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50209 * CVE-2024-50210 * CVE-2024-50215 * CVE-2024-50216 * CVE-2024-50218 * CVE-2024-50221 * CVE-2024-50224 * CVE-2024-50225 * CVE-2024-50229 * CVE-2024-50230 * CVE-2024-50231 * CVE-2024-50232 * CVE-2024-50233 * CVE-2024-50234 * CVE-2024-50235 * CVE-2024-50236 * CVE-2024-50237 * CVE-2024-50240 * CVE-2024-50245 * CVE-2024-50246 * CVE-2024-50248 * CVE-2024-50249 * CVE-2024-50250 * CVE-2024-50255 * CVE-2024-50257 * CVE-2024-50261 * CVE-2024-50264 * CVE-2024-50265 * CVE-2024-50267 * CVE-2024-50268 * CVE-2024-50269 * CVE-2024-50271 * CVE-2024-50273 * CVE-2024-50274 * CVE-2024-50275 * CVE-2024-50276 * CVE-2024-50279 * CVE-2024-50282 * CVE-2024-50287 * CVE-2024-50289 * CVE-2024-50290 * CVE-2024-50292 * CVE-2024-50295 * CVE-2024-50298 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53042 * CVE-2024-53045 * CVE-2024-53048 * CVE-2024-53052 * CVE-2024-53058 * CVE-2024-53059 * CVE-2024-53060 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53066 * CVE-2024-53068 * CVE-2024-53072 * CVE-2024-53074 * CVE-2024-53076 * CVE-2024-53079 * CVE-2024-53081 * CVE-2024-53082 * CVE-2024-53085 * CVE-2024-53088 * CVE-2024-53093 * CVE-2024-53094 * CVE-2024-53096 * CVE-2024-53100 * CVE-2024-53101 * CVE-2024-53104 * CVE-2024-53106 * CVE-2024-53108 * CVE-2024-53112 * CVE-2024-53114 CVSS scores: * CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52800 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52917 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26767 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-27026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27407 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-36244 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L * CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38576 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38576 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-41023 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-41031 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44964 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H * CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45016 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L * CVE-2024-46678 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46681 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46754 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46754 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46803 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46803 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46804 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46805 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46806 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46811 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46812 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46814 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46814 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46815 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46815 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46817 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46818 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-46825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46831 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46831 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46849 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46851 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-46855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46855 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46870 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46870 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46871 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47660 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47660 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47660 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47661 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47661 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47662 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-47662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47664 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47667 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47668 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-47668 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-47668 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47669 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47674 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47675 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47675 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47675 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47679 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47682 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47684 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47685 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47686 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47686 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-47686 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47687 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47687 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47688 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47692 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47693 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47695 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47696 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47697 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47698 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47706 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47710 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47710 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47714 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47719 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47719 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-47719 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47720 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47723 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47732 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47737 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47738 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-47739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47741 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47741 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47741 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47742 ( SUSE ): 8.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47743 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47743 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47744 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47745 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47747 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47747 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47748 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47748 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47750 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-47750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47751 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47757 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49850 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49853 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49858 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49858 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49860 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49861 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-49862 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49862 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49862 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49864 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49864 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49867 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49874 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49874 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49874 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49875 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49877 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49878 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-49878 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-49878 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49892 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49894 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49895 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49896 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49901 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49902 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49903 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49905 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49928 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49928 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49929 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49930 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49931 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49933 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49936 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49937 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49960 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49960 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49968 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49969 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49969 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49972 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49972 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49974 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49974 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49987 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49989 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49993 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49993 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50007 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50008 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50035 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50042 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50059 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50059 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50060 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50061 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50063 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50063 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50073 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50076 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50128 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50134 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50135 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50136 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50139 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50148 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50150 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50153 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50169 ( SUSE ): 0.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50171 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50183 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50231 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50232 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50233 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50236 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50248 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50250 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-50255 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50257 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53100 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53101 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Confidential Computing Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 490 vulnerabilities, contains 10 features and has 102 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). * CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). * CVE-2023-6270: aoe: fix the potential use-after-free problem in more places (bsc#1218562). * CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). * CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). * CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). * CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). * CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). * CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). * CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). * CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). * CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). * CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). * CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). * CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). * CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (bsc#1233132). * CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). * CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). * CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). * CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). * CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801). * CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774). * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773). * CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191). * CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197). * CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115). * CVE-2024-46828: sched: sch_cake: fix bulk flow accounting logic for host fairness (bsc#1231114). * CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117). * CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096). * CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105). * CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094). * CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100). * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085). * CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087). * CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435). * CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436). * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439). * CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442). * CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673). * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). * CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987). * CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998). * CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003). * CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857). * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). * CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). * CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944). * CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872). * CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942). * CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935). * CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049). * CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116). * CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075). * CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117). * CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124). * CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869). * CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135). * CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145). * CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130). * CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868). * CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131). * CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). * CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256). * CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262). * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). * CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). * CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200). * CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). * CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208). * CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217). * CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220). * CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354). * CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352). * CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221). * CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355). * CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222). * CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358). * CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305). * CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332). * CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334). * CVE-2024-49908: drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (bsc#1232335). * CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337). * CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366). * CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367). * CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307). * CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369). * CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965). * CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967). * CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968). * CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313). * CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371). * CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374). * CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368). * CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387). * CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424). * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165). * CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164). * CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160). * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159). * CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156). * CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155). * CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151). * CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149). * CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395). * CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140). * CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264). * CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519). * CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315). * CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105). * CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383). * CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096). * CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093). * CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258). * CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483). * CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282). * CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316). * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089). * CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085). * CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084). * CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083). * CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385). * CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396). * CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442). * CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318). * CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386). * CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446). * CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079). * CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989). * CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957). * CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956). * CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954). * CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951). * CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950). * CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914). * CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392). * CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908). * CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907). * CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906). * CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903). * CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902). * CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418). * CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345). * CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417). * CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435). * CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901). * CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502). * CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501). * CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500). * CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494). * CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499). * CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498). * CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881). * CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905). * CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894). * CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935). * CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062). * CVE-2024-50145: octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044). * CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050). * CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049). * CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320). * CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057). * CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115). * CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129). * CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135). * CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110). * CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106). * CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103). * CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193). * CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206). * CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203). * CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207). * CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226). * CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244). * CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460). * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462). * CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463). * CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464). * CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478). * CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484). * CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487). * CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540). * CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721). * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552). * CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573). The following non-security bugs were fixed: * 9p: explicitly deny setlease attempts (git-fixes). * ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes). * ACPI: CPPC: Fix _CPC register setting issue (git-fixes). * ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes). * ACPI: EC: Do not release locks during operation region accesses (stable- fixes). * ACPI: PAD: fix crash in exit_round_robin() (stable-fixes). * ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes). * ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git- fixes). * ACPI: battery: Fix possible crash when unregistering a battery hook (git- fixes). * ACPI: battery: Simplify battery hook locking (stable-fixes). * ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes). * ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes). * ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable- fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable- fixes). * ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable- fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes). * ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes). * ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes). * ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes). * ACPICA: executer/exsystem: Do not nag user about every Stall() violating the spec (git-fixes). * ACPICA: iasl: handle empty connection_node (stable-fixes). * ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes). * ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes). * ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable- fixes). * ALSA: 6fire: Release resources at card release (git-fixes). * ALSA: Reorganize kerneldoc parameter names (stable-fixes). * ALSA: ac97: bus: Fix the mistake in the comment (git-fixes). * ALSA: asihpi: Fix potential OOB array access (stable-fixes). * ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: core: add isascii() check to card ID generator (stable-fixes). * ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes). * ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git- fixes). * ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable- fixes). * ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes). * ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes). * ALSA: hda/conexant: fix some typos (stable-fixes). * ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes). * ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803). * ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes). * ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes). * ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes). * ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable- fixes). * ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable- fixes). * ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298). * ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes). * ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298). * ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298). * ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes). * ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable- fixes). * ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes). * ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes). * ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable- fixes). * ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes). * ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes). * ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes). * ALSA: hda/realtek: Update default depop procedure (git-fixes). * ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable- fixes). * ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes). * ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable- fixes). * ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes). * ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes). * ALSA: hda: Show the codec quirk info at probing (stable-fixes). * ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable- fixes). * ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132). * ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes). * ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes). * ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes). * ALSA: line6: update contact information (stable-fixes). * ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes). * ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable- fixes). * ALSA: silence integer wrapping warning (stable-fixes). * ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes). * ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes). * ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes). * ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes). * ALSA: usb-audio: Add input value sanity checks for standard types (stable- fixes). * ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes). * ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes). * ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768). * ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes). * ALSA: usb-audio: Define macros for quirk table entries (stable-fixes). * ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes). * ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable- fixes). * ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes). * ALSA: usb-audio: Make mic volume workarounds globally applicable (stable- fixes). * ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes). * ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes). * ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes). * ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes). * ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes). * ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes). * ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes). * ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305). * ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305). * ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305). * ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305). * ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305). * ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305). * ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305). * ASoC: SOF: Wire up buffer flags (bsc#1233305). * ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305). * ASoC: SOF: align topology header file with sof topology header (bsc#1233305). * ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes). * ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305). * ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305). * ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305). * ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305). * ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305). * ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305). * ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305). * ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305). * ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305). * ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305). * ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305). * ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305). * ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305). * ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git- fixes). * ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305). * ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305). * ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes). * ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes). * ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes). * ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes). * ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes). * ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes). * ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes). * ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes). * ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes). * ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes). * ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable- fixes). * ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes). * ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes). * ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes). * ASoC: fsl_micfil: Add sample rate constraint (stable-fixes). * ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes). * ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes). * ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git- fixes). * ASoC: max98388: Fix missing increment of variable slot_found (git-fixes). * ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes). * ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable- fixes). * ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes). * ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable- fixes). * ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git- fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes). * ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes). * ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes). * ASoC: tas2781: Use of_property_read_reg() (stable-fixes). * Bluetooth: Call iso_exit() on module unload (git-fixes). * Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes). * Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git- fixes). * Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git- fixes). * Bluetooth: Remove debugfs directory on module init failure (git-fixes). * Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes). * Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes). * Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable- fixes). * Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git- fixes). * Bluetooth: fix use-after-free in device_for_each_child() (git-fixes). * Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes). * Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes). * Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes). * HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes). * HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes). * HID: core: zero-initialize the report buffer (git-fixes). * HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes). * HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable- fixes). * HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable- fixes). * HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes). * HID: multitouch: Add support for B2402FVA track point (stable-fixes). * HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable- fixes). * HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes). * HID: plantronics: Workaround for an unexcepted opposite volume key (stable- fixes). * HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git- fixes). * Input: adp5589-keys - fix NULL pointer dereference (git-fixes). * Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes). * Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes). * Input: hideep - add missing dependency on REGMAP_I2C (git-fixes). * Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes). * Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes). * Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes). * Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes). * Input: xpad - add GameSir VID for Xbox One controllers (git-fixes). * Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git- fixes). * Input: xpad - add support for MSI Claw A1M (git-fixes). * Input: xpad - add support for Machenike G5 Pro Controller (git-fixes). * Input: xpad - fix support for some third-party controllers (git-fixes). * Input: xpad - sort xpad_device by vendor and product ID (git-fixes). * Input: xpad - spelling fixes for "Xbox" (git-fixes). * KVM: Add KVM vcpu ioctl to pre-populate guest memory (jsc#PED-6143). * KVM: Add KVM_PRE_FAULT_MEMORY vcpu ioctl to pre-populate guest memory (jsc#PED-6143). * KVM: Add new members to struct kvm_gfn_range to operate on (jsc#PED-6143). * KVM: Document KVM_MEMORY_MAPPING ioctl (jsc#PED-6143). * KVM: Document KVM_PRE_FAULT_MEMORY ioctl (jsc#PED-6143). * KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git- fixes). * KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199). * KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199). * KVM: PPC: Book3S HV: remove unused varible (bsc#1194869). * KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207). * KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207). * KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes). * KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module (jsc#PED-6143). * KVM: TDX: Add TDX "architectural" error codes (jsc#PED-6143). * KVM: TDX: Add helper functions to print TDX SEAMCALL error (jsc#PED-6143). * KVM: TDX: Add placeholders for TDX VM/vcpu structure (jsc#PED-6143). * KVM: TDX: Define TDX architectural definitions (jsc#PED-6143). * KVM: TDX: Make TDX VM type supported (jsc#PED-6143). * KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git- fixes). * KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git- fixes). * KVM: VMX: Move out vmx_x86_ops to 'main.c' to dispatch VMX and TDX (jsc#PED-6143). * KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes). * KVM: Write the per-page "segment" when clearing (part of) a guest page (git- fixes). * KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626). * KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276). * KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623). * KVM: x86/mmu: Account pf_{fixed,emulate,spurious} in callers of "do page fault" (jsc#PED-6143). * KVM: x86/mmu: Assume guest MMIOs are shared (jsc#PED-6143). * KVM: x86/mmu: Bump pf_taken stat only in the "real" page fault handler (jsc#PED-6143). * KVM: x86/mmu: Check that root is valid/loaded when pre-faulting SPTEs (git- fixes). * KVM: x86/mmu: Make kvm_mmu_do_page_fault() return mapped level (jsc#PED-6143). * KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git- fixes). * KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes). * KVM: x86/vmx: Refactor KVM VMX module init/exit functions (jsc#PED-6143). * KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_init() (jsc#PED-6143). * KVM: x86: Add is_vm_type_supported callback (jsc#PED-6143). * KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes). * KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes). * KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes). * KVM: x86: Implement kvm_arch_vcpu_pre_fault_memory() (jsc#PED-6143). * KVM: x86: Implement kvm_arch_{, pre_}vcpu_memory_mapping() (jsc#PED-6143). * KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git- fixes). * KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git- fixes). * KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * NFS: Avoid unnecessary rescanning of the per-server delegation list (git- fixes). * NFS: remove revoked delegation from server's delegation list (git-fixes). * NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes). * NFSD: Mark filecache "down" if init fails (git-fixes). * NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016). * NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes). * PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes). * PCI: Add T_PVPERL macro (git-fixes). * PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes). * PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019). * PCI: Fix reset_method_store() memory leak (git-fixes). * PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes). * PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes). * PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes). * PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes). * PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes). * PCI: rockchip-ep: Fix address translation unit programming (git-fixes). * RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559). * RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559). * RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559). * RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559). * RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559). * RDMA/bnxt_re: Add a check for memory allocation (git-fixes) * RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes) * RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git- fixes) * RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes) * RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes) * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes) * RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes) * RDMA/bnxt_re: Fix out of bound check (git-fixes) * RDMA/bnxt_re: Fix the GID table length (git-fixes) * RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes) * RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes) * RDMA/bnxt_re: Return more meaningful error (git-fixes) * RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes) * RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes) * RDMA/cxgb4: Dump vendor specific QP details (git-fixes) * RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes) * RDMA/hns: Add mutex_destroy() (git-fixes) * RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git- fixes) * RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes) * RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes) * RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes) * RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes) * RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes) * RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes) * RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes) * RDMA/hns: Use macro instead of magic number (git-fixes) * RDMA/irdma: Fix misspelling of "accept*" (git-fixes) * RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes) * RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes). * RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes). * RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes) * RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes) * RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git- fixes) * RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git- fixes). * RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git- fixes) * RDMA/rxe: Fix the qp flush warnings in req (git-fixes) * RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes) * RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes) * RDMA/srpt: Make slab cache names unique (git-fixes) * SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes). * SUNRPC: Fixup gss_status tracepoint error output (git-fixes). * SUNRPC: Remove BUG_ON call sites (git-fixes). * SUNRPC: clnt.c: Remove misleading comment (git-fixes). * USB: appledisplay: close race between probe and completion handler (git- fixes). * USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes). * USB: chaoskey: fail open after removal (git-fixes). * USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes). * USB: misc: cypress_cy7c63: check for short transfer (git-fixes). * USB: misc: yurex: fix race between read and write (git-fixes). * USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git- fixes). * USB: serial: io_edgeport: fix use after free in debug printk (git-fixes). * USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes). * USB: serial: option: add Quectel RG650V (stable-fixes). * USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes). * USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes). * USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable- fixes). * VM: TDX: Initialize the TDX module when loading the KVM intel kernel module (jsc#PED-6143). * VM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX (jsc#PED-6143). * accel/qaic: Fix the for loop used to walk SG table (git-fixes). * accel: Use XArray instead of IDR for minors (jsc#PED-11580). * acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes). * ad7780: fix division by zero in ad7780_write_raw() (git-fixes). * aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704). * amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes). * apparmor: fix 'Do simple duplicate message elimination' (git-fixes). * apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes). * apparmor: use kvfree_sensitive to free data->data (git-fixes). * arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes) * arm64: cputype: Add Neoverse-N3 definitions (git-fixes) * arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes). * arm64: errata: Expand speculative SSBS workaround once more (git-fixes) * arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes) * arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes). * arm64: probes: Fix simulate_ldr*_literal() (git-fixes) * arm64: probes: Fix uprobes for big-endian kernels (git-fixes) * arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes) * ata: libata: Set DID_TIME_OUT for commands that actually timed out (git- fixes). * ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes). * audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes). * audit: do not take task_lock() in audit_exe_compare() code path (git-fixes). * block: print symbolic error name instead of error code (bsc#1231872). * block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677). * bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes). * bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes). * bnxt_en: Fix the PCI-AER routines (git-fixes). * bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes). * bnxt_en: refactor reset close code (git-fixes). * bpf, lsm: Add disabled BPF LSM hook list (git-fixes). * bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes). * bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git- fixes). * bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes). * bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes). * bpf, x64: Remove tail call detection (git-fixes). * bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes). * bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes). * bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes). * bpf: Fix error message on kfunc arg type mismatch (git-fixes). * bpf: Fix helper writes to read-only maps (git-fixes). * bpf: Fix tailcall cases in test_bpf (git-fixes). * bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes). * bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes). * bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git- fixes). * bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes). * bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes). * btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450). * btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193) * btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes). * cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183). * can: c_can: fix {rx,tx}_errors statistics (git-fixes). * can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes). * can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes). * can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes). * ceph: fix cap ref leak via netfs init_request (bsc#1231384). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231182). * cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108). * clk: bcm: bcm53573: fix OF node leak in init (stable-fixes). * clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes). * clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes). * clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes). * clk: imx: clk-scu: fix clk enable state save and restore (git-fixes). * clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes). * clk: imx: fracn-gppll: fix pll power up (git-fixes). * clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes). * clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes). * clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes). * clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes). * clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes). * clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes). * comedi: Flush partial mappings in error case (git-fixes). * comedi: ni_routing: tools: Check when the file could not be opened (stable- fixes). * config: Disable LAM on x86 (bsc#1217845). * cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git- fixes). * cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git- fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes). * cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes). * cpufreq: loongson2: Unregister platform_driver on failure (git-fixes). * cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes). * crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704). * crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes). * crypto: bcm - add error check in the ahash_hmac_init function (git-fixes). * crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes). * crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes). * crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git- fixes). * crypto: cavium - Fix the if condition to exit loop after timeout (git- fixes). * crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075) * crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes). * crypto: octeontx - Fix authenc setkey (stable-fixes). * crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes). * crypto: octeontx2 - Fix authenc setkey (stable-fixes). * crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes). * crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632). * crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632). * crypto: qat - remove check after debugfs_create_dir() (git-fixes). * crypto: qat - remove faulty arbiter config reset (git-fixes). * crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes). * crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes). * cxgb4: Properly lock TX queue for the selftest (git-fixes). * cxgb4: add forgotten u64 ivlan cast before shift (git-fixes). * cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git- fixes). * cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165). * dcache: keep dentry_hashtable or d_hash_shift even when not used (git- fixes). * debugfs: fix automount d_fsdata usage (git-fixes). * devlink: Fix command annotation documentation (git-fixes). * dmaengine: sh: rz-dmac: handle configs where one address is zero (git- fixes). * dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git- fixes). * doc: rcu: update printed dynticks counter bits (git-fixes). * driver core: bus: Fix double free in driver API bus_register() (stable- fixes). * driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes). * drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes). * drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes). * drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes). * drm/amd/display: Add disable timeout option (bsc#1231435) * drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes). * drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944) * drm/amd/display: Check null pointer before dereferencing se (stable-fixes). * drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes). * drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes). * drm/amd/display: Fix brightness level not retained over reboot (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes). * drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes). * drm/amd/display: Remove a redundant check in authenticated_dp (stable- fixes). * drm/amd/display: Revert "Check HDCP returned status" (stable-fixes). * drm/amd/display: Round calculated vtotal (stable-fixes). * drm/amd/display: Skip to enable dsc if it has been off (stable-fixes). * drm/amd/display: Validate backlight caps are sane (stable-fixes). * drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes). * drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes). * drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes). * drm/amd: Guard against bad data for ATIF ACPI method (git-fixes). * drm/amdgpu/swsmu: Only force workload setup on init (git-fixes). * drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes). * drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable- fixes). * drm/amdgpu: Adjust debugfs register access permissions (stable-fixes). * drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes). * drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes). * drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable- fixes). * drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes). * drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git- fixes). * drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes). * drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes). * drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes). * drm/bridge: tc358767: Fix link properties discovery (git-fixes). * drm/bridge: tc358768: Fix DSI command tx (git-fixes). * drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git- fixes). * drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes). * drm/i915/gem: fix bitwise and logical AND mixup (git-fixes). * drm/i915/hdcp: fix connector refcounting (git-fixes). * drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/mediatek: Fix child node refcount handling in early exit (git-fixes). * drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes). * drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git- fixes). * drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes). * drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes). * drm/msm/dpu: do not always program merge_3d block (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes). * drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes). * drm/msm/dpu: make sure phys resources are properly initialized (git-fixes). * drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes). * drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes). * drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes). * drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes). * drm/msm/gpu: Check the status of registration to PM QoS (git-fixes). * drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes). * drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes). * drm/msm: Fix some typos in comment (git-fixes). * drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes). * drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes). * drm/omap: Fix possible NULL dereference (git-fixes). * drm/panfrost: Add missing OPP table refcnt decremental (git-fixes). * drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes). * drm/radeon: Fix encoder->possible_clones (git-fixes). * drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes). * drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes). * drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes). * drm/sti: avoid potential dereference of error pointers (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes). * drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes). * drm/v3d: Address race-condition in MMU flush (git-fixes). * drm/v3d: Stop the active perfmon before being destroyed (git-fixes). * drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git- fixes). * drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes). * drm/vc4: Stop the active perfmon before being destroyed (git-fixes). * drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes). * drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes). * drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes). * drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git- fixes). * drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git- fixes). * drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes). * drm/vmwgfx: Handle surface check failure correctly (git-fixes). * drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes). * drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes). * drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580). * drm: Use XArray instead of IDR for minors (jsc#PED-11580). * drm: use ATOMIC64_INIT() for atomic64_t (git-fixes). * drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes). * drm: zynqmp_kms: Unplug DRM device before removal (git-fixes). * e1000e: Fix S0ix residency on corporate systems (git-fixes). * e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes). * e1000e: change I219 (19) devices to ADP (git-fixes). * e1000e: fix force smbus during suspend flow (git-fixes). * e1000e: move force SMBUS near the end of enable_ulp function (git-fixes). * efi/libstub: Free correct pointer on failure (git-fixes). * efi/libstub: fix efi_parse_options() ignoring the default command line (git- fixes). * efi/libstub: zboot.lds: Discard .discard sections (stable-fixes). * efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465). * efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes). * eth: bnxt: fix counting packets discarded due to OOM and netpoll (git- fixes). * ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635). * ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636). * ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637). * ext4: fix possible tid_t sequence overflows (bsc#1231634). * ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201) * ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009). * ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640). * ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639). * f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011). * fat: fix uninitialized variable (git-fixes). * fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes). * fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git- fixes). * fbdev: sisfb: Fix strbuf array overflow (stable-fixes). * fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes). * fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes). * fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git- fixes). * filemap: remove use of wait bookmarks (bsc#1224088). * firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git- fixes). * firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git- fixes). * firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git- fixes). * firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git- fixes). * firmware: google: Unregister driver_info on failure (git-fixes). * firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git- fixes). * fs/9p: drop inodes immediately on non-.L too (git-fixes). * fs/9p: fix the cache always being enabled on files with qid flags (git- fixes). * fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207) * fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207) * fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes). * genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes). * goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes). * gpio: aspeed: Add the flush write to ensure the write complete (git-fixes). * gpio: aspeed: Use devm_clk api to manage clock source (git-fixes). * gpio: davinci: fix lazy disable (git-fixes). * gpio: exar: set value when external pull-up or pull-down is present (git- fixes). * gpio: zevio: Add missed label initialisation (git-fixes). * gve: Fix XDP TX completion handling when counters overflow (git-fixes). * gve: Fix an edge case for TSO skb validity check (git-fixes). * gve: ignore nonrelevant GSO type bits when processing TSO headers (git- fixes). * hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes). * hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes). * hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git- fixes). * hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (max16065) Fix alarm attributes (git-fixes). * hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes). * hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes). * hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git- fixes). * hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes). * hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes). * hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes). * i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git- fixes). * i2c: core: fix lockdep warning for sparsely nested adapter chain (git- fixes). * i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes). * i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes). * i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes). * i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes). * i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes). * i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes). * i2c: i801: add helper i801_restore_regs (git-fixes). * i2c: ismt: kill transaction in hardware on timeout (git-fixes). * i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes). * i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes). * i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git- fixes). * i2c: omap: wakeup the controller during suspend() callback (git-fixes). * i2c: rcar: properly format a debug output (git-fixes). * i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes). * i2c: stm32f7: perform most of irq job in threaded handler (git-fixes). * i2c: synquacer: Deal with optional PCLK correctly (git-fixes). * i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable- fixes). * i2c: xiic: Try re-initialization on bus busy timeout (git-fixes). * i2c: xiic: improve error message when transfer fails to start (stable- fixes). * i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git- fixes). * i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes). * i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * i40e: Fix XDP program unloading while removing the driver (git-fixes). * i40e: Report MFS in decimal base instead of hex (git-fixes). * i40e: fix race condition by adding filter's intermediate sync state (git- fixes). * iavf: Fix TC config comparison with existing adapter TC config (git-fixes). * ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes). * ice: Fix checking for unsupported keys on non-tunnel device (git-fixes). * ice: Fix lldp packets dropping after changing the number of channels (git- fixes). * ice: Fix netif_is_ice() in Safe Mode (git-fixes). * ice: Fix package download algorithm (git-fixes). * ice: Fix recipe read procedure (git-fixes). * ice: Fix reset handler (git-fixes). * ice: Flush FDB entries before reset (git-fixes). * ice: Interpret .set_channels() input differently (git-fixes). * ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes). * ice: Reject pin requests with unsupported flags (git-fixes). * ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git- fixes). * ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes). * ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes). * ice: clear port vlan config during reset (git-fixes). * ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes). * ice: do not bring the VSI up, if it was down before the XDP setup (git- fixes). * ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes). * ice: fix 200G PHY types to link speed mapping (git-fixes). * ice: fix 200G link speed message log (git-fixes). * ice: fix ICE_LAST_OFFSET formula (git-fixes). * ice: fix VLAN replay after reset (git-fixes). * ice: fix VSI lists confusion when adding VLANs (git-fixes). * ice: fix accounting for filters shared by multiple VSIs (git-fixes). * ice: fix accounting if a VLAN already exists (git-fixes). * ice: fix iteration of TLVs in Preserved Fields Area (git-fixes). * ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes). * ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes). * ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes). * ice: implement AQ download pkg retry (git-fixes). * ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git- fixes). * ice: remove af_xdp_zc_qps bitmap (git-fixes). * ice: replace synchronize_rcu with synchronize_net (git-fixes). * ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes). * ice: set correct dst VSI in only LAN filters (git-fixes). * ice: tc: allow zero flags in parsing tc flower (git-fixes). * ice: tc: check src_vsi in case of traffic from VF (git-fixes). * ice: use proper macro for testing bit (git-fixes). * idpf: Interpret .set_channels() input differently (git-fixes). * idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes). * idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git- fixes). * idpf: do not skip over ethtool tcp-data-split setting (git-fixes). * idpf: fix UAFs when destroying the queues (git-fixes). * idpf: fix memleak in vport interrupt configuration (git-fixes). * idpf: fix memory leaks and crashes while performing a soft reset (git- fixes). * ieee802154: Fix build error (git-fixes). * igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes). * igb: Disable threaded IRQ for igb_msix_other (git-fixes). * igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes). * igc: Fix double reset adapter triggered from a single taprio cmd (git- fixes). * igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes). * igc: Fix qbv tx latency by setting gtxoffset (git-fixes). * igc: Fix qbv_config_change_errors logics (git-fixes). * igc: Fix reset adapter logics when tx mode change (git-fixes). * igc: Unlock on error in igc_io_resume() (git-fixes). * iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes). * iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes). * iio: accel: kx022a: Fix raw read format (git-fixes). * iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git- fixes). * iio: adc: ad7606: Fix typo in the driver name (git-fixes). * iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes). * iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git- fixes). * iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git- fixes). * iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes). * iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git- fixes). * iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git- fixes). * iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git- fixes). * iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes). * iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git- fixes). * iio: gts: Fix uninitialized symbol 'ret' (git-fixes). * iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes). * iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes). * iio: light: al3010: Fix an error handling path in al3010_probe() (git- fixes). * iio: light: opt3001: add missing full-scale range value (git-fixes). * iio: light: veml6030: fix ALS sensor resolution (git-fixes). * iio: light: veml6030: fix IIO device retrieval from embedded device (git- fixes). * iio: light: veml6030: fix microlux value calculation (git-fixes). * iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes). * iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes). * iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes). * iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes). * ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes). * initramfs: avoid filename buffer overrun (bsc#1232436). * intel_idle: add Granite Rapids Xeon support (bsc#1231630). * intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630). * io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes). * io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes). * io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes). * io_uring/net: harden multishot termination case for recv (git-fixes). * io_uring/rw: fix cflags posting for single issue multishot read (git-fixes). * io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes). * io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes). * io_uring/sqpoll: close race on waiting for sqring entries (git-fixes). * io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes). * io_uring/sqpoll: do not put cpumask on stack (git-fixes). * io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes). * io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes). * iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes). * iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes). * iommu/amd: Fix typo of , instead of ; (git-fixes). * iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes). * iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git- fixes). * iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes). * iommufd: Protect against overflow of ALIGN() during iova allocation (git- fixes). * irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes). * jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042). * jbd2: avoid infinite transaction commit loop (bsc#1234039). * jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043). * jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040). * jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045). * jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638). * jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042). * jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044). * jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046). * jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041). * jbd2: precompute number of transaction descriptor blocks (bsc#1234042). * jfs: Fix sanity check in dbMount (git-fixes). * jfs: Fix uaf in dbFreeBits (git-fixes). * jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes). * jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes). * jfs: check if leafidx greater than num leaves per dmap tree (git-fixes). * jump_label: Fix static_key_slow_dec() yet again (git-fixes). * kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes). * kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes). * kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes). * kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git- fixes kabi). * kasan: Fix Software Tag-Based KASAN with GCC (git-fixes). * kasan: move checks to do_strncpy_from_user (git-fixes). * kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450). * kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450). * kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450). * kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450). * kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450). * kconfig: qconf: fix buffer overflow in debug links (git-fixes). * kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644). * kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes). * keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes). * keys: Fix overwrite of key expiration on instantiation (git-fixes). * kthread: unpark only parked kthread (git-fixes). * leds: lp55xx: Remove redundant test for invalid channel number (git-fixes). * lib/xarray: introduce a new helper xas_get_order (bsc#1231617). * lib: string_helpers: silence snprintf() output truncation warning (git- fixes). * mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes). * macsec: do not increment counters for an unrelated SA (git-fixes). * mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes). * maple_tree: correct tree corruption on spanning store (git-fixes). * maple_tree: fix alloc node fail issue (git-fixes). * maple_tree: refine mas_store_root() on storing NULL (git-fixes). * media: adv7604: prevent underflow condition when reporting colorspace (git- fixes). * media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: amphion: Set video drvdata before register video device (git-fixes). * media: ar0521: do not overflow when checking PLL values (git-fixes). * media: atomisp: Add check for rgby_data memory allocation failure (git- fixes). * media: bttv: use audio defaults for winfast2000 (git-fixes). * media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git- fixes). * media: cx24116: prevent overflows on SNR calculus (git-fixes). * media: dvb_frontend: do not play tricks with underflow values (git-fixes). * media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable- fixes). * media: dvbdev: prevent the risk of out of memory access (git-fixes). * media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git- fixes). * media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes). * media: i2c: imx335: Enable regulator supplies (stable-fixes). * media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes). * media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes). * media: imx-jpeg: Set video drvdata before register video device (git-fixes). * media: imx335: Fix reset-gpio handling (git-fixes). * media: mantis: remove orphan mantis_core.h (git-fixes). * media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes). * media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes). * media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes). * media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes). * media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes). * media: s5p-jpeg: prevent buffer overflows (git-fixes). * media: stb0899_algo: initialize cfr before using it (git-fixes). * media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes). * media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes). * media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes). * media: uvcvideo: Stop stream during unregister (git-fixes). * media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes). * media: v4l2-tpg: prevent the risk of a division by zero (git-fixes). * media: vb2: Fix comment (git-fixes). * media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes). * media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes). * media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes). * mei: use kvmalloc for read buffer (git-fixes). * mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes). * mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes). * mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git- fixes). * minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes). * minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes). * misc: apds990x: Fix missing pm_runtime_disable() (git-fixes). * mlx5: avoid truncating error message (git-fixes). * mlx5: stop warning for 64KB pages (git-fixes). * mlxbf_gige: disable RX filters until RX path initialized (git-fixes). * mm/filemap: optimize filemap folio adding (bsc#1231617). * mm/filemap: return early if failed to allocate memory for split (bsc#1231617). * mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012). * mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git- fixes). * mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes). * mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978). * mm: move dummy_vm_ops out of a header (git-fixes prerequisity). * mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes). * mm: refactor map_deny_write_exec() (git-fixes). * mm: resolve faulty mmap_region() error path behaviour (git-fixes). * mm: unconditionally close VMAs on error (git-fixes). * mmc: mmc_spi: drop buggy snprintf() (git-fixes). * mmc: sunxi-mmc: Fix A100 compatible description (git-fixes). * modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git- fixes). * modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes). * modpost: remove incorrect code in do_eisa_entry() (git-fixes). * module: abort module loading when sysfs setup suffer errors (git-fixes). * mtd: rawnand: atmel: Fix possible memory leak (git-fixes). * mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes). * nbd: fix race between timeout and normal completion (bsc#1230918). * net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git- fixes). * net/mlx5: Added cond_resched() to crdump collection (git-fixes). * net/mlx5: Check capability for fw_reset (git-fixes). * net/mlx5: Check for invalid vector index on EQ creation (git-fixes). * net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes). * net/mlx5: Fix command bitmask initialization (git-fixes). * net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes). * net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes). * net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes). * net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes). * net/mlx5: Unregister notifier on eswitch init failure (git-fixes). * net/mlx5: Update the list of the PCI supported devices (git-fixes). * net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes). * net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes). * net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes). * net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git- fixes). * net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes). * net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes). * net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes). * net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes). * net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes). * net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes). * net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes). * net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891). * net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289). * net: mdio-ipq4019: add missing error check (git-fixes). * net: phy: Remove LED entry from LEDs list on unregister (git-fixes). * net: phy: bcm84881: Fix some error handling paths (git-fixes). * net: phy: dp83822: Fix reset pin definitions (git-fixes). * net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes). * net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes). * net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes). * net: qede: use return from qede_parse_actions() (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes). * net: qede: use return from qede_parse_flow_attr() for flower (git-fixes). * net: relax socket state check at accept time (git-fixes). * net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes) * net: sysfs: Fix /sys/class/net/<iface> path for statistics (git-fixes). * net: test for not too small csum_start in virtio_net_hdr_to_skb() (git- fixes). * net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes). * net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes). * net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes). * net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes). * net: usb: usbnet: fix name regression (get-fixes). * net: usb: usbnet: fix race in probe failure (git-fixes). * net: wwan: fix global oob in wwan_rtnl_policy (git-fixes). * net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git- fixes). * net: xfrm: preserve kabi for xfrm_state (bsc#1233754). * netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes). * netfilter: nf_tables: missing iterator type in lookup walk (git-fixes). * nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes). * nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes). * nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes). * nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes). * nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes). * nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes). * nfsd: fix refcount leak when file is unhashed after being found (git-fixes). * nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes). * nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git- fixes). * nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121). * nfsd: return -EINVAL when namelen is 0 (git-fixes). * nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git- fixes). * nilfs2: fix potential deadlock with newly created symlinks (git-fixes). * nouveau/dmem: Fix privileged error in copy engine channel (git-fixes). * nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git- fixes). * nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes). * nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes). * nouveau: fw: sync dma after setup is called (git-fixes). * nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes). * ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git- fixes). * ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207) * nvme-fabrics: fix kernel crash while shutting down controller (git-fixes). * nvme-loop: flush off pending I/O while shutting down loop controller (git- fixes). * nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244). * nvme-pci: fix freeing of the HMB descriptor table (git-fixes). * nvme-pci: fix race condition between reset and nvme_dev_disable() (git- fixes). * nvme-pci: qdepth 1 quirk (git-fixes). * nvme-pci: reverse request order in nvme_queue_rqs (git-fixes). * nvme-pci: set doorbell config before unquiescing (git-fixes). * nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes). * nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901). * nvme: null terminate nvme_tls_attrs (git-fixes). * nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes). * nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes). * nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes). * ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes). * ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes). * ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes). * ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes). * ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes). * ocfs2: uncache inode which has failed entering the group (git-fixes). * of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386) * parport: Proper fix for array out-of-bounds access (git-fixes). * phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git- fixes). * phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes). * phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes). * phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes). * phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes). * pinctrl: apple: check devm_kasprintf() returned value (git-fixes). * pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes). * pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes). * pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes). * pinctrl: zynqmp: drop excess struct member description (git-fixes). * platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git- fixes). * platform/x86/amd/pmc: Detect when STB is not available (git-fixes). * platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes). * platform/x86: dell-sysman: add support for alienware products (stable- fixes). * platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes). * platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes). * platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes). * platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes). * posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). * power: reset: brcmstb: Do not go into infinite loop if reset fails (stable- fixes). * power: supply: bq27xxx: Fix registers of bq27426 (git-fixes). * power: supply: core: Remove might_sleep() from power_supply_put() (git- fixes). * power: supply: rt9471: Fix wrong WDT function regfield declaration (git- fixes). * power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes). * powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes). * powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869). * powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869). * powerpc/boot: Only free if realloc() succeeds (bsc#1194869). * powerpc/code-patching: Add generic memory patching (bsc#1194869). * powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869). * powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632). * powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632). * powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869). * powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * printk: Add notation to console_srcu locking (bsc#1232183). * pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes). * qed: avoid truncating work queue length (git-fixes). * rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631). * rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623). * regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes). * rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK. * rpm/release-projects: Add SLFO projects (bsc#1231293). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) * rpmsg: glink: Handle rejected intent request better (git-fixes). * rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes). * rtc: abx80x: Fix WDT bit position of the status register (git-fixes). * rtc: bbnsm: add remove hook (git-fixes). * rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git- fixes). * rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes). * rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * runtime constants: add default dummy infrastructure (git-fixes). * runtime constants: add x86 architecture support (git-fixes). * s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747). * s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629). * s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628). * s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627). * scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes). * scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git- fixes). * scsi: Remove scsi device no_start_on_resume flag (git-fixes). * scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes). * scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes). * scsi: core: Disable CDL by default (git-fixes). * scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes). * scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes). * scsi: core: Handle devices which return an unusually large VPD page count (git-fixes). * scsi: core: alua: I/O errors for ALUA state transitions (git-fixes). * scsi: fnic: Move flush_work initialization out of if block (bsc#1230055). * scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes). * scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes). * scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes). * scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes). * scsi: libsas: Fix the failure of adding phy with zero-address to port (git- fixes). * scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757). * scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757). * scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757). * scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Remove trailing space after \n newline (bsc#1232757). * scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119). * scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757). * scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757). * scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943). * scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757). * scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes). * scsi: mac_scsi: Refactor polling loop (git-fixes). * scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes). * scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes). * scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes). * scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes). * scsi: mpi3mr: Validate SAS port assignments (git-fixes). * scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes). * scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes). * scsi: pm80xx: Set phy->enable_completion only when we wait for it (git- fixes). * scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes). * scsi: scsi_transport_fc: Allow setting rport state to current state (git- fixes). * scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git- fixes). * scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes). * scsi: smartpqi: correct stream detection (git-fixes). * scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git- fixes). * scsi: spi: Fix sshdr use (git-fixes). * scsi: sr: Fix unintentional arithmetic wraparound (git-fixes). * scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes). * security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes). * selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes). * selftests/bpf: Add a test case to write strtol result into .rodata (git- fixes). * selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes). * selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes). * selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes). * selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes). * selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes). * selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git- fixes). * serial: 8250: omap: Move pm_runtime_get_sync (git-fixes). * serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes). * serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes). * signal: Replace BUG_ON()s (bsc#1234093). * soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git- fixes). * soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git- fixes). * soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * soundwire: intel_bus_common: enable interrupts before exiting reset (stable- fixes). * spi: Fix acpi deferred irq probe (git-fixes). * spi: atmel-quadspi: Fix register name in verbose logging function (git- fixes). * spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes). * spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes). * spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes). * spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes). * spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git- fixes). * spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes). * splice: always fsnotify_access(in), fsnotify_modify(out) on success (git- fixes). * splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes). * splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git- fixes). * srcu: Fix callbacks acceleration mishandling (git-fixes). * staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes). * sumversion: Fix a memory leak in get_src_version() (git-fixes). * supported.conf: mark nhpoly1305 module as supported (bsc#1231035). * supported.conf: mark ultravisor userspace access as supported (bsc#1232090). * task_work: add kerneldoc annotation for 'data' argument (git-fixes). * tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes). * thermal: core: Initialize thermal zones before registering them (git-fixes). * thermal: int3400: Fix reading of current_uuid for active policy (git-fixes). * thermal: intel: int340x: processor: Fix warning during module unload (git- fixes). * thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes). * thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes). * tools/lib/thermal: Fix sampling handler context ptr (git-fixes). * tools/power turbostat: Fix trailing '\n' parsing (git-fixes). * tools/power turbostat: Increase the limit for fd opened (bsc#1233119). * tools: hv: rm .*.cmd when make clean (git-fixes). * tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes). * tpm: fix signed/unsigned bug when checking event logs (git-fixes). * tracing/hwlat: Fix a race during cpuhp processing (git-fixes). * tracing/osnoise: Fix build when timerlat is not enabled (git-fixes). * tracing/osnoise: Skip running osnoise if all instances are off (git-fixes). * tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git- fixes). * tracing/osnoise: Use a cpumask to know what threads are kthreads (git- fixes). * tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes). * tracing/timerlat: Add user-space interface (git-fixes). * tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes). * tracing/timerlat: Fix a race during cpuhp processing (git-fixes). * tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes). * tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes). * tracing/timerlat: Only clear timer if a kthread exists (git-fixes). * tracing: Consider the NULL character when validating the event length (git- fixes). * tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes). * tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes). * u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes). * ubifs: Fix adding orphan entry twice for the same inode (git-fixes). * ubifs: Fix unattached xattr inode if powercut happens after deleting (git- fixes). * ubifs: add check for crypto_shash_tfm_digest (git-fixes). * ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes). * ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460). * unicode: Do not special case ignorable code points (stable-fixes). * unicode: Fix utf8_load() error path (git-fixes). * uprobe: avoid out-of-bounds memory access of fetching args (git-fixes). * uprobes: encapsulate preparation of uprobe args buffer (git-fixes). * uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114). * uprobes: turn xol_area->pages into xol_area->page (bsc#1231114). * usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes). * usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes). * usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git- fixes). * usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes). * usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes). * usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes). * usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes). * usb: ehci-spear: fix call balance of sehci clk handling routines (git- fixes). * usb: gadget: core: force synchronous registration (git-fixes). * usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable- fixes). * usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes). * usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git- fixes). * usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes). * usb: gadget: f_uac2: fix non-newline-terminated function name (stable- fixes). * usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git- fixes). * usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes). * usb: musb: sunxi: Fix accessing an released usb phy (git-fixes). * usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes). * usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes). * usb: typec: altmode should keep reference to parent (git-fixes). * usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes). * usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes). * usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes). * usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes). * usb: xhci: Fix problem with xhci resume from suspend (stable-fixes). * usb: xhci: fix loss of data on Cadence xHC (git-fixes). * usb: yurex: make waiting on yurex_write interruptible (git-fixes). * usbip: tools: Fix detach_port() invalid port error path (git-fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes). * vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes). * vdpa_sim_blk: allocate the buffer zeroed (git-fixes). * vduse: avoid using __GFP_NOFAIL (git-fixes). * vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes). * vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes). * vhost_vdpa: assign irq bypass producer token correctly (git-fixes). * virtio_console: fix misc probe bugs (git-fixes). * vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978). * vmxnet3: Add XDP support (bsc#1226498). * vmxnet3: Fix missing reserved tailroom (bsc#1226498). * vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498). * vmxnet3: add command to allow disabling of offloads (bsc#1226498). * vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498). * vmxnet3: prepare for version 9 changes (bsc#1226498). * vmxnet3: update to version 9 (bsc#1226498). * vsock: Update msg_count on read_skb() (git-fixes). * vt: prevent kernel-infoleak in con_font_get() (git-fixes). * wifi: ath10k: Fix memory leak in management tx (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes). * wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes). * wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git- fixes). * wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes). * wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes). * wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes). * wifi: ath12k: fix crash when unbinding (git-fixes). * wifi: ath12k: fix warning when unbinding (git-fixes). * wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes). * wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes). * wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable- fixes). * wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes). * wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes). * wifi: brcmfmac: release 'root' node in all execution paths (git-fixes). * wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes). * wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes). * wifi: cw1200: Fix potential NULL dereference (git-fixes). * wifi: iwlegacy: Clear stale interrupts before resuming device (stable- fixes). * wifi: iwlegacy: Fix "field-spanning write" warning in il_enqueue_hcmd() (git-fixes). * wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes). * wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes). * wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes). * wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes). * wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes). * wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes). * wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes). * wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes). * wifi: iwlwifi: mvm: use correct key iteration (stable-fixes). * wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable- fixes). * wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes). * wifi: mac80211: fix RCU list iterations (stable-fixes). * wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes). * wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes). * wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes). * wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable- fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes). * wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes). * wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes). * wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes). * wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes). * wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes). * wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes). * wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes). * wifi: rtw89: correct base HT rate mask for firmware (stable-fixes). * wifi: wfx: Fix error handling in wfx_core_init() (git-fixes). * x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443). * x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes). * x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes). * x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes). * x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes). * x86/apic: Make x2apic_disable() work correctly (git-fixes). * x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes). * x86/bugs: Skip RSB fill at VMEXIT (git-fixes). * x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes). * x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes). * x86/e820: Add a new e820 table update helper (bsc#1234034). * x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes). * x86/entry: Remove unwanted instrumentation in common_interrupt() (git- fixes). * x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes). * x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes). * x86/mm: Use IPIs to synchronize LAM enablement (git-fixes). * x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes). * x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes). * x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes). * x86/sev: Add callback to apply RMP table fixups for kexec (bsc#1234034). * x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git- fixes). * x86/sev: Dump SEV_STATUS (bsc#1234034). * x86/sev: Ensure that RMP table fixups are reserved (bsc#1234034). * x86/sev: Move sev_guest.h into common SEV header (jsc#PED-5865). * x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Enable CPU topology enumeration (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/tdx: Warning with 32bit build shift-count-overflow (jsc#PED-6143). * x86/traps: move kmsan check after instrumentation_begin (git-fixes). * x86/virt/tdx: Export SEAMCALL functions (jsc#PED-6143). * x86/virt/tdx: Export TDX KeyID information (jsc#PED-6143). * x86/virt/tdx: Export global metadata read infrastructure (jsc#PED-6143). * x86/virt/tdx: Move TDMR metadata fields map table to local variable (jsc#PED-6143). * x86/virt/tdx: Rename _offset to _member for TD_SYSINFO_MAP() macro (jsc#PED-6143). * x86/virt/tdx: Support global metadata read for all element sizes (jsc#PED-6143). * x86/virt/tdx: Unbind global metadata read with 'struct tdx_tdmr_sysinfo' (jsc#PED-6143). * x86: Increase brk randomness entropy for 64-bit systems (git-fixes). * x86: do the user address masking outside the user access area (git-fixes). * x86: fix off-by-one in access_ok() (git-fixes). * x86: fix user address masking non-canonical speculation issue (git-fixes). * x86: make the masked_user_access_begin() macro use its argument only once (git-fixes). * x86: support user address masking instead of non-speculative conditional (git-fixes). * xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754). * xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754). * xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes). * xfs: check shortform attr entry flags specifically (git-fixes). * xfs: convert delayed extents to unwritten when zeroing post eof blocks (git- fixes). * xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes). * xfs: fix freeing speculative preallocations for preallocated files (git- fixes). * xfs: make sure sb_fdblocks is non-negative (git-fixes). * xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git- fixes). * xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git- fixes). * xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes). * xfs: validate recovered name buffers when recovering xattr items (git- fixes). * xhci: Add a quirk for writing ERST in high-low order (git-fixes). * xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes). * xhci: Fix incorrect stream context type macro (git-fixes). * xhci: Mitigate failed set dequeue pointer commands (git-fixes). * xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes). * xhci: tegra: fix checked USB2 port number (git-fixes). * zonefs: Improve error handling (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Confidential Computing Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2024-4387=1 ## Package List: * Confidential Computing Module 15-SP6 (nosrc x86_64) * kernel-coco_debug-6.4.0-15061.9.coco15sp6.1 * kernel-coco-6.4.0-15061.9.coco15sp6.1 * Confidential Computing Module 15-SP6 (x86_64) * kernel-coco_debug-debuginfo-6.4.0-15061.9.coco15sp6.1 * kernel-coco_debug-devel-6.4.0-15061.9.coco15sp6.1 * kernel-coco_debug-debugsource-6.4.0-15061.9.coco15sp6.1 * kernel-coco-debugsource-6.4.0-15061.9.coco15sp6.1 * kernel-coco_debug-devel-debuginfo-6.4.0-15061.9.coco15sp6.1 * reiserfs-kmp-coco-debuginfo-6.4.0-15061.9.coco15sp6.1 * kernel-coco-vdso-debuginfo-6.4.0-15061.9.coco15sp6.1 * kernel-coco-devel-6.4.0-15061.9.coco15sp6.1 * reiserfs-kmp-coco-6.4.0-15061.9.coco15sp6.1 * kernel-syms-coco-6.4.0-15061.9.coco15sp6.1 * kernel-coco-debuginfo-6.4.0-15061.9.coco15sp6.1 * Confidential Computing Module 15-SP6 (noarch) * kernel-source-coco-6.4.0-15061.9.coco15sp6.1 * kernel-devel-coco-6.4.0-15061.9.coco15sp6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52766.html * https://www.suse.com/security/cve/CVE-2023-52778.html * https://www.suse.com/security/cve/CVE-2023-52800.html * https://www.suse.com/security/cve/CVE-2023-52881.html * https://www.suse.com/security/cve/CVE-2023-52917.html * https://www.suse.com/security/cve/CVE-2023-52918.html * https://www.suse.com/security/cve/CVE-2023-52919.html * https://www.suse.com/security/cve/CVE-2023-52920.html * https://www.suse.com/security/cve/CVE-2023-52921.html * https://www.suse.com/security/cve/CVE-2023-52922.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2024-26703.html * https://www.suse.com/security/cve/CVE-2024-26741.html * https://www.suse.com/security/cve/CVE-2024-26758.html * https://www.suse.com/security/cve/CVE-2024-26761.html * https://www.suse.com/security/cve/CVE-2024-26767.html * https://www.suse.com/security/cve/CVE-2024-26782.html * https://www.suse.com/security/cve/CVE-2024-26864.html * https://www.suse.com/security/cve/CVE-2024-26943.html * https://www.suse.com/security/cve/CVE-2024-26953.html * https://www.suse.com/security/cve/CVE-2024-27017.html * https://www.suse.com/security/cve/CVE-2024-27026.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27407.html * https://www.suse.com/security/cve/CVE-2024-35888.html * https://www.suse.com/security/cve/CVE-2024-35980.html * https://www.suse.com/security/cve/CVE-2024-36000.html * https://www.suse.com/security/cve/CVE-2024-36031.html * https://www.suse.com/security/cve/CVE-2024-36244.html * https://www.suse.com/security/cve/CVE-2024-36484.html * https://www.suse.com/security/cve/CVE-2024-36883.html * https://www.suse.com/security/cve/CVE-2024-36886.html * https://www.suse.com/security/cve/CVE-2024-36905.html * https://www.suse.com/security/cve/CVE-2024-36920.html * https://www.suse.com/security/cve/CVE-2024-36927.html * https://www.suse.com/security/cve/CVE-2024-36954.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38576.html * https://www.suse.com/security/cve/CVE-2024-38577.html * https://www.suse.com/security/cve/CVE-2024-38589.html * https://www.suse.com/security/cve/CVE-2024-38599.html * https://www.suse.com/security/cve/CVE-2024-40914.html * https://www.suse.com/security/cve/CVE-2024-41016.html * https://www.suse.com/security/cve/CVE-2024-41023.html * https://www.suse.com/security/cve/CVE-2024-41031.html * https://www.suse.com/security/cve/CVE-2024-41047.html * https://www.suse.com/security/cve/CVE-2024-41082.html * https://www.suse.com/security/cve/CVE-2024-42102.html * https://www.suse.com/security/cve/CVE-2024-42145.html * https://www.suse.com/security/cve/CVE-2024-44932.html * https://www.suse.com/security/cve/CVE-2024-44958.html * https://www.suse.com/security/cve/CVE-2024-44964.html * https://www.suse.com/security/cve/CVE-2024-44995.html * https://www.suse.com/security/cve/CVE-2024-45016.html * https://www.suse.com/security/cve/CVE-2024-45025.html * https://www.suse.com/security/cve/CVE-2024-46678.html * https://www.suse.com/security/cve/CVE-2024-46681.html * https://www.suse.com/security/cve/CVE-2024-46721.html * https://www.suse.com/security/cve/CVE-2024-46754.html * https://www.suse.com/security/cve/CVE-2024-46766.html * https://www.suse.com/security/cve/CVE-2024-46770.html * https://www.suse.com/security/cve/CVE-2024-46775.html * https://www.suse.com/security/cve/CVE-2024-46777.html * https://www.suse.com/security/cve/CVE-2024-46788.html * https://www.suse.com/security/cve/CVE-2024-46797.html * https://www.suse.com/security/cve/CVE-2024-46802.html * https://www.suse.com/security/cve/CVE-2024-46803.html * https://www.suse.com/security/cve/CVE-2024-46804.html * https://www.suse.com/security/cve/CVE-2024-46805.html * https://www.suse.com/security/cve/CVE-2024-46806.html * https://www.suse.com/security/cve/CVE-2024-46807.html * https://www.suse.com/security/cve/CVE-2024-46809.html * https://www.suse.com/security/cve/CVE-2024-46810.html * https://www.suse.com/security/cve/CVE-2024-46811.html * https://www.suse.com/security/cve/CVE-2024-46812.html * https://www.suse.com/security/cve/CVE-2024-46813.html * https://www.suse.com/security/cve/CVE-2024-46814.html * https://www.suse.com/security/cve/CVE-2024-46815.html * https://www.suse.com/security/cve/CVE-2024-46816.html * https://www.suse.com/security/cve/CVE-2024-46817.html * https://www.suse.com/security/cve/CVE-2024-46818.html * https://www.suse.com/security/cve/CVE-2024-46819.html * https://www.suse.com/security/cve/CVE-2024-46821.html * https://www.suse.com/security/cve/CVE-2024-46825.html * https://www.suse.com/security/cve/CVE-2024-46826.html * https://www.suse.com/security/cve/CVE-2024-46827.html * https://www.suse.com/security/cve/CVE-2024-46828.html * https://www.suse.com/security/cve/CVE-2024-46830.html * https://www.suse.com/security/cve/CVE-2024-46831.html * https://www.suse.com/security/cve/CVE-2024-46834.html * https://www.suse.com/security/cve/CVE-2024-46835.html * https://www.suse.com/security/cve/CVE-2024-46836.html * https://www.suse.com/security/cve/CVE-2024-46840.html * https://www.suse.com/security/cve/CVE-2024-46841.html * https://www.suse.com/security/cve/CVE-2024-46842.html * https://www.suse.com/security/cve/CVE-2024-46843.html * https://www.suse.com/security/cve/CVE-2024-46845.html * https://www.suse.com/security/cve/CVE-2024-46846.html * https://www.suse.com/security/cve/CVE-2024-46848.html * https://www.suse.com/security/cve/CVE-2024-46849.html * https://www.suse.com/security/cve/CVE-2024-46851.html * https://www.suse.com/security/cve/CVE-2024-46852.html * https://www.suse.com/security/cve/CVE-2024-46853.html * https://www.suse.com/security/cve/CVE-2024-46854.html * https://www.suse.com/security/cve/CVE-2024-46855.html * https://www.suse.com/security/cve/CVE-2024-46857.html * https://www.suse.com/security/cve/CVE-2024-46859.html * https://www.suse.com/security/cve/CVE-2024-46860.html * https://www.suse.com/security/cve/CVE-2024-46861.html * https://www.suse.com/security/cve/CVE-2024-46864.html * https://www.suse.com/security/cve/CVE-2024-46870.html * https://www.suse.com/security/cve/CVE-2024-46871.html * https://www.suse.com/security/cve/CVE-2024-47658.html * https://www.suse.com/security/cve/CVE-2024-47660.html * https://www.suse.com/security/cve/CVE-2024-47661.html * https://www.suse.com/security/cve/CVE-2024-47662.html * https://www.suse.com/security/cve/CVE-2024-47663.html * https://www.suse.com/security/cve/CVE-2024-47664.html * https://www.suse.com/security/cve/CVE-2024-47665.html * https://www.suse.com/security/cve/CVE-2024-47666.html * https://www.suse.com/security/cve/CVE-2024-47667.html * https://www.suse.com/security/cve/CVE-2024-47668.html * https://www.suse.com/security/cve/CVE-2024-47669.html * https://www.suse.com/security/cve/CVE-2024-47670.html * https://www.suse.com/security/cve/CVE-2024-47671.html * https://www.suse.com/security/cve/CVE-2024-47672.html * https://www.suse.com/security/cve/CVE-2024-47673.html * https://www.suse.com/security/cve/CVE-2024-47674.html * https://www.suse.com/security/cve/CVE-2024-47675.html * https://www.suse.com/security/cve/CVE-2024-47679.html * https://www.suse.com/security/cve/CVE-2024-47681.html * https://www.suse.com/security/cve/CVE-2024-47682.html * https://www.suse.com/security/cve/CVE-2024-47684.html * https://www.suse.com/security/cve/CVE-2024-47685.html * https://www.suse.com/security/cve/CVE-2024-47686.html * https://www.suse.com/security/cve/CVE-2024-47687.html * https://www.suse.com/security/cve/CVE-2024-47688.html * https://www.suse.com/security/cve/CVE-2024-47692.html * https://www.suse.com/security/cve/CVE-2024-47693.html * https://www.suse.com/security/cve/CVE-2024-47695.html * https://www.suse.com/security/cve/CVE-2024-47696.html * https://www.suse.com/security/cve/CVE-2024-47697.html * https://www.suse.com/security/cve/CVE-2024-47698.html * https://www.suse.com/security/cve/CVE-2024-47699.html * https://www.suse.com/security/cve/CVE-2024-47701.html * https://www.suse.com/security/cve/CVE-2024-47702.html * https://www.suse.com/security/cve/CVE-2024-47703.html * https://www.suse.com/security/cve/CVE-2024-47704.html * https://www.suse.com/security/cve/CVE-2024-47705.html * https://www.suse.com/security/cve/CVE-2024-47706.html * https://www.suse.com/security/cve/CVE-2024-47707.html * https://www.suse.com/security/cve/CVE-2024-47709.html * https://www.suse.com/security/cve/CVE-2024-47710.html * https://www.suse.com/security/cve/CVE-2024-47712.html * https://www.suse.com/security/cve/CVE-2024-47713.html * https://www.suse.com/security/cve/CVE-2024-47714.html * https://www.suse.com/security/cve/CVE-2024-47715.html * https://www.suse.com/security/cve/CVE-2024-47718.html * https://www.suse.com/security/cve/CVE-2024-47719.html * https://www.suse.com/security/cve/CVE-2024-47720.html * https://www.suse.com/security/cve/CVE-2024-47723.html * https://www.suse.com/security/cve/CVE-2024-47727.html * https://www.suse.com/security/cve/CVE-2024-47728.html * https://www.suse.com/security/cve/CVE-2024-47730.html * https://www.suse.com/security/cve/CVE-2024-47731.html * https://www.suse.com/security/cve/CVE-2024-47732.html * https://www.suse.com/security/cve/CVE-2024-47735.html * https://www.suse.com/security/cve/CVE-2024-47737.html * https://www.suse.com/security/cve/CVE-2024-47738.html * https://www.suse.com/security/cve/CVE-2024-47739.html * https://www.suse.com/security/cve/CVE-2024-47741.html * https://www.suse.com/security/cve/CVE-2024-47742.html * https://www.suse.com/security/cve/CVE-2024-47743.html * https://www.suse.com/security/cve/CVE-2024-47744.html * https://www.suse.com/security/cve/CVE-2024-47745.html * https://www.suse.com/security/cve/CVE-2024-47747.html * https://www.suse.com/security/cve/CVE-2024-47748.html * https://www.suse.com/security/cve/CVE-2024-47749.html * https://www.suse.com/security/cve/CVE-2024-47750.html * https://www.suse.com/security/cve/CVE-2024-47751.html * https://www.suse.com/security/cve/CVE-2024-47752.html * https://www.suse.com/security/cve/CVE-2024-47753.html * https://www.suse.com/security/cve/CVE-2024-47754.html * https://www.suse.com/security/cve/CVE-2024-47756.html * https://www.suse.com/security/cve/CVE-2024-47757.html * https://www.suse.com/security/cve/CVE-2024-49850.html * https://www.suse.com/security/cve/CVE-2024-49851.html * https://www.suse.com/security/cve/CVE-2024-49852.html * https://www.suse.com/security/cve/CVE-2024-49853.html * https://www.suse.com/security/cve/CVE-2024-49855.html * https://www.suse.com/security/cve/CVE-2024-49858.html * https://www.suse.com/security/cve/CVE-2024-49860.html * https://www.suse.com/security/cve/CVE-2024-49861.html * https://www.suse.com/security/cve/CVE-2024-49862.html * https://www.suse.com/security/cve/CVE-2024-49863.html * https://www.suse.com/security/cve/CVE-2024-49864.html * https://www.suse.com/security/cve/CVE-2024-49866.html * https://www.suse.com/security/cve/CVE-2024-49867.html * https://www.suse.com/security/cve/CVE-2024-49868.html * https://www.suse.com/security/cve/CVE-2024-49870.html * https://www.suse.com/security/cve/CVE-2024-49871.html * https://www.suse.com/security/cve/CVE-2024-49874.html * https://www.suse.com/security/cve/CVE-2024-49875.html * https://www.suse.com/security/cve/CVE-2024-49877.html * https://www.suse.com/security/cve/CVE-2024-49878.html * https://www.suse.com/security/cve/CVE-2024-49879.html * https://www.suse.com/security/cve/CVE-2024-49881.html * https://www.suse.com/security/cve/CVE-2024-49882.html * https://www.suse.com/security/cve/CVE-2024-49883.html * https://www.suse.com/security/cve/CVE-2024-49884.html * https://www.suse.com/security/cve/CVE-2024-49886.html * https://www.suse.com/security/cve/CVE-2024-49888.html * https://www.suse.com/security/cve/CVE-2024-49890.html * https://www.suse.com/security/cve/CVE-2024-49891.html * https://www.suse.com/security/cve/CVE-2024-49892.html * https://www.suse.com/security/cve/CVE-2024-49894.html * https://www.suse.com/security/cve/CVE-2024-49895.html * https://www.suse.com/security/cve/CVE-2024-49896.html * https://www.suse.com/security/cve/CVE-2024-49897.html * https://www.suse.com/security/cve/CVE-2024-49898.html * https://www.suse.com/security/cve/CVE-2024-49899.html * https://www.suse.com/security/cve/CVE-2024-49900.html * https://www.suse.com/security/cve/CVE-2024-49901.html * https://www.suse.com/security/cve/CVE-2024-49902.html * https://www.suse.com/security/cve/CVE-2024-49903.html * https://www.suse.com/security/cve/CVE-2024-49905.html * https://www.suse.com/security/cve/CVE-2024-49906.html * https://www.suse.com/security/cve/CVE-2024-49907.html * https://www.suse.com/security/cve/CVE-2024-49908.html * https://www.suse.com/security/cve/CVE-2024-49909.html * https://www.suse.com/security/cve/CVE-2024-49911.html * https://www.suse.com/security/cve/CVE-2024-49912.html * https://www.suse.com/security/cve/CVE-2024-49913.html * https://www.suse.com/security/cve/CVE-2024-49914.html * https://www.suse.com/security/cve/CVE-2024-49917.html * https://www.suse.com/security/cve/CVE-2024-49918.html * https://www.suse.com/security/cve/CVE-2024-49919.html * https://www.suse.com/security/cve/CVE-2024-49920.html * https://www.suse.com/security/cve/CVE-2024-49921.html * https://www.suse.com/security/cve/CVE-2024-49922.html * https://www.suse.com/security/cve/CVE-2024-49923.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-49928.html * https://www.suse.com/security/cve/CVE-2024-49929.html * https://www.suse.com/security/cve/CVE-2024-49930.html * https://www.suse.com/security/cve/CVE-2024-49931.html * https://www.suse.com/security/cve/CVE-2024-49933.html * https://www.suse.com/security/cve/CVE-2024-49934.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49936.html * https://www.suse.com/security/cve/CVE-2024-49937.html * https://www.suse.com/security/cve/CVE-2024-49938.html * https://www.suse.com/security/cve/CVE-2024-49939.html * https://www.suse.com/security/cve/CVE-2024-49945.html * https://www.suse.com/security/cve/CVE-2024-49946.html * https://www.suse.com/security/cve/CVE-2024-49947.html * https://www.suse.com/security/cve/CVE-2024-49949.html * https://www.suse.com/security/cve/CVE-2024-49950.html * https://www.suse.com/security/cve/CVE-2024-49953.html * https://www.suse.com/security/cve/CVE-2024-49954.html * https://www.suse.com/security/cve/CVE-2024-49955.html * https://www.suse.com/security/cve/CVE-2024-49957.html * https://www.suse.com/security/cve/CVE-2024-49958.html * https://www.suse.com/security/cve/CVE-2024-49959.html * https://www.suse.com/security/cve/CVE-2024-49960.html * https://www.suse.com/security/cve/CVE-2024-49961.html * https://www.suse.com/security/cve/CVE-2024-49962.html * https://www.suse.com/security/cve/CVE-2024-49963.html * https://www.suse.com/security/cve/CVE-2024-49965.html * https://www.suse.com/security/cve/CVE-2024-49966.html * https://www.suse.com/security/cve/CVE-2024-49967.html * https://www.suse.com/security/cve/CVE-2024-49968.html * https://www.suse.com/security/cve/CVE-2024-49969.html * https://www.suse.com/security/cve/CVE-2024-49972.html * https://www.suse.com/security/cve/CVE-2024-49973.html * https://www.suse.com/security/cve/CVE-2024-49974.html * https://www.suse.com/security/cve/CVE-2024-49975.html * https://www.suse.com/security/cve/CVE-2024-49976.html * https://www.suse.com/security/cve/CVE-2024-49981.html * https://www.suse.com/security/cve/CVE-2024-49982.html * https://www.suse.com/security/cve/CVE-2024-49983.html * https://www.suse.com/security/cve/CVE-2024-49985.html * https://www.suse.com/security/cve/CVE-2024-49986.html * https://www.suse.com/security/cve/CVE-2024-49987.html * https://www.suse.com/security/cve/CVE-2024-49989.html * https://www.suse.com/security/cve/CVE-2024-49991.html * https://www.suse.com/security/cve/CVE-2024-49993.html * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-49996.html * https://www.suse.com/security/cve/CVE-2024-50000.html * https://www.suse.com/security/cve/CVE-2024-50001.html * https://www.suse.com/security/cve/CVE-2024-50002.html * https://www.suse.com/security/cve/CVE-2024-50003.html * https://www.suse.com/security/cve/CVE-2024-50004.html * https://www.suse.com/security/cve/CVE-2024-50006.html * https://www.suse.com/security/cve/CVE-2024-50007.html * https://www.suse.com/security/cve/CVE-2024-50008.html * https://www.suse.com/security/cve/CVE-2024-50009.html * https://www.suse.com/security/cve/CVE-2024-50012.html * https://www.suse.com/security/cve/CVE-2024-50013.html * https://www.suse.com/security/cve/CVE-2024-50014.html * https://www.suse.com/security/cve/CVE-2024-50015.html * https://www.suse.com/security/cve/CVE-2024-50017.html * https://www.suse.com/security/cve/CVE-2024-50019.html * https://www.suse.com/security/cve/CVE-2024-50020.html * https://www.suse.com/security/cve/CVE-2024-50021.html * https://www.suse.com/security/cve/CVE-2024-50022.html * https://www.suse.com/security/cve/CVE-2024-50023.html * https://www.suse.com/security/cve/CVE-2024-50024.html * https://www.suse.com/security/cve/CVE-2024-50025.html * https://www.suse.com/security/cve/CVE-2024-50026.html * https://www.suse.com/security/cve/CVE-2024-50027.html * https://www.suse.com/security/cve/CVE-2024-50028.html * https://www.suse.com/security/cve/CVE-2024-50031.html * https://www.suse.com/security/cve/CVE-2024-50033.html * https://www.suse.com/security/cve/CVE-2024-50035.html * https://www.suse.com/security/cve/CVE-2024-50040.html * https://www.suse.com/security/cve/CVE-2024-50041.html * https://www.suse.com/security/cve/CVE-2024-50042.html * https://www.suse.com/security/cve/CVE-2024-50044.html * https://www.suse.com/security/cve/CVE-2024-50045.html * https://www.suse.com/security/cve/CVE-2024-50046.html * https://www.suse.com/security/cve/CVE-2024-50047.html * https://www.suse.com/security/cve/CVE-2024-50048.html * https://www.suse.com/security/cve/CVE-2024-50049.html * https://www.suse.com/security/cve/CVE-2024-50055.html * https://www.suse.com/security/cve/CVE-2024-50058.html * https://www.suse.com/security/cve/CVE-2024-50059.html * https://www.suse.com/security/cve/CVE-2024-50060.html * https://www.suse.com/security/cve/CVE-2024-50061.html * https://www.suse.com/security/cve/CVE-2024-50062.html * https://www.suse.com/security/cve/CVE-2024-50063.html * https://www.suse.com/security/cve/CVE-2024-50064.html * https://www.suse.com/security/cve/CVE-2024-50067.html * https://www.suse.com/security/cve/CVE-2024-50069.html * https://www.suse.com/security/cve/CVE-2024-50073.html * https://www.suse.com/security/cve/CVE-2024-50074.html * https://www.suse.com/security/cve/CVE-2024-50075.html * https://www.suse.com/security/cve/CVE-2024-50076.html * https://www.suse.com/security/cve/CVE-2024-50077.html * https://www.suse.com/security/cve/CVE-2024-50078.html * https://www.suse.com/security/cve/CVE-2024-50080.html * https://www.suse.com/security/cve/CVE-2024-50081.html * https://www.suse.com/security/cve/CVE-2024-50082.html * https://www.suse.com/security/cve/CVE-2024-50084.html * https://www.suse.com/security/cve/CVE-2024-50087.html * https://www.suse.com/security/cve/CVE-2024-50088.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50093.html * https://www.suse.com/security/cve/CVE-2024-50095.html * https://www.suse.com/security/cve/CVE-2024-50096.html * https://www.suse.com/security/cve/CVE-2024-50098.html * https://www.suse.com/security/cve/CVE-2024-50099.html * https://www.suse.com/security/cve/CVE-2024-50100.html * https://www.suse.com/security/cve/CVE-2024-50101.html * https://www.suse.com/security/cve/CVE-2024-50102.html * https://www.suse.com/security/cve/CVE-2024-50103.html * https://www.suse.com/security/cve/CVE-2024-50108.html * https://www.suse.com/security/cve/CVE-2024-50110.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50116.html * https://www.suse.com/security/cve/CVE-2024-50117.html * https://www.suse.com/security/cve/CVE-2024-50121.html * https://www.suse.com/security/cve/CVE-2024-50124.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50128.html * https://www.suse.com/security/cve/CVE-2024-50130.html * https://www.suse.com/security/cve/CVE-2024-50131.html * https://www.suse.com/security/cve/CVE-2024-50134.html * https://www.suse.com/security/cve/CVE-2024-50135.html * https://www.suse.com/security/cve/CVE-2024-50136.html * https://www.suse.com/security/cve/CVE-2024-50138.html * https://www.suse.com/security/cve/CVE-2024-50139.html * https://www.suse.com/security/cve/CVE-2024-50141.html * https://www.suse.com/security/cve/CVE-2024-50145.html * https://www.suse.com/security/cve/CVE-2024-50146.html * https://www.suse.com/security/cve/CVE-2024-50147.html * https://www.suse.com/security/cve/CVE-2024-50148.html * https://www.suse.com/security/cve/CVE-2024-50150.html * https://www.suse.com/security/cve/CVE-2024-50153.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50155.html * https://www.suse.com/security/cve/CVE-2024-50156.html * https://www.suse.com/security/cve/CVE-2024-50157.html * https://www.suse.com/security/cve/CVE-2024-50158.html * https://www.suse.com/security/cve/CVE-2024-50159.html * https://www.suse.com/security/cve/CVE-2024-50160.html * https://www.suse.com/security/cve/CVE-2024-50166.html * https://www.suse.com/security/cve/CVE-2024-50167.html * https://www.suse.com/security/cve/CVE-2024-50169.html * https://www.suse.com/security/cve/CVE-2024-50171.html * https://www.suse.com/security/cve/CVE-2024-50172.html * https://www.suse.com/security/cve/CVE-2024-50175.html * https://www.suse.com/security/cve/CVE-2024-50176.html * https://www.suse.com/security/cve/CVE-2024-50177.html * https://www.suse.com/security/cve/CVE-2024-50179.html * https://www.suse.com/security/cve/CVE-2024-50180.html * https://www.suse.com/security/cve/CVE-2024-50181.html * https://www.suse.com/security/cve/CVE-2024-50182.html * https://www.suse.com/security/cve/CVE-2024-50183.html * https://www.suse.com/security/cve/CVE-2024-50184.html * https://www.suse.com/security/cve/CVE-2024-50186.html * https://www.suse.com/security/cve/CVE-2024-50187.html * https://www.suse.com/security/cve/CVE-2024-50188.html * https://www.suse.com/security/cve/CVE-2024-50189.html * https://www.suse.com/security/cve/CVE-2024-50192.html * https://www.suse.com/security/cve/CVE-2024-50194.html * https://www.suse.com/security/cve/CVE-2024-50195.html * https://www.suse.com/security/cve/CVE-2024-50196.html * https://www.suse.com/security/cve/CVE-2024-50198.html * https://www.suse.com/security/cve/CVE-2024-50200.html * https://www.suse.com/security/cve/CVE-2024-50201.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50209.html * https://www.suse.com/security/cve/CVE-2024-50210.html * https://www.suse.com/security/cve/CVE-2024-50215.html * https://www.suse.com/security/cve/CVE-2024-50216.html * https://www.suse.com/security/cve/CVE-2024-50218.html * https://www.suse.com/security/cve/CVE-2024-50221.html * https://www.suse.com/security/cve/CVE-2024-50224.html * https://www.suse.com/security/cve/CVE-2024-50225.html * https://www.suse.com/security/cve/CVE-2024-50229.html * https://www.suse.com/security/cve/CVE-2024-50230.html * https://www.suse.com/security/cve/CVE-2024-50231.html * https://www.suse.com/security/cve/CVE-2024-50232.html * https://www.suse.com/security/cve/CVE-2024-50233.html * https://www.suse.com/security/cve/CVE-2024-50234.html * https://www.suse.com/security/cve/CVE-2024-50235.html * https://www.suse.com/security/cve/CVE-2024-50236.html * https://www.suse.com/security/cve/CVE-2024-50237.html * https://www.suse.com/security/cve/CVE-2024-50240.html * https://www.suse.com/security/cve/CVE-2024-50245.html * https://www.suse.com/security/cve/CVE-2024-50246.html * https://www.suse.com/security/cve/CVE-2024-50248.html * https://www.suse.com/security/cve/CVE-2024-50249.html * https://www.suse.com/security/cve/CVE-2024-50250.html * https://www.suse.com/security/cve/CVE-2024-50255.html * https://www.suse.com/security/cve/CVE-2024-50257.html * https://www.suse.com/security/cve/CVE-2024-50261.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50265.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50268.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50271.html * https://www.suse.com/security/cve/CVE-2024-50273.html * https://www.suse.com/security/cve/CVE-2024-50274.html * https://www.suse.com/security/cve/CVE-2024-50275.html * https://www.suse.com/security/cve/CVE-2024-50276.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50282.html * https://www.suse.com/security/cve/CVE-2024-50287.html * https://www.suse.com/security/cve/CVE-2024-50289.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50292.html * https://www.suse.com/security/cve/CVE-2024-50295.html * https://www.suse.com/security/cve/CVE-2024-50298.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53042.html * https://www.suse.com/security/cve/CVE-2024-53045.html * https://www.suse.com/security/cve/CVE-2024-53048.html * https://www.suse.com/security/cve/CVE-2024-53052.html * https://www.suse.com/security/cve/CVE-2024-53058.html * https://www.suse.com/security/cve/CVE-2024-53059.html * https://www.suse.com/security/cve/CVE-2024-53060.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53066.html * https://www.suse.com/security/cve/CVE-2024-53068.html * https://www.suse.com/security/cve/CVE-2024-53072.html * https://www.suse.com/security/cve/CVE-2024-53074.html * https://www.suse.com/security/cve/CVE-2024-53076.html * https://www.suse.com/security/cve/CVE-2024-53079.html * https://www.suse.com/security/cve/CVE-2024-53081.html * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53085.html * https://www.suse.com/security/cve/CVE-2024-53088.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-53094.html * https://www.suse.com/security/cve/CVE-2024-53096.html * https://www.suse.com/security/cve/CVE-2024-53100.html * https://www.suse.com/security/cve/CVE-2024-53101.html * https://www.suse.com/security/cve/CVE-2024-53104.html * https://www.suse.com/security/cve/CVE-2024-53106.html * https://www.suse.com/security/cve/CVE-2024-53108.html * https://www.suse.com/security/cve/CVE-2024-53112.html * https://www.suse.com/security/cve/CVE-2024-53114.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1217845 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1219596 * https://bugzilla.suse.com/show_bug.cgi?id=1219803 * https://bugzilla.suse.com/show_bug.cgi?id=1220382 * https://bugzilla.suse.com/show_bug.cgi?id=1221309 * https://bugzilla.suse.com/show_bug.cgi?id=1222423 * https://bugzilla.suse.com/show_bug.cgi?id=1222587 * https://bugzilla.suse.com/show_bug.cgi?id=1222590 * https://bugzilla.suse.com/show_bug.cgi?id=1223112 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223656 * https://bugzilla.suse.com/show_bug.cgi?id=1223700 * https://bugzilla.suse.com/show_bug.cgi?id=1223733 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 * https://bugzilla.suse.com/show_bug.cgi?id=1223848 * https://bugzilla.suse.com/show_bug.cgi?id=1224088 * https://bugzilla.suse.com/show_bug.cgi?id=1224429 * https://bugzilla.suse.com/show_bug.cgi?id=1224518 * https://bugzilla.suse.com/show_bug.cgi?id=1224548 * https://bugzilla.suse.com/show_bug.cgi?id=1224574 * https://bugzilla.suse.com/show_bug.cgi?id=1224948 * https://bugzilla.suse.com/show_bug.cgi?id=1225611 * https://bugzilla.suse.com/show_bug.cgi?id=1225713 * https://bugzilla.suse.com/show_bug.cgi?id=1225725 * https://bugzilla.suse.com/show_bug.cgi?id=1225730 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225764 * https://bugzilla.suse.com/show_bug.cgi?id=1225768 * https://bugzilla.suse.com/show_bug.cgi?id=1225813 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1226003 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226498 * https://bugzilla.suse.com/show_bug.cgi?id=1226623 * https://bugzilla.suse.com/show_bug.cgi?id=1226631 * https://bugzilla.suse.com/show_bug.cgi?id=1226748 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226848 * https://bugzilla.suse.com/show_bug.cgi?id=1226872 * https://bugzilla.suse.com/show_bug.cgi?id=1227726 * https://bugzilla.suse.com/show_bug.cgi?id=1227842 * https://bugzilla.suse.com/show_bug.cgi?id=1228119 * https://bugzilla.suse.com/show_bug.cgi?id=1228244 * https://bugzilla.suse.com/show_bug.cgi?id=1228269 * https://bugzilla.suse.com/show_bug.cgi?id=1228410 * https://bugzilla.suse.com/show_bug.cgi?id=1228430 * https://bugzilla.suse.com/show_bug.cgi?id=1228454 * https://bugzilla.suse.com/show_bug.cgi?id=1228537 * https://bugzilla.suse.com/show_bug.cgi?id=1228620 * https://bugzilla.suse.com/show_bug.cgi?id=1228743 * https://bugzilla.suse.com/show_bug.cgi?id=1228747 * https://bugzilla.suse.com/show_bug.cgi?id=1228850 * https://bugzilla.suse.com/show_bug.cgi?id=1228857 * https://bugzilla.suse.com/show_bug.cgi?id=1229019 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1229429 * https://bugzilla.suse.com/show_bug.cgi?id=1229450 * https://bugzilla.suse.com/show_bug.cgi?id=1229585 * https://bugzilla.suse.com/show_bug.cgi?id=1229677 * https://bugzilla.suse.com/show_bug.cgi?id=1229769 * https://bugzilla.suse.com/show_bug.cgi?id=1229808 * https://bugzilla.suse.com/show_bug.cgi?id=1229891 * https://bugzilla.suse.com/show_bug.cgi?id=1230055 * https://bugzilla.suse.com/show_bug.cgi?id=1230132 * https://bugzilla.suse.com/show_bug.cgi?id=1230179 * https://bugzilla.suse.com/show_bug.cgi?id=1230220 * https://bugzilla.suse.com/show_bug.cgi?id=1230231 * https://bugzilla.suse.com/show_bug.cgi?id=1230289 * https://bugzilla.suse.com/show_bug.cgi?id=1230295 * https://bugzilla.suse.com/show_bug.cgi?id=1230339 * https://bugzilla.suse.com/show_bug.cgi?id=1230341 * https://bugzilla.suse.com/show_bug.cgi?id=1230375 * https://bugzilla.suse.com/show_bug.cgi?id=1230414 * https://bugzilla.suse.com/show_bug.cgi?id=1230429 * https://bugzilla.suse.com/show_bug.cgi?id=1230456 * https://bugzilla.suse.com/show_bug.cgi?id=1230501 * https://bugzilla.suse.com/show_bug.cgi?id=1230527 * https://bugzilla.suse.com/show_bug.cgi?id=1230550 * https://bugzilla.suse.com/show_bug.cgi?id=1230558 * https://bugzilla.suse.com/show_bug.cgi?id=1230600 * https://bugzilla.suse.com/show_bug.cgi?id=1230620 * https://bugzilla.suse.com/show_bug.cgi?id=1230710 * https://bugzilla.suse.com/show_bug.cgi?id=1230733 * https://bugzilla.suse.com/show_bug.cgi?id=1230762 * https://bugzilla.suse.com/show_bug.cgi?id=1230763 * https://bugzilla.suse.com/show_bug.cgi?id=1230773 * https://bugzilla.suse.com/show_bug.cgi?id=1230774 * https://bugzilla.suse.com/show_bug.cgi?id=1230801 * https://bugzilla.suse.com/show_bug.cgi?id=1230817 * https://bugzilla.suse.com/show_bug.cgi?id=1230831 * https://bugzilla.suse.com/show_bug.cgi?id=1230914 * https://bugzilla.suse.com/show_bug.cgi?id=1230918 * https://bugzilla.suse.com/show_bug.cgi?id=1230971 * https://bugzilla.suse.com/show_bug.cgi?id=1231016 * https://bugzilla.suse.com/show_bug.cgi?id=1231035 * https://bugzilla.suse.com/show_bug.cgi?id=1231072 * https://bugzilla.suse.com/show_bug.cgi?id=1231073 * https://bugzilla.suse.com/show_bug.cgi?id=1231075 * https://bugzilla.suse.com/show_bug.cgi?id=1231076 * https://bugzilla.suse.com/show_bug.cgi?id=1231081 * https://bugzilla.suse.com/show_bug.cgi?id=1231082 * https://bugzilla.suse.com/show_bug.cgi?id=1231083 * https://bugzilla.suse.com/show_bug.cgi?id=1231084 * https://bugzilla.suse.com/show_bug.cgi?id=1231085 * https://bugzilla.suse.com/show_bug.cgi?id=1231087 * https://bugzilla.suse.com/show_bug.cgi?id=1231089 * https://bugzilla.suse.com/show_bug.cgi?id=1231092 * https://bugzilla.suse.com/show_bug.cgi?id=1231093 * https://bugzilla.suse.com/show_bug.cgi?id=1231094 * https://bugzilla.suse.com/show_bug.cgi?id=1231096 * https://bugzilla.suse.com/show_bug.cgi?id=1231098 * https://bugzilla.suse.com/show_bug.cgi?id=1231100 * https://bugzilla.suse.com/show_bug.cgi?id=1231101 * https://bugzilla.suse.com/show_bug.cgi?id=1231102 * https://bugzilla.suse.com/show_bug.cgi?id=1231105 * https://bugzilla.suse.com/show_bug.cgi?id=1231108 * https://bugzilla.suse.com/show_bug.cgi?id=1231111 * https://bugzilla.suse.com/show_bug.cgi?id=1231114 * https://bugzilla.suse.com/show_bug.cgi?id=1231115 * https://bugzilla.suse.com/show_bug.cgi?id=1231116 * https://bugzilla.suse.com/show_bug.cgi?id=1231117 * https://bugzilla.suse.com/show_bug.cgi?id=1231131 * https://bugzilla.suse.com/show_bug.cgi?id=1231132 * https://bugzilla.suse.com/show_bug.cgi?id=1231135 * https://bugzilla.suse.com/show_bug.cgi?id=1231136 * https://bugzilla.suse.com/show_bug.cgi?id=1231138 * https://bugzilla.suse.com/show_bug.cgi?id=1231148 * https://bugzilla.suse.com/show_bug.cgi?id=1231169 * https://bugzilla.suse.com/show_bug.cgi?id=1231170 * https://bugzilla.suse.com/show_bug.cgi?id=1231171 * https://bugzilla.suse.com/show_bug.cgi?id=1231178 * https://bugzilla.suse.com/show_bug.cgi?id=1231179 * https://bugzilla.suse.com/show_bug.cgi?id=1231182 * https://bugzilla.suse.com/show_bug.cgi?id=1231183 * https://bugzilla.suse.com/show_bug.cgi?id=1231187 * https://bugzilla.suse.com/show_bug.cgi?id=1231191 * https://bugzilla.suse.com/show_bug.cgi?id=1231193 * https://bugzilla.suse.com/show_bug.cgi?id=1231195 * https://bugzilla.suse.com/show_bug.cgi?id=1231197 * https://bugzilla.suse.com/show_bug.cgi?id=1231200 * https://bugzilla.suse.com/show_bug.cgi?id=1231202 * https://bugzilla.suse.com/show_bug.cgi?id=1231203 * https://bugzilla.suse.com/show_bug.cgi?id=1231276 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231384 * https://bugzilla.suse.com/show_bug.cgi?id=1231434 * https://bugzilla.suse.com/show_bug.cgi?id=1231435 * https://bugzilla.suse.com/show_bug.cgi?id=1231436 * https://bugzilla.suse.com/show_bug.cgi?id=1231439 * https://bugzilla.suse.com/show_bug.cgi?id=1231440 * https://bugzilla.suse.com/show_bug.cgi?id=1231441 * https://bugzilla.suse.com/show_bug.cgi?id=1231442 * https://bugzilla.suse.com/show_bug.cgi?id=1231452 * https://bugzilla.suse.com/show_bug.cgi?id=1231453 * https://bugzilla.suse.com/show_bug.cgi?id=1231465 * https://bugzilla.suse.com/show_bug.cgi?id=1231474 * https://bugzilla.suse.com/show_bug.cgi?id=1231481 * https://bugzilla.suse.com/show_bug.cgi?id=1231496 * https://bugzilla.suse.com/show_bug.cgi?id=1231502 * https://bugzilla.suse.com/show_bug.cgi?id=1231537 * https://bugzilla.suse.com/show_bug.cgi?id=1231539 * https://bugzilla.suse.com/show_bug.cgi?id=1231540 * https://bugzilla.suse.com/show_bug.cgi?id=1231541 * https://bugzilla.suse.com/show_bug.cgi?id=1231617 * https://bugzilla.suse.com/show_bug.cgi?id=1231630 * https://bugzilla.suse.com/show_bug.cgi?id=1231634 * https://bugzilla.suse.com/show_bug.cgi?id=1231635 * https://bugzilla.suse.com/show_bug.cgi?id=1231636 * https://bugzilla.suse.com/show_bug.cgi?id=1231637 * https://bugzilla.suse.com/show_bug.cgi?id=1231638 * https://bugzilla.suse.com/show_bug.cgi?id=1231639 * https://bugzilla.suse.com/show_bug.cgi?id=1231640 * https://bugzilla.suse.com/show_bug.cgi?id=1231673 * https://bugzilla.suse.com/show_bug.cgi?id=1231828 * https://bugzilla.suse.com/show_bug.cgi?id=1231849 * https://bugzilla.suse.com/show_bug.cgi?id=1231855 * https://bugzilla.suse.com/show_bug.cgi?id=1231856 * https://bugzilla.suse.com/show_bug.cgi?id=1231857 * https://bugzilla.suse.com/show_bug.cgi?id=1231858 * https://bugzilla.suse.com/show_bug.cgi?id=1231859 * https://bugzilla.suse.com/show_bug.cgi?id=1231860 * https://bugzilla.suse.com/show_bug.cgi?id=1231861 * https://bugzilla.suse.com/show_bug.cgi?id=1231864 * https://bugzilla.suse.com/show_bug.cgi?id=1231865 * https://bugzilla.suse.com/show_bug.cgi?id=1231868 * https://bugzilla.suse.com/show_bug.cgi?id=1231869 * https://bugzilla.suse.com/show_bug.cgi?id=1231871 * https://bugzilla.suse.com/show_bug.cgi?id=1231872 * https://bugzilla.suse.com/show_bug.cgi?id=1231901 * https://bugzilla.suse.com/show_bug.cgi?id=1231902 * https://bugzilla.suse.com/show_bug.cgi?id=1231903 * https://bugzilla.suse.com/show_bug.cgi?id=1231904 * https://bugzilla.suse.com/show_bug.cgi?id=1231906 * https://bugzilla.suse.com/show_bug.cgi?id=1231907 * https://bugzilla.suse.com/show_bug.cgi?id=1231908 * https://bugzilla.suse.com/show_bug.cgi?id=1231914 * https://bugzilla.suse.com/show_bug.cgi?id=1231916 * https://bugzilla.suse.com/show_bug.cgi?id=1231920 * https://bugzilla.suse.com/show_bug.cgi?id=1231924 * https://bugzilla.suse.com/show_bug.cgi?id=1231926 * https://bugzilla.suse.com/show_bug.cgi?id=1231930 * https://bugzilla.suse.com/show_bug.cgi?id=1231931 * https://bugzilla.suse.com/show_bug.cgi?id=1231935 * https://bugzilla.suse.com/show_bug.cgi?id=1231942 * https://bugzilla.suse.com/show_bug.cgi?id=1231944 * https://bugzilla.suse.com/show_bug.cgi?id=1231946 * https://bugzilla.suse.com/show_bug.cgi?id=1231947 * https://bugzilla.suse.com/show_bug.cgi?id=1231950 * https://bugzilla.suse.com/show_bug.cgi?id=1231951 * https://bugzilla.suse.com/show_bug.cgi?id=1231952 * https://bugzilla.suse.com/show_bug.cgi?id=1231953 * https://bugzilla.suse.com/show_bug.cgi?id=1231954 * https://bugzilla.suse.com/show_bug.cgi?id=1231955 * https://bugzilla.suse.com/show_bug.cgi?id=1231956 * https://bugzilla.suse.com/show_bug.cgi?id=1231957 * https://bugzilla.suse.com/show_bug.cgi?id=1231965 * https://bugzilla.suse.com/show_bug.cgi?id=1231967 * https://bugzilla.suse.com/show_bug.cgi?id=1231968 * https://bugzilla.suse.com/show_bug.cgi?id=1231987 * https://bugzilla.suse.com/show_bug.cgi?id=1231988 * https://bugzilla.suse.com/show_bug.cgi?id=1231989 * https://bugzilla.suse.com/show_bug.cgi?id=1231990 * https://bugzilla.suse.com/show_bug.cgi?id=1231998 * https://bugzilla.suse.com/show_bug.cgi?id=1232000 * https://bugzilla.suse.com/show_bug.cgi?id=1232003 * https://bugzilla.suse.com/show_bug.cgi?id=1232009 * https://bugzilla.suse.com/show_bug.cgi?id=1232013 * https://bugzilla.suse.com/show_bug.cgi?id=1232015 * https://bugzilla.suse.com/show_bug.cgi?id=1232016 * https://bugzilla.suse.com/show_bug.cgi?id=1232017 * https://bugzilla.suse.com/show_bug.cgi?id=1232018 * https://bugzilla.suse.com/show_bug.cgi?id=1232033 * https://bugzilla.suse.com/show_bug.cgi?id=1232034 * https://bugzilla.suse.com/show_bug.cgi?id=1232036 * https://bugzilla.suse.com/show_bug.cgi?id=1232043 * https://bugzilla.suse.com/show_bug.cgi?id=1232047 * https://bugzilla.suse.com/show_bug.cgi?id=1232048 * https://bugzilla.suse.com/show_bug.cgi?id=1232049 * https://bugzilla.suse.com/show_bug.cgi?id=1232050 * https://bugzilla.suse.com/show_bug.cgi?id=1232056 * https://bugzilla.suse.com/show_bug.cgi?id=1232075 * https://bugzilla.suse.com/show_bug.cgi?id=1232076 * https://bugzilla.suse.com/show_bug.cgi?id=1232079 * https://bugzilla.suse.com/show_bug.cgi?id=1232080 * https://bugzilla.suse.com/show_bug.cgi?id=1232083 * https://bugzilla.suse.com/show_bug.cgi?id=1232084 * https://bugzilla.suse.com/show_bug.cgi?id=1232085 * https://bugzilla.suse.com/show_bug.cgi?id=1232089 * https://bugzilla.suse.com/show_bug.cgi?id=1232090 * https://bugzilla.suse.com/show_bug.cgi?id=1232093 * https://bugzilla.suse.com/show_bug.cgi?id=1232094 * https://bugzilla.suse.com/show_bug.cgi?id=1232096 * https://bugzilla.suse.com/show_bug.cgi?id=1232097 * https://bugzilla.suse.com/show_bug.cgi?id=1232098 * https://bugzilla.suse.com/show_bug.cgi?id=1232103 * https://bugzilla.suse.com/show_bug.cgi?id=1232104 * https://bugzilla.suse.com/show_bug.cgi?id=1232105 * https://bugzilla.suse.com/show_bug.cgi?id=1232109 * https://bugzilla.suse.com/show_bug.cgi?id=1232111 * https://bugzilla.suse.com/show_bug.cgi?id=1232114 * https://bugzilla.suse.com/show_bug.cgi?id=1232116 * https://bugzilla.suse.com/show_bug.cgi?id=1232117 * https://bugzilla.suse.com/show_bug.cgi?id=1232124 * https://bugzilla.suse.com/show_bug.cgi?id=1232126 * https://bugzilla.suse.com/show_bug.cgi?id=1232127 * https://bugzilla.suse.com/show_bug.cgi?id=1232129 * https://bugzilla.suse.com/show_bug.cgi?id=1232130 * https://bugzilla.suse.com/show_bug.cgi?id=1232131 * https://bugzilla.suse.com/show_bug.cgi?id=1232132 * https://bugzilla.suse.com/show_bug.cgi?id=1232134 * https://bugzilla.suse.com/show_bug.cgi?id=1232135 * https://bugzilla.suse.com/show_bug.cgi?id=1232140 * https://bugzilla.suse.com/show_bug.cgi?id=1232141 * https://bugzilla.suse.com/show_bug.cgi?id=1232142 * https://bugzilla.suse.com/show_bug.cgi?id=1232145 * https://bugzilla.suse.com/show_bug.cgi?id=1232147 * https://bugzilla.suse.com/show_bug.cgi?id=1232148 * https://bugzilla.suse.com/show_bug.cgi?id=1232149 * https://bugzilla.suse.com/show_bug.cgi?id=1232151 * https://bugzilla.suse.com/show_bug.cgi?id=1232152 * https://bugzilla.suse.com/show_bug.cgi?id=1232154 * https://bugzilla.suse.com/show_bug.cgi?id=1232155 * https://bugzilla.suse.com/show_bug.cgi?id=1232156 * https://bugzilla.suse.com/show_bug.cgi?id=1232159 * https://bugzilla.suse.com/show_bug.cgi?id=1232160 * https://bugzilla.suse.com/show_bug.cgi?id=1232162 * https://bugzilla.suse.com/show_bug.cgi?id=1232164 * https://bugzilla.suse.com/show_bug.cgi?id=1232165 * https://bugzilla.suse.com/show_bug.cgi?id=1232174 * https://bugzilla.suse.com/show_bug.cgi?id=1232180 * https://bugzilla.suse.com/show_bug.cgi?id=1232182 * https://bugzilla.suse.com/show_bug.cgi?id=1232183 * https://bugzilla.suse.com/show_bug.cgi?id=1232185 * https://bugzilla.suse.com/show_bug.cgi?id=1232187 * https://bugzilla.suse.com/show_bug.cgi?id=1232189 * https://bugzilla.suse.com/show_bug.cgi?id=1232192 * https://bugzilla.suse.com/show_bug.cgi?id=1232195 * https://bugzilla.suse.com/show_bug.cgi?id=1232196 * https://bugzilla.suse.com/show_bug.cgi?id=1232198 * https://bugzilla.suse.com/show_bug.cgi?id=1232199 * https://bugzilla.suse.com/show_bug.cgi?id=1232200 * https://bugzilla.suse.com/show_bug.cgi?id=1232201 * https://bugzilla.suse.com/show_bug.cgi?id=1232207 * https://bugzilla.suse.com/show_bug.cgi?id=1232208 * https://bugzilla.suse.com/show_bug.cgi?id=1232217 * https://bugzilla.suse.com/show_bug.cgi?id=1232218 * https://bugzilla.suse.com/show_bug.cgi?id=1232220 * https://bugzilla.suse.com/show_bug.cgi?id=1232221 * https://bugzilla.suse.com/show_bug.cgi?id=1232222 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232232 * https://bugzilla.suse.com/show_bug.cgi?id=1232250 * https://bugzilla.suse.com/show_bug.cgi?id=1232251 * https://bugzilla.suse.com/show_bug.cgi?id=1232253 * https://bugzilla.suse.com/show_bug.cgi?id=1232254 * https://bugzilla.suse.com/show_bug.cgi?id=1232255 * https://bugzilla.suse.com/show_bug.cgi?id=1232256 * https://bugzilla.suse.com/show_bug.cgi?id=1232258 * https://bugzilla.suse.com/show_bug.cgi?id=1232259 * https://bugzilla.suse.com/show_bug.cgi?id=1232260 * https://bugzilla.suse.com/show_bug.cgi?id=1232262 * https://bugzilla.suse.com/show_bug.cgi?id=1232263 * https://bugzilla.suse.com/show_bug.cgi?id=1232264 * https://bugzilla.suse.com/show_bug.cgi?id=1232272 * https://bugzilla.suse.com/show_bug.cgi?id=1232275 * https://bugzilla.suse.com/show_bug.cgi?id=1232279 * https://bugzilla.suse.com/show_bug.cgi?id=1232282 * https://bugzilla.suse.com/show_bug.cgi?id=1232285 * https://bugzilla.suse.com/show_bug.cgi?id=1232287 * https://bugzilla.suse.com/show_bug.cgi?id=1232295 * https://bugzilla.suse.com/show_bug.cgi?id=1232305 * https://bugzilla.suse.com/show_bug.cgi?id=1232307 * https://bugzilla.suse.com/show_bug.cgi?id=1232309 * https://bugzilla.suse.com/show_bug.cgi?id=1232310 * https://bugzilla.suse.com/show_bug.cgi?id=1232312 * https://bugzilla.suse.com/show_bug.cgi?id=1232313 * https://bugzilla.suse.com/show_bug.cgi?id=1232314 * https://bugzilla.suse.com/show_bug.cgi?id=1232315 * https://bugzilla.suse.com/show_bug.cgi?id=1232316 * https://bugzilla.suse.com/show_bug.cgi?id=1232317 * https://bugzilla.suse.com/show_bug.cgi?id=1232318 * https://bugzilla.suse.com/show_bug.cgi?id=1232329 * https://bugzilla.suse.com/show_bug.cgi?id=1232332 * https://bugzilla.suse.com/show_bug.cgi?id=1232333 * https://bugzilla.suse.com/show_bug.cgi?id=1232334 * https://bugzilla.suse.com/show_bug.cgi?id=1232335 * https://bugzilla.suse.com/show_bug.cgi?id=1232337 * https://bugzilla.suse.com/show_bug.cgi?id=1232339 * https://bugzilla.suse.com/show_bug.cgi?id=1232340 * https://bugzilla.suse.com/show_bug.cgi?id=1232342 * https://bugzilla.suse.com/show_bug.cgi?id=1232345 * https://bugzilla.suse.com/show_bug.cgi?id=1232349 * https://bugzilla.suse.com/show_bug.cgi?id=1232352 * https://bugzilla.suse.com/show_bug.cgi?id=1232354 * https://bugzilla.suse.com/show_bug.cgi?id=1232355 * https://bugzilla.suse.com/show_bug.cgi?id=1232357 * https://bugzilla.suse.com/show_bug.cgi?id=1232358 * https://bugzilla.suse.com/show_bug.cgi?id=1232359 * https://bugzilla.suse.com/show_bug.cgi?id=1232361 * https://bugzilla.suse.com/show_bug.cgi?id=1232362 * https://bugzilla.suse.com/show_bug.cgi?id=1232366 * https://bugzilla.suse.com/show_bug.cgi?id=1232367 * https://bugzilla.suse.com/show_bug.cgi?id=1232368 * https://bugzilla.suse.com/show_bug.cgi?id=1232369 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232371 * https://bugzilla.suse.com/show_bug.cgi?id=1232374 * https://bugzilla.suse.com/show_bug.cgi?id=1232378 * https://bugzilla.suse.com/show_bug.cgi?id=1232381 * https://bugzilla.suse.com/show_bug.cgi?id=1232383 * https://bugzilla.suse.com/show_bug.cgi?id=1232385 * https://bugzilla.suse.com/show_bug.cgi?id=1232386 * https://bugzilla.suse.com/show_bug.cgi?id=1232387 * https://bugzilla.suse.com/show_bug.cgi?id=1232392 * https://bugzilla.suse.com/show_bug.cgi?id=1232394 * https://bugzilla.suse.com/show_bug.cgi?id=1232395 * https://bugzilla.suse.com/show_bug.cgi?id=1232396 * https://bugzilla.suse.com/show_bug.cgi?id=1232413 * https://bugzilla.suse.com/show_bug.cgi?id=1232416 * https://bugzilla.suse.com/show_bug.cgi?id=1232417 * https://bugzilla.suse.com/show_bug.cgi?id=1232418 * https://bugzilla.suse.com/show_bug.cgi?id=1232424 * https://bugzilla.suse.com/show_bug.cgi?id=1232427 * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1232435 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232442 * https://bugzilla.suse.com/show_bug.cgi?id=1232446 * https://bugzilla.suse.com/show_bug.cgi?id=1232483 * https://bugzilla.suse.com/show_bug.cgi?id=1232494 * https://bugzilla.suse.com/show_bug.cgi?id=1232498 * https://bugzilla.suse.com/show_bug.cgi?id=1232499 * https://bugzilla.suse.com/show_bug.cgi?id=1232500 * https://bugzilla.suse.com/show_bug.cgi?id=1232501 * https://bugzilla.suse.com/show_bug.cgi?id=1232502 * https://bugzilla.suse.com/show_bug.cgi?id=1232503 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1232505 * https://bugzilla.suse.com/show_bug.cgi?id=1232506 * https://bugzilla.suse.com/show_bug.cgi?id=1232507 * https://bugzilla.suse.com/show_bug.cgi?id=1232511 * https://bugzilla.suse.com/show_bug.cgi?id=1232519 * https://bugzilla.suse.com/show_bug.cgi?id=1232520 * https://bugzilla.suse.com/show_bug.cgi?id=1232529 * https://bugzilla.suse.com/show_bug.cgi?id=1232552 * https://bugzilla.suse.com/show_bug.cgi?id=1232623 * https://bugzilla.suse.com/show_bug.cgi?id=1232626 * https://bugzilla.suse.com/show_bug.cgi?id=1232627 * https://bugzilla.suse.com/show_bug.cgi?id=1232628 * https://bugzilla.suse.com/show_bug.cgi?id=1232629 * https://bugzilla.suse.com/show_bug.cgi?id=1232704 * https://bugzilla.suse.com/show_bug.cgi?id=1232757 * https://bugzilla.suse.com/show_bug.cgi?id=1232768 * https://bugzilla.suse.com/show_bug.cgi?id=1232819 * https://bugzilla.suse.com/show_bug.cgi?id=1232823 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232869 * https://bugzilla.suse.com/show_bug.cgi?id=1232870 * https://bugzilla.suse.com/show_bug.cgi?id=1232873 * https://bugzilla.suse.com/show_bug.cgi?id=1232876 * https://bugzilla.suse.com/show_bug.cgi?id=1232877 * https://bugzilla.suse.com/show_bug.cgi?id=1232878 * https://bugzilla.suse.com/show_bug.cgi?id=1232880 * https://bugzilla.suse.com/show_bug.cgi?id=1232881 * https://bugzilla.suse.com/show_bug.cgi?id=1232884 * https://bugzilla.suse.com/show_bug.cgi?id=1232885 * https://bugzilla.suse.com/show_bug.cgi?id=1232887 * https://bugzilla.suse.com/show_bug.cgi?id=1232888 * https://bugzilla.suse.com/show_bug.cgi?id=1232890 * https://bugzilla.suse.com/show_bug.cgi?id=1232892 * https://bugzilla.suse.com/show_bug.cgi?id=1232894 * https://bugzilla.suse.com/show_bug.cgi?id=1232896 * https://bugzilla.suse.com/show_bug.cgi?id=1232897 * https://bugzilla.suse.com/show_bug.cgi?id=1232905 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232914 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232925 * https://bugzilla.suse.com/show_bug.cgi?id=1232926 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1232935 * https://bugzilla.suse.com/show_bug.cgi?id=1233029 * https://bugzilla.suse.com/show_bug.cgi?id=1233032 * https://bugzilla.suse.com/show_bug.cgi?id=1233035 * https://bugzilla.suse.com/show_bug.cgi?id=1233036 * https://bugzilla.suse.com/show_bug.cgi?id=1233041 * https://bugzilla.suse.com/show_bug.cgi?id=1233044 * https://bugzilla.suse.com/show_bug.cgi?id=1233049 * https://bugzilla.suse.com/show_bug.cgi?id=1233050 * https://bugzilla.suse.com/show_bug.cgi?id=1233051 * https://bugzilla.suse.com/show_bug.cgi?id=1233056 * https://bugzilla.suse.com/show_bug.cgi?id=1233057 * https://bugzilla.suse.com/show_bug.cgi?id=1233061 * https://bugzilla.suse.com/show_bug.cgi?id=1233062 * https://bugzilla.suse.com/show_bug.cgi?id=1233063 * https://bugzilla.suse.com/show_bug.cgi?id=1233065 * https://bugzilla.suse.com/show_bug.cgi?id=1233067 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233073 * https://bugzilla.suse.com/show_bug.cgi?id=1233074 * https://bugzilla.suse.com/show_bug.cgi?id=1233088 * https://bugzilla.suse.com/show_bug.cgi?id=1233091 * https://bugzilla.suse.com/show_bug.cgi?id=1233092 * https://bugzilla.suse.com/show_bug.cgi?id=1233097 * https://bugzilla.suse.com/show_bug.cgi?id=1233100 * https://bugzilla.suse.com/show_bug.cgi?id=1233103 * https://bugzilla.suse.com/show_bug.cgi?id=1233104 * https://bugzilla.suse.com/show_bug.cgi?id=1233105 * https://bugzilla.suse.com/show_bug.cgi?id=1233106 * https://bugzilla.suse.com/show_bug.cgi?id=1233107 * https://bugzilla.suse.com/show_bug.cgi?id=1233108 * https://bugzilla.suse.com/show_bug.cgi?id=1233110 * https://bugzilla.suse.com/show_bug.cgi?id=1233111 * https://bugzilla.suse.com/show_bug.cgi?id=1233113 * https://bugzilla.suse.com/show_bug.cgi?id=1233114 * https://bugzilla.suse.com/show_bug.cgi?id=1233115 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233119 * https://bugzilla.suse.com/show_bug.cgi?id=1233123 * https://bugzilla.suse.com/show_bug.cgi?id=1233125 * https://bugzilla.suse.com/show_bug.cgi?id=1233127 * https://bugzilla.suse.com/show_bug.cgi?id=1233129 * https://bugzilla.suse.com/show_bug.cgi?id=1233130 * https://bugzilla.suse.com/show_bug.cgi?id=1233132 * https://bugzilla.suse.com/show_bug.cgi?id=1233135 * https://bugzilla.suse.com/show_bug.cgi?id=1233176 * https://bugzilla.suse.com/show_bug.cgi?id=1233179 * https://bugzilla.suse.com/show_bug.cgi?id=1233185 * https://bugzilla.suse.com/show_bug.cgi?id=1233188 * https://bugzilla.suse.com/show_bug.cgi?id=1233189 * https://bugzilla.suse.com/show_bug.cgi?id=1233191 * https://bugzilla.suse.com/show_bug.cgi?id=1233193 * https://bugzilla.suse.com/show_bug.cgi?id=1233197 * https://bugzilla.suse.com/show_bug.cgi?id=1233203 * https://bugzilla.suse.com/show_bug.cgi?id=1233205 * https://bugzilla.suse.com/show_bug.cgi?id=1233206 * https://bugzilla.suse.com/show_bug.cgi?id=1233207 * https://bugzilla.suse.com/show_bug.cgi?id=1233208 * https://bugzilla.suse.com/show_bug.cgi?id=1233209 * https://bugzilla.suse.com/show_bug.cgi?id=1233210 * https://bugzilla.suse.com/show_bug.cgi?id=1233211 * https://bugzilla.suse.com/show_bug.cgi?id=1233212 * https://bugzilla.suse.com/show_bug.cgi?id=1233216 * https://bugzilla.suse.com/show_bug.cgi?id=1233217 * https://bugzilla.suse.com/show_bug.cgi?id=1233219 * https://bugzilla.suse.com/show_bug.cgi?id=1233226 * https://bugzilla.suse.com/show_bug.cgi?id=1233238 * https://bugzilla.suse.com/show_bug.cgi?id=1233241 * https://bugzilla.suse.com/show_bug.cgi?id=1233244 * https://bugzilla.suse.com/show_bug.cgi?id=1233253 * https://bugzilla.suse.com/show_bug.cgi?id=1233255 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233298 * https://bugzilla.suse.com/show_bug.cgi?id=1233305 * https://bugzilla.suse.com/show_bug.cgi?id=1233320 * https://bugzilla.suse.com/show_bug.cgi?id=1233350 * https://bugzilla.suse.com/show_bug.cgi?id=1233443 * https://bugzilla.suse.com/show_bug.cgi?id=1233452 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233454 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233457 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233460 * https://bugzilla.suse.com/show_bug.cgi?id=1233462 * https://bugzilla.suse.com/show_bug.cgi?id=1233463 * https://bugzilla.suse.com/show_bug.cgi?id=1233464 * https://bugzilla.suse.com/show_bug.cgi?id=1233465 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233471 * https://bugzilla.suse.com/show_bug.cgi?id=1233476 * https://bugzilla.suse.com/show_bug.cgi?id=1233478 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233481 * https://bugzilla.suse.com/show_bug.cgi?id=1233484 * https://bugzilla.suse.com/show_bug.cgi?id=1233487 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233524 * https://bugzilla.suse.com/show_bug.cgi?id=1233540 * https://bugzilla.suse.com/show_bug.cgi?id=1233548 * https://bugzilla.suse.com/show_bug.cgi?id=1233552 * https://bugzilla.suse.com/show_bug.cgi?id=1233553 * https://bugzilla.suse.com/show_bug.cgi?id=1233554 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233560 * https://bugzilla.suse.com/show_bug.cgi?id=1233561 * https://bugzilla.suse.com/show_bug.cgi?id=1233564 * https://bugzilla.suse.com/show_bug.cgi?id=1233566 * https://bugzilla.suse.com/show_bug.cgi?id=1233567 * https://bugzilla.suse.com/show_bug.cgi?id=1233570 * https://bugzilla.suse.com/show_bug.cgi?id=1233572 * https://bugzilla.suse.com/show_bug.cgi?id=1233573 * https://bugzilla.suse.com/show_bug.cgi?id=1233577 * https://bugzilla.suse.com/show_bug.cgi?id=1233580 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1233641 * https://bugzilla.suse.com/show_bug.cgi?id=1233721 * https://bugzilla.suse.com/show_bug.cgi?id=1233754 * https://bugzilla.suse.com/show_bug.cgi?id=1233756 * https://bugzilla.suse.com/show_bug.cgi?id=1233769 * https://bugzilla.suse.com/show_bug.cgi?id=1233771 * https://bugzilla.suse.com/show_bug.cgi?id=1233977 * https://bugzilla.suse.com/show_bug.cgi?id=1234009 * https://bugzilla.suse.com/show_bug.cgi?id=1234011 * https://bugzilla.suse.com/show_bug.cgi?id=1234012 * https://bugzilla.suse.com/show_bug.cgi?id=1234025 * https://bugzilla.suse.com/show_bug.cgi?id=1234034 * https://bugzilla.suse.com/show_bug.cgi?id=1234039 * https://bugzilla.suse.com/show_bug.cgi?id=1234040 * https://bugzilla.suse.com/show_bug.cgi?id=1234041 * https://bugzilla.suse.com/show_bug.cgi?id=1234042 * https://bugzilla.suse.com/show_bug.cgi?id=1234043 * https://bugzilla.suse.com/show_bug.cgi?id=1234044 * https://bugzilla.suse.com/show_bug.cgi?id=1234045 * https://bugzilla.suse.com/show_bug.cgi?id=1234046 * https://bugzilla.suse.com/show_bug.cgi?id=1234072 * https://bugzilla.suse.com/show_bug.cgi?id=1234081 * https://bugzilla.suse.com/show_bug.cgi?id=1234083 * https://bugzilla.suse.com/show_bug.cgi?id=1234087 * https://bugzilla.suse.com/show_bug.cgi?id=1234093 * https://bugzilla.suse.com/show_bug.cgi?id=1234098 * https://bugzilla.suse.com/show_bug.cgi?id=1234108 * https://bugzilla.suse.com/show_bug.cgi?id=1234121 * https://jira.suse.com/browse/PED-10559 * https://jira.suse.com/browse/PED-10978 * https://jira.suse.com/browse/PED-11316 * https://jira.suse.com/browse/PED-11442 * https://jira.suse.com/browse/PED-11580 * https://jira.suse.com/browse/PED-5865 * https://jira.suse.com/browse/PED-6143 * https://jira.suse.com/browse/PED-9899 * https://jira.suse.com/browse/PED-9901 * https://jira.suse.com/browse/PED-9943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 19 16:37:00 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 19 Dec 2024 16:37:00 -0000 Subject: SUSE-SU-2024:4386-1: moderate: Security update for avahi Message-ID: <173462622089.20541.2871261963304575654@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2024:4386-1 Release Date: 2024-12-19T14:04:42Z Rating: moderate References: * bsc#1226586 * bsc#1233420 Cross-References: * CVE-2024-52616 CVSS scores: * CVE-2024-52616 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52616: Fixed Avahi Wide-Area DNS Predictable Transaction IDs (bsc#1233420) Other fixes: \- no longer supply bogus services to callbacks (bsc#1226586). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4386=1 * openSUSE Leap Micro 5.5 zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4386=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4386=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4386=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-4386=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4386=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-4386=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-4386=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4386=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4386=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4386=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-utils-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * libhowl0-0.8-150400.7.20.1 * avahi-utils-gtk-debuginfo-0.8-150400.7.20.1 * avahi-autoipd-debuginfo-0.8-150400.7.20.1 * libavahi-gobject-devel-0.8-150400.7.20.1 * avahi-qt5-debugsource-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libdns_sd-debuginfo-0.8-150400.7.20.1 * libavahi-glib-devel-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-debuginfo-0.8-150400.7.20.1 * libdns_sd-0.8-150400.7.20.1 * libavahi-ui-gtk3-0-0.8-150400.7.20.1 * libhowl0-debuginfo-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-0.8-150400.7.20.1 * libavahi-qt5-devel-0.8-150400.7.20.1 * libavahi-gobject0-debuginfo-0.8-150400.7.20.1 * libavahi-libevent1-0.8-150400.7.20.1 * libavahi-devel-0.8-150400.7.20.1 * avahi-utils-debuginfo-0.8-150400.7.20.1 * libavahi-gobject0-0.8-150400.7.20.1 * avahi-autoipd-0.8-150400.7.20.1 * avahi-compat-howl-devel-0.8-150400.7.20.1 * avahi-compat-mDNSResponder-devel-0.8-150400.7.20.1 * avahi-utils-gtk-0.8-150400.7.20.1 * avahi-glib2-debugsource-0.8-150400.7.20.1 * python3-avahi-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * python3-avahi-gtk-0.8-150400.7.20.1 * libavahi-qt5-1-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-libevent1-debuginfo-0.8-150400.7.20.1 * libavahi-qt5-1-debuginfo-0.8-150400.7.20.1 * typelib-1_0-Avahi-0_6-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * openSUSE Leap 15.4 (x86_64) * libavahi-glib1-32bit-0.8-150400.7.20.1 * libdns_sd-32bit-0.8-150400.7.20.1 * libavahi-glib1-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-common3-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-client3-32bit-debuginfo-0.8-150400.7.20.1 * avahi-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-common3-32bit-0.8-150400.7.20.1 * libavahi-client3-32bit-0.8-150400.7.20.1 * libdns_sd-32bit-debuginfo-0.8-150400.7.20.1 * openSUSE Leap 15.4 (noarch) * avahi-lang-0.8-150400.7.20.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libavahi-common3-64bit-debuginfo-0.8-150400.7.20.1 * libavahi-client3-64bit-0.8-150400.7.20.1 * libavahi-client3-64bit-debuginfo-0.8-150400.7.20.1 * libdns_sd-64bit-0.8-150400.7.20.1 * libavahi-common3-64bit-0.8-150400.7.20.1 * libavahi-glib1-64bit-debuginfo-0.8-150400.7.20.1 * libdns_sd-64bit-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-64bit-0.8-150400.7.20.1 * avahi-64bit-debuginfo-0.8-150400.7.20.1 * openSUSE Leap Micro 5.5 (aarch64 s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-utils-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-utils-gtk-debuginfo-0.8-150400.7.20.1 * libhowl0-0.8-150400.7.20.1 * avahi-autoipd-debuginfo-0.8-150400.7.20.1 * avahi-qt5-debugsource-0.8-150400.7.20.1 * libavahi-gobject-devel-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-glib-devel-0.8-150400.7.20.1 * libdns_sd-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-debuginfo-0.8-150400.7.20.1 * libdns_sd-0.8-150400.7.20.1 * libavahi-ui-gtk3-0-0.8-150400.7.20.1 * libhowl0-debuginfo-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-0.8-150400.7.20.1 * libavahi-qt5-devel-0.8-150400.7.20.1 * libavahi-gobject0-debuginfo-0.8-150400.7.20.1 * libavahi-libevent1-0.8-150400.7.20.1 * libavahi-devel-0.8-150400.7.20.1 * avahi-utils-debuginfo-0.8-150400.7.20.1 * libavahi-gobject0-0.8-150400.7.20.1 * avahi-autoipd-0.8-150400.7.20.1 * avahi-compat-howl-devel-0.8-150400.7.20.1 * avahi-compat-mDNSResponder-devel-0.8-150400.7.20.1 * avahi-utils-gtk-0.8-150400.7.20.1 * avahi-glib2-debugsource-0.8-150400.7.20.1 * python3-avahi-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * python3-avahi-gtk-0.8-150400.7.20.1 * libavahi-qt5-1-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-libevent1-debuginfo-0.8-150400.7.20.1 * libavahi-qt5-1-debuginfo-0.8-150400.7.20.1 * typelib-1_0-Avahi-0_6-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * openSUSE Leap 15.5 (x86_64) * libavahi-glib1-32bit-0.8-150400.7.20.1 * libdns_sd-32bit-0.8-150400.7.20.1 * libavahi-glib1-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-common3-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-client3-32bit-debuginfo-0.8-150400.7.20.1 * avahi-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-common3-32bit-0.8-150400.7.20.1 * libavahi-client3-32bit-0.8-150400.7.20.1 * libdns_sd-32bit-debuginfo-0.8-150400.7.20.1 * openSUSE Leap 15.5 (noarch) * avahi-lang-0.8-150400.7.20.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libavahi-client3-debuginfo-0.8-150400.7.20.1 * avahi-utils-0.8-150400.7.20.1 * avahi-0.8-150400.7.20.1 * libhowl0-0.8-150400.7.20.1 * libavahi-client3-0.8-150400.7.20.1 * libavahi-glib-devel-0.8-150400.7.20.1 * libdns_sd-debuginfo-0.8-150400.7.20.1 * libavahi-core7-0.8-150400.7.20.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-debuginfo-0.8-150400.7.20.1 * libdns_sd-0.8-150400.7.20.1 * libavahi-ui-gtk3-0-0.8-150400.7.20.1 * libhowl0-debuginfo-0.8-150400.7.20.1 * libavahi-common3-0.8-150400.7.20.1 * libavahi-core7-debuginfo-0.8-150400.7.20.1 * libavahi-glib1-0.8-150400.7.20.1 * libavahi-gobject0-debuginfo-0.8-150400.7.20.1 * libavahi-libevent1-0.8-150400.7.20.1 * libavahi-devel-0.8-150400.7.20.1 * avahi-utils-debuginfo-0.8-150400.7.20.1 * libavahi-gobject0-0.8-150400.7.20.1 * avahi-compat-howl-devel-0.8-150400.7.20.1 * avahi-compat-mDNSResponder-devel-0.8-150400.7.20.1 * avahi-glib2-debugsource-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * libavahi-libevent1-debuginfo-0.8-150400.7.20.1 * typelib-1_0-Avahi-0_6-0.8-150400.7.20.1 * libavahi-common3-debuginfo-0.8-150400.7.20.1 * Basesystem Module 15-SP5 (noarch) * avahi-lang-0.8-150400.7.20.1 * Basesystem Module 15-SP5 (x86_64) * libavahi-common3-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-client3-32bit-debuginfo-0.8-150400.7.20.1 * avahi-32bit-debuginfo-0.8-150400.7.20.1 * libavahi-common3-32bit-0.8-150400.7.20.1 * libavahi-client3-32bit-0.8-150400.7.20.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * avahi-debuginfo-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 * avahi-utils-gtk-debuginfo-0.8-150400.7.20.1 * avahi-autoipd-debuginfo-0.8-150400.7.20.1 * avahi-autoipd-0.8-150400.7.20.1 * libavahi-gobject-devel-0.8-150400.7.20.1 * avahi-utils-gtk-0.8-150400.7.20.1 * avahi-glib2-debugsource-0.8-150400.7.20.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-avahi-0.8-150400.7.20.1 * avahi-debuginfo-0.8-150400.7.20.1 * avahi-debugsource-0.8-150400.7.20.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52616.html * https://bugzilla.suse.com/show_bug.cgi?id=1226586 * https://bugzilla.suse.com/show_bug.cgi?id=1233420 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 19 20:30:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 19 Dec 2024 20:30:22 -0000 Subject: SUSE-SU-2024:4388-1: important: Security update for the Linux Kernel Message-ID: <173464022212.13380.10788606937926912837@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4388-1 Release Date: 2024-12-19T18:32:09Z Rating: important References: * bsc#1218644 * bsc#1220927 * bsc#1232224 * bsc#1232436 * bsc#1232860 * bsc#1232907 * bsc#1232919 * bsc#1232928 * bsc#1233070 * bsc#1233117 * bsc#1233293 * bsc#1233453 * bsc#1233456 * bsc#1233468 * bsc#1233479 * bsc#1233490 * bsc#1233491 * bsc#1233555 * bsc#1233557 Cross-References: * CVE-2023-52524 * CVE-2024-49925 * CVE-2024-50089 * CVE-2024-50115 * CVE-2024-50125 * CVE-2024-50127 * CVE-2024-50154 * CVE-2024-50205 * CVE-2024-50208 * CVE-2024-50264 * CVE-2024-50267 * CVE-2024-50279 * CVE-2024-50290 * CVE-2024-50301 * CVE-2024-50302 * CVE-2024-53061 * CVE-2024-53063 * CVE-2024-53142 CVSS scores: * CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49925 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50089 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50125 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50208 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves 18 vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927). * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224) * CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860). * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919). * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928). * CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293). * CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117). * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453). * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456). * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490). * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491). * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). The following non-security bugs were fixed: * Update config files (bsc#1218644). * initramfs: avoid filename buffer overrun (bsc#1232436). * kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644). * rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4388=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-4388=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4388=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4388=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4388=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) * kernel-default-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_212-default-1-150200.5.3.1 * kernel-livepatch-5_3_18-150200_24_212-default-debuginfo-1-150200.5.3.1 * kernel-default-livepatch-devel-5.3.18-150200.24.212.1 * kernel-default-livepatch-5.3.18-150200.24.212.1 * kernel-livepatch-SLE15-SP2_Update_55-debugsource-1-150200.5.3.1 * kernel-default-debuginfo-5.3.18-150200.24.212.1 * kernel-default-debugsource-5.3.18-150200.24.212.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.3.18-150200.24.212.1 * cluster-md-kmp-default-5.3.18-150200.24.212.1 * cluster-md-kmp-default-debuginfo-5.3.18-150200.24.212.1 * ocfs2-kmp-default-debuginfo-5.3.18-150200.24.212.1 * ocfs2-kmp-default-5.3.18-150200.24.212.1 * gfs2-kmp-default-5.3.18-150200.24.212.1 * kernel-default-debuginfo-5.3.18-150200.24.212.1 * dlm-kmp-default-5.3.18-150200.24.212.1 * dlm-kmp-default-debuginfo-5.3.18-150200.24.212.1 * gfs2-kmp-default-debuginfo-5.3.18-150200.24.212.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) * kernel-default-5.3.18-150200.24.212.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.212.1 * kernel-default-5.3.18-150200.24.212.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.212.1 * kernel-obs-build-debugsource-5.3.18-150200.24.212.1 * kernel-preempt-devel-5.3.18-150200.24.212.1 * kernel-default-base-5.3.18-150200.24.212.1.150200.9.111.1 * kernel-default-debuginfo-5.3.18-150200.24.212.1 * kernel-default-debugsource-5.3.18-150200.24.212.1 * kernel-preempt-debuginfo-5.3.18-150200.24.212.1 * kernel-syms-5.3.18-150200.24.212.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.212.1 * kernel-obs-build-5.3.18-150200.24.212.1 * kernel-default-devel-5.3.18-150200.24.212.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.212.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch) * kernel-devel-5.3.18-150200.24.212.1 * kernel-macros-5.3.18-150200.24.212.1 * kernel-source-5.3.18-150200.24.212.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch nosrc) * kernel-docs-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.3.18-150200.24.212.1 * kernel-obs-build-debugsource-5.3.18-150200.24.212.1 * kernel-default-base-5.3.18-150200.24.212.1.150200.9.111.1 * kernel-default-debuginfo-5.3.18-150200.24.212.1 * kernel-default-debugsource-5.3.18-150200.24.212.1 * kernel-syms-5.3.18-150200.24.212.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.212.1 * kernel-obs-build-5.3.18-150200.24.212.1 * kernel-default-devel-5.3.18-150200.24.212.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch) * kernel-devel-5.3.18-150200.24.212.1 * kernel-macros-5.3.18-150200.24.212.1 * kernel-source-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (noarch nosrc) * kernel-docs-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.212.1 * kernel-preempt-devel-5.3.18-150200.24.212.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.212.1 * kernel-preempt-debuginfo-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * reiserfs-kmp-default-5.3.18-150200.24.212.1 * kernel-obs-build-debugsource-5.3.18-150200.24.212.1 * kernel-default-base-5.3.18-150200.24.212.1.150200.9.111.1 * kernel-default-debuginfo-5.3.18-150200.24.212.1 * kernel-default-debugsource-5.3.18-150200.24.212.1 * kernel-syms-5.3.18-150200.24.212.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.212.1 * kernel-obs-build-5.3.18-150200.24.212.1 * kernel-default-devel-5.3.18-150200.24.212.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * kernel-devel-5.3.18-150200.24.212.1 * kernel-macros-5.3.18-150200.24.212.1 * kernel-source-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) * kernel-preempt-5.3.18-150200.24.212.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * kernel-preempt-debugsource-5.3.18-150200.24.212.1 * kernel-preempt-devel-5.3.18-150200.24.212.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.212.1 * kernel-preempt-debuginfo-5.3.18-150200.24.212.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52524.html * https://www.suse.com/security/cve/CVE-2024-49925.html * https://www.suse.com/security/cve/CVE-2024-50089.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-50125.html * https://www.suse.com/security/cve/CVE-2024-50127.html * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-50208.html * https://www.suse.com/security/cve/CVE-2024-50264.html * https://www.suse.com/security/cve/CVE-2024-50267.html * https://www.suse.com/security/cve/CVE-2024-50279.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-50301.html * https://www.suse.com/security/cve/CVE-2024-50302.html * https://www.suse.com/security/cve/CVE-2024-53061.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53142.html * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220927 * https://bugzilla.suse.com/show_bug.cgi?id=1232224 * https://bugzilla.suse.com/show_bug.cgi?id=1232436 * https://bugzilla.suse.com/show_bug.cgi?id=1232860 * https://bugzilla.suse.com/show_bug.cgi?id=1232907 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1232928 * https://bugzilla.suse.com/show_bug.cgi?id=1233070 * https://bugzilla.suse.com/show_bug.cgi?id=1233117 * https://bugzilla.suse.com/show_bug.cgi?id=1233293 * https://bugzilla.suse.com/show_bug.cgi?id=1233453 * https://bugzilla.suse.com/show_bug.cgi?id=1233456 * https://bugzilla.suse.com/show_bug.cgi?id=1233468 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233490 * https://bugzilla.suse.com/show_bug.cgi?id=1233491 * https://bugzilla.suse.com/show_bug.cgi?id=1233555 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 12:30:13 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 12:30:13 -0000 Subject: SUSE-SU-2024:4393-1: moderate: Security update for python-grpcio Message-ID: <173469781352.29587.16152995117704634413@smelt2.prg2.suse.org> # Security update for python-grpcio Announcement ID: SUSE-SU-2024:4393-1 Release Date: 2024-12-20T10:24:11Z Rating: moderate References: * bsc#1228919 * bsc#1233821 Cross-References: * CVE-2024-11407 * CVE-2024-7246 CVSS scores: * CVE-2024-11407 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-11407 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2024-11407 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-7246 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-7246 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-grpcio fixes the following issues: * CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821) * CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4393=1 openSUSE-SLE-15.6-2024-4393=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4393=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-grpcio-1.60.1-150600.16.8.1 * python311-grpcio-debuginfo-1.60.1-150600.16.8.1 * python-grpcio-debugsource-1.60.1-150600.16.8.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-grpcio-1.60.1-150600.16.8.1 * python311-grpcio-debuginfo-1.60.1-150600.16.8.1 * python-grpcio-debugsource-1.60.1-150600.16.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11407.html * https://www.suse.com/security/cve/CVE-2024-7246.html * https://bugzilla.suse.com/show_bug.cgi?id=1228919 * https://bugzilla.suse.com/show_bug.cgi?id=1233821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 12:30:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 12:30:16 -0000 Subject: SUSE-SU-2024:4392-1: important: Security update for emacs Message-ID: <173469781652.29587.13850080384398084272@smelt2.prg2.suse.org> # Security update for emacs Announcement ID: SUSE-SU-2024:4392-1 Release Date: 2024-12-20T10:20:29Z Rating: important References: * bsc#1233894 Cross-References: * CVE-2024-53920 CVSS scores: * CVE-2024-53920 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53920 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-53920 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP5 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for emacs fixes the following issues: * CVE-2024-53920: Fixed arbitrary code execution via Lisp macro expansion (bsc#1233894) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4392=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4392=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4392=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4392=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4392=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4392=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4392=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4392=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4392=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4392=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4392=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4392=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4392=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4392=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4392=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * openSUSE Leap 15.4 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * openSUSE Leap 15.5 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * openSUSE Leap 15.6 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * Basesystem Module 15-SP5 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * Basesystem Module 15-SP6 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-x11-debuginfo-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-x11-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Manager Proxy 4.3 (x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Manager Proxy 4.3 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * etags-debuginfo-27.2-150400.3.20.2 * emacs-debugsource-27.2-150400.3.20.2 * emacs-nox-debuginfo-27.2-150400.3.20.2 * emacs-27.2-150400.3.20.2 * emacs-nox-27.2-150400.3.20.2 * etags-27.2-150400.3.20.2 * emacs-debuginfo-27.2-150400.3.20.2 * SUSE Manager Server 4.3 (noarch) * emacs-el-27.2-150400.3.20.2 * emacs-info-27.2-150400.3.20.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53920.html * https://bugzilla.suse.com/show_bug.cgi?id=1233894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 12:30:23 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 12:30:23 -0000 Subject: SUSE-SU-2024:4390-1: moderate: Security update for haproxy Message-ID: <173469782396.29587.12500022874695073256@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2024:4390-1 Release Date: 2024-12-20T09:06:35Z Rating: moderate References: * bsc#1233973 Cross-References: * CVE-2024-53008 CVSS scores: * CVE-2024-53008 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-53008 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-53008 ( NVD ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2024-53008: Fixed HTTP/3 request smuggling via malformed HTTP headers forwarded to a HTTP/1.1 non-compliant back-end server (bsc#1233973) Other fixes: * Update to version 2.8.11 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4390=1 openSUSE-SLE-15.6-2024-4390=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4390=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.3.1 * haproxy-2.8.11+git0.01c1056a4-150600.3.3.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.3.1 * haproxy-2.8.11+git0.01c1056a4-150600.3.3.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53008.html * https://bugzilla.suse.com/show_bug.cgi?id=1233973 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 12:30:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 12:30:26 -0000 Subject: SUSE-SU-2024:4389-1: important: Security update for sudo Message-ID: <173469782642.29587.7102226445047276495@smelt2.prg2.suse.org> # Security update for sudo Announcement ID: SUSE-SU-2024:4389-1 Release Date: 2024-12-20T09:06:21Z Rating: important References: * bsc#1234371 Cross-References: * CVE-2021-3156 CVSS scores: * CVE-2021-3156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for sudo fixes the following issues: * CVE-2021-3156: Fixed regression in CVE (bsc#1234371) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4389=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4389=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * sudo-1.8.27-4.51.1 * sudo-debugsource-1.8.27-4.51.1 * sudo-devel-1.8.27-4.51.1 * sudo-debuginfo-1.8.27-4.51.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * sudo-1.8.27-4.51.1 * sudo-debugsource-1.8.27-4.51.1 * sudo-devel-1.8.27-4.51.1 * sudo-debuginfo-1.8.27-4.51.1 ## References: * https://www.suse.com/security/cve/CVE-2021-3156.html * https://bugzilla.suse.com/show_bug.cgi?id=1234371 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 16:30:19 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 16:30:19 -0000 Subject: SUSE-SU-2024:4401-1: moderate: Security update for grpc Message-ID: <173471221922.32684.3291164760767953916@smelt2.prg2.suse.org> # Security update for grpc Announcement ID: SUSE-SU-2024:4401-1 Release Date: 2024-12-20T15:28:10Z Rating: moderate References: * bsc#1228919 * bsc#1233821 Cross-References: * CVE-2024-11407 * CVE-2024-7246 CVSS scores: * CVE-2024-11407 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-11407 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2024-11407 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-7246 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-7246 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for grpc fixes the following issues: * CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919) * CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4401=1 openSUSE-SLE-15.6-2024-4401=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4401=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgrpc37-debuginfo-1.60.0-150600.15.3.1 * grpc-debugsource-1.60.0-150600.15.3.1 * libgrpc++1_60-debuginfo-1.60.0-150600.15.3.1 * libgrpc1_60-debuginfo-1.60.0-150600.15.3.1 * grpc-devel-1.60.0-150600.15.3.1 * libgrpc37-1.60.0-150600.15.3.1 * libupb37-debuginfo-1.60.0-150600.15.3.1 * grpc-debuginfo-1.60.0-150600.15.3.1 * grpc-devel-debuginfo-1.60.0-150600.15.3.1 * libgrpc1_60-1.60.0-150600.15.3.1 * libupb37-1.60.0-150600.15.3.1 * upb-devel-1.60.0-150600.15.3.1 * libgrpc++1_60-1.60.0-150600.15.3.1 * openSUSE Leap 15.6 (noarch) * grpc-source-1.60.0-150600.15.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgrpc37-debuginfo-1.60.0-150600.15.3.1 * grpc-debugsource-1.60.0-150600.15.3.1 * libgrpc++1_60-debuginfo-1.60.0-150600.15.3.1 * libgrpc1_60-debuginfo-1.60.0-150600.15.3.1 * grpc-devel-1.60.0-150600.15.3.1 * libgrpc37-1.60.0-150600.15.3.1 * libupb37-debuginfo-1.60.0-150600.15.3.1 * grpc-debuginfo-1.60.0-150600.15.3.1 * grpc-devel-debuginfo-1.60.0-150600.15.3.1 * libgrpc1_60-1.60.0-150600.15.3.1 * libupb37-1.60.0-150600.15.3.1 * libgrpc++1_60-1.60.0-150600.15.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11407.html * https://www.suse.com/security/cve/CVE-2024-7246.html * https://bugzilla.suse.com/show_bug.cgi?id=1228919 * https://bugzilla.suse.com/show_bug.cgi?id=1233821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 16:30:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 16:30:22 -0000 Subject: SUSE-SU-2024:4400-1: moderate: Security update for grpc Message-ID: <173471222232.32684.18333510166520302301@smelt2.prg2.suse.org> # Security update for grpc Announcement ID: SUSE-SU-2024:4400-1 Release Date: 2024-12-20T15:27:39Z Rating: moderate References: * bsc#1228919 * bsc#1233821 Cross-References: * CVE-2024-11407 * CVE-2024-7246 CVSS scores: * CVE-2024-11407 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-11407 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2024-11407 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-7246 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-7246 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for grpc fixes the following issues: * CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919) * CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4400=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4400=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * grpc-devel-debuginfo-1.60.0-150400.8.8.1 * upb-devel-1.60.0-150400.8.8.1 * grpc-devel-1.60.0-150400.8.8.1 * libgrpc1_60-debuginfo-1.60.0-150400.8.8.1 * libgrpc37-1.60.0-150400.8.8.1 * libupb37-1.60.0-150400.8.8.1 * libgrpc++1_60-1.60.0-150400.8.8.1 * grpc-debugsource-1.60.0-150400.8.8.1 * grpc-debuginfo-1.60.0-150400.8.8.1 * libupb37-debuginfo-1.60.0-150400.8.8.1 * libgrpc1_60-1.60.0-150400.8.8.1 * libgrpc37-debuginfo-1.60.0-150400.8.8.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.8.1 * openSUSE Leap 15.4 (noarch) * grpc-source-1.60.0-150400.8.8.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * grpc-debugsource-1.60.0-150400.8.8.1 * grpc-debuginfo-1.60.0-150400.8.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11407.html * https://www.suse.com/security/cve/CVE-2024-7246.html * https://bugzilla.suse.com/show_bug.cgi?id=1228919 * https://bugzilla.suse.com/show_bug.cgi?id=1233821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 16:30:30 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 16:30:30 -0000 Subject: SUSE-SU-2024:4397-1: important: Security update for the Linux Kernel Message-ID: <173471223057.32684.9655575017129010379@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:4397-1 Release Date: 2024-12-20T12:45:49Z Rating: important References: * bsc#1232432 * bsc#1233479 * bsc#1233557 Cross-References: * CVE-2024-49995 * CVE-2024-50290 * CVE-2024-53063 CVSS scores: * CVE-2024-49995 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE An update that solves three vulnerabilities can now be installed. ## Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432). * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479). * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-4397=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-4397=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (nosrc x86_64) * kernel-ec2-3.0.101-108.171.1 * kernel-default-3.0.101-108.171.1 * kernel-xen-3.0.101-108.171.1 * kernel-trace-3.0.101-108.171.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (x86_64) * kernel-xen-devel-3.0.101-108.171.1 * kernel-ec2-devel-3.0.101-108.171.1 * kernel-trace-base-3.0.101-108.171.1 * kernel-syms-3.0.101-108.171.1 * kernel-xen-base-3.0.101-108.171.1 * kernel-ec2-base-3.0.101-108.171.1 * kernel-default-base-3.0.101-108.171.1 * kernel-trace-devel-3.0.101-108.171.1 * kernel-default-devel-3.0.101-108.171.1 * kernel-source-3.0.101-108.171.1 * SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64) * kernel-ec2-3.0.101-108.171.1 * kernel-default-3.0.101-108.171.1 * kernel-xen-3.0.101-108.171.1 * kernel-trace-3.0.101-108.171.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * kernel-xen-devel-3.0.101-108.171.1 * kernel-ec2-devel-3.0.101-108.171.1 * kernel-trace-base-3.0.101-108.171.1 * kernel-syms-3.0.101-108.171.1 * kernel-xen-base-3.0.101-108.171.1 * kernel-ec2-base-3.0.101-108.171.1 * kernel-default-base-3.0.101-108.171.1 * kernel-trace-devel-3.0.101-108.171.1 * kernel-default-devel-3.0.101-108.171.1 * kernel-source-3.0.101-108.171.1 ## References: * https://www.suse.com/security/cve/CVE-2024-49995.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://bugzilla.suse.com/show_bug.cgi?id=1232432 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 20 16:30:32 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 20 Dec 2024 16:30:32 -0000 Subject: SUSE-SU-2024:4396-1: moderate: Security update for python-aiohttp Message-ID: <173471223271.32684.18050140908526564922@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:4396-1 Release Date: 2024-12-20T12:02:05Z Rating: moderate References: * bsc#1223098 Cross-References: * CVE-2024-27306 CVSS scores: * CVE-2024-27306 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2024-27306: filenames and paths not escaped when generating index pages for static file handling. (bsc#1223098) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-4396=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4396=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4396=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4396=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4396=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-4396=1 ## Package List: * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python3-aiohttp-debuginfo-3.6.0-150100.3.24.1 * python-aiohttp-debugsource-3.6.0-150100.3.24.1 * python3-aiohttp-3.6.0-150100.3.24.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-aiohttp-debuginfo-3.6.0-150100.3.24.1 * python-aiohttp-debugsource-3.6.0-150100.3.24.1 * python3-aiohttp-3.6.0-150100.3.24.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-aiohttp-debuginfo-3.6.0-150100.3.24.1 * python-aiohttp-debugsource-3.6.0-150100.3.24.1 * python3-aiohttp-3.6.0-150100.3.24.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-aiohttp-debuginfo-3.6.0-150100.3.24.1 * python-aiohttp-debugsource-3.6.0-150100.3.24.1 * python3-aiohttp-3.6.0-150100.3.24.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-aiohttp-debuginfo-3.6.0-150100.3.24.1 * python-aiohttp-debugsource-3.6.0-150100.3.24.1 * python-aiohttp-doc-3.6.0-150100.3.24.1 * python3-aiohttp-3.6.0-150100.3.24.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python3-aiohttp-debuginfo-3.6.0-150100.3.24.1 * python-aiohttp-debugsource-3.6.0-150100.3.24.1 * python-aiohttp-doc-3.6.0-150100.3.24.1 * python3-aiohttp-3.6.0-150100.3.24.1 ## References: * https://www.suse.com/security/cve/CVE-2024-27306.html * https://bugzilla.suse.com/show_bug.cgi?id=1223098 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 23 12:30:14 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 23 Dec 2024 12:30:14 -0000 Subject: SUSE-SU-2024:4409-1: low: Recommended update for vim Message-ID: <173495701413.13380.9939037607247966041@smelt2.prg2.suse.org> # Recommended update for vim Announcement ID: SUSE-SU-2024:4409-1 Release Date: 2024-12-23T09:20:55Z Rating: low References: * bsc#1220618 * bsc#1229238 * bsc#1231373 Cross-References: * CVE-2024-43374 * CVE-2024-47814 CVSS scores: * CVE-2024-43374 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-43374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-47814 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L * CVE-2024-47814 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L * CVE-2024-47814 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for vim fixes the following issues: * CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373) * CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238) Other fixes: * Remove patch that introduced a bug caused significantly more CPU usage (bsc#1220618) * Updated to version 9.1.0836 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4409=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4409=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * vim-debuginfo-9.1.0836-17.38.1 * vim-debugsource-9.1.0836-17.38.1 * gvim-9.1.0836-17.38.1 * gvim-debuginfo-9.1.0836-17.38.1 * vim-9.1.0836-17.38.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * vim-data-9.1.0836-17.38.1 * vim-data-common-9.1.0836-17.38.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * vim-debuginfo-9.1.0836-17.38.1 * vim-debugsource-9.1.0836-17.38.1 * gvim-9.1.0836-17.38.1 * gvim-debuginfo-9.1.0836-17.38.1 * vim-9.1.0836-17.38.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * vim-data-9.1.0836-17.38.1 * vim-data-common-9.1.0836-17.38.1 ## References: * https://www.suse.com/security/cve/CVE-2024-43374.html * https://www.suse.com/security/cve/CVE-2024-47814.html * https://bugzilla.suse.com/show_bug.cgi?id=1220618 * https://bugzilla.suse.com/show_bug.cgi?id=1229238 * https://bugzilla.suse.com/show_bug.cgi?id=1231373 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 23 12:30:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 23 Dec 2024 12:30:18 -0000 Subject: SUSE-SU-2024:4407-1: moderate: Security update for aalto-xml, flatten-maven-plugin, jctools, moditect, netty, netty-tcnative Message-ID: <173495701850.13380.18437556506348635402@smelt2.prg2.suse.org> # Security update for aalto-xml, flatten-maven-plugin, jctools, moditect, netty, netty-tcnative Announcement ID: SUSE-SU-2024:4407-1 Release Date: 2024-12-23T08:49:51Z Rating: moderate References: * bsc#1047218 * bsc#1233297 Cross-References: * CVE-2024-47535 CVSS scores: * CVE-2024-47535 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47535 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47535 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for aalto-xml, flatten-maven-plugin, jctools, moditect, netty, netty-tcnative fixes the following issues: * CVE-2024-47535: Fixed unsafe reading of large environment files when Netty is loaded by a java application can lead to a crash due to the JVM memory limit being exceeded in netty (bsc#1233297) Other fixes: \- Upgraded netty to upstream version 4.1.115 \- Upgraded netty- tcnative to version 2.0.69 Final \- Updated jctools to version 4.0.5 \- Updated aalto-xml to version 1.3.3 \- Updated moditect to version 1.2.2 \- Updated flatten-maven-plugin to version 1.6.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4407=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4407=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4407=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4407=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4407=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4407=1 ## Package List: * openSUSE Leap 15.5 (noarch) * netty-javadoc-4.1.115-150200.4.26.1 * jctools-experimental-4.0.5-150200.3.9.1 * jctools-channels-4.0.5-150200.3.9.1 * jctools-javadoc-4.0.5-150200.3.9.1 * jctools-4.0.5-150200.3.9.1 * netty-tcnative-javadoc-2.0.69-150200.3.22.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * netty-4.1.115-150200.4.26.1 * netty-tcnative-2.0.69-150200.3.22.1 * openSUSE Leap 15.6 (noarch) * netty-javadoc-4.1.115-150200.4.26.1 * jctools-experimental-4.0.5-150200.3.9.1 * jctools-channels-4.0.5-150200.3.9.1 * jctools-javadoc-4.0.5-150200.3.9.1 * jctools-4.0.5-150200.3.9.1 * netty-tcnative-javadoc-2.0.69-150200.3.22.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * netty-4.1.115-150200.4.26.1 * netty-tcnative-2.0.69-150200.3.22.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * netty-tcnative-2.0.69-150200.3.22.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * netty-tcnative-2.0.69-150200.3.22.1 * SUSE Package Hub 15 15-SP5 (noarch) * jctools-4.0.5-150200.3.9.1 * netty-javadoc-4.1.115-150200.4.26.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * netty-4.1.115-150200.4.26.1 * SUSE Package Hub 15 15-SP6 (noarch) * jctools-4.0.5-150200.3.9.1 * netty-javadoc-4.1.115-150200.4.26.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * netty-4.1.115-150200.4.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47535.html * https://bugzilla.suse.com/show_bug.cgi?id=1047218 * https://bugzilla.suse.com/show_bug.cgi?id=1233297 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 23 16:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 23 Dec 2024 16:30:07 -0000 Subject: SUSE-SU-2024:4412-1: moderate: Security update for mozjs78 Message-ID: <173497140713.13579.1485675846241216113@smelt2.prg2.suse.org> # Security update for mozjs78 Announcement ID: SUSE-SU-2024:4412-1 Release Date: 2024-12-23T13:12:16Z Rating: moderate References: * bsc#1232599 Cross-References: * CVE-2024-50602 CVSS scores: * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for mozjs78 fixes the following issues: * CVE-2024-50602: Fixed DoS via XML_ResumeParser (bsc#1232599) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4412=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4412=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4412=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4412=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4412=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4412=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i686) * mozjs78-debuginfo-78.15.0-150400.3.11.1 * mozjs78-78.15.0-150400.3.11.1 * mozjs78-debugsource-78.15.0-150400.3.11.1 * mozjs78-devel-78.15.0-150400.3.11.1 * libmozjs-78-0-78.15.0-150400.3.11.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.11.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * mozjs78-debuginfo-78.15.0-150400.3.11.1 * mozjs78-78.15.0-150400.3.11.1 * mozjs78-debugsource-78.15.0-150400.3.11.1 * mozjs78-devel-78.15.0-150400.3.11.1 * libmozjs-78-0-78.15.0-150400.3.11.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.11.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * mozjs78-debuginfo-78.15.0-150400.3.11.1 * mozjs78-78.15.0-150400.3.11.1 * mozjs78-debugsource-78.15.0-150400.3.11.1 * mozjs78-devel-78.15.0-150400.3.11.1 * libmozjs-78-0-78.15.0-150400.3.11.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.11.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mozjs78-debuginfo-78.15.0-150400.3.11.1 * mozjs78-debugsource-78.15.0-150400.3.11.1 * mozjs78-devel-78.15.0-150400.3.11.1 * libmozjs-78-0-78.15.0-150400.3.11.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.11.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * libmozjs-78-0-78.15.0-150400.3.11.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libmozjs-78-0-78.15.0-150400.3.11.1 * mozjs78-debugsource-78.15.0-150400.3.11.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.11.1 * mozjs78-debuginfo-78.15.0-150400.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1232599 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 23 16:30:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 23 Dec 2024 16:30:12 -0000 Subject: SUSE-SU-2024:4411-1: moderate: Security update for mozjs115 Message-ID: <173497141248.13579.164249160055074277@smelt2.prg2.suse.org> # Security update for mozjs115 Announcement ID: SUSE-SU-2024:4411-1 Release Date: 2024-12-23T12:46:06Z Rating: moderate References: * bsc#1232599 * bsc#1232602 * bsc#1233766 * bsc#1233786 Cross-References: * CVE-2024-11403 * CVE-2024-11498 * CVE-2024-50602 CVSS scores: * CVE-2024-11403 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2024-11403 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-11498 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2024-11498 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-50602 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for mozjs115 fixes the following issues: * CVE-2024-11498: Fixed resource exhaustion via Stack overflow in libjxl (bsc#1233786) * CVE-2024-11403: Fixed out of Bounds Memory Read/Write in libjxl (bsc#1233766) * CVE-2024-50602: Fixed DoS via XML_ResumeParser in libexpat (bsc#1232602) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4411=1 openSUSE-SLE-15.6-2024-4411=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4411=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i686) * libmozjs-115-0-debuginfo-115.4.0-150600.3.6.1 * libmozjs-115-0-115.4.0-150600.3.6.1 * mozjs115-debuginfo-115.4.0-150600.3.6.1 * mozjs115-debugsource-115.4.0-150600.3.6.1 * mozjs115-devel-115.4.0-150600.3.6.1 * mozjs115-115.4.0-150600.3.6.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libmozjs-115-0-debuginfo-115.4.0-150600.3.6.1 * libmozjs-115-0-115.4.0-150600.3.6.1 * mozjs115-debuginfo-115.4.0-150600.3.6.1 * mozjs115-debugsource-115.4.0-150600.3.6.1 * mozjs115-devel-115.4.0-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11403.html * https://www.suse.com/security/cve/CVE-2024-11498.html * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1232599 * https://bugzilla.suse.com/show_bug.cgi?id=1232602 * https://bugzilla.suse.com/show_bug.cgi?id=1233766 * https://bugzilla.suse.com/show_bug.cgi?id=1233786 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 23 20:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 23 Dec 2024 20:30:07 -0000 Subject: SUSE-SU-2024:4414-1: moderate: Security update for gdb Message-ID: <173498580784.3884.7564777538725554020@smelt2.prg2.suse.org> # Security update for gdb Announcement ID: SUSE-SU-2024:4414-1 Release Date: 2024-12-23T19:43:48Z Rating: moderate References: * bsc#1220490 * jsc#PED-10258 * jsc#PED-10751 Cross-References: * CVE-2022-4806 CVSS scores: * CVE-2022-4806 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2022-4806 ( NVD ): 8.2 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for gdb fixes the following issues: Mention changes in GDB 14: * GDB now supports the AArch64 Scalable Matrix Extension 2 (SME2), which includes a new 512 bit lookup table register named ZT0. * GDB now supports the AArch64 Scalable Matrix Extension (SME), which includes a new matrix register named ZA, a new thread register TPIDR2 and a new vector length register SVG (streaming vector granule). GDB also supports tracking ZA state across signal frames. Some features are still under development or are dependent on ABI specs that are still in alpha stage. For example, manual function calls with ZA state don't have any special handling, and tracking of SVG changes based on DWARF information is still not implemented, but there are plans to do so in the future. * GDB now recognizes the NO_COLOR environment variable and disables styling according to the spec. See https://no-color.org/. Styling can be re-enabled with "set style enabled on". * The AArch64 'org.gnu.gdb.aarch64.pauth' Pointer Authentication feature string has been deprecated in favor of the 'org.gnu.gdb.aarch64.pauth_v2' feature string. * GDB now has some support for integer types larger than 64 bits. * Multi-target feature configuration. GDB now supports the individual configuration of remote targets' feature sets. Based on the current selection of a target, the commands 'set remote -packet (on|off|auto)' and 'show remote -packet' can be used to configure a target's feature packet and to display its configuration, respectively. * GDB has initial built-in support for the Debugger Adapter Protocol. * For the break command, multiple uses of the 'thread' or 'task' keywords will now give an error instead of just using the thread or task id from the last instance of the keyword. E.g.: break foo thread 1 thread 2 will now give an error rather than using 'thread 2'. * For the watch command, multiple uses of the 'task' keyword will now give an error instead of just using the task id from the last instance of the keyword. E.g.: watch my_var task 1 task 2 will now give an error rather than using 'task 2'. The 'thread' keyword already gave an error when used multiple times with the watch command, this remains unchanged. * The 'set print elements' setting now helps when printing large arrays. If an array would otherwise exceed max-value-size, but 'print elements' is set such that the size of elements to print is less than or equal to 'max-value- size', GDB will now still print the array, however only 'max-value-size' worth of data will be added into the value history. * For both the break and watch commands, it is now invalid to use both the 'thread' and 'task' keywords within the same command. For example the following commnds will now give an error: break foo thread 1 task 1 watch var thread 2 task 3 * The printf command now accepts a '%V' output format which will format an expression just as the 'print' command would. Print options can be placed withing '[...]' after the '%V' to modify how the value is printed. E.g: printf "%V", some_array printf "%V[-array-indexes on]", some_array will print the array without, or with array indexes included, just as the array would be printed by the 'print' command. This functionality is also available for dprintf when dprintf-style is 'gdb'. * When the printf command requires a string to be fetched from the inferior, GDB now uses the existing 'max-value-size' setting to the limit the memory allocated within GDB. The default 'max-value-size' is 64k. To print longer strings you should increase 'max-value-size'. * The Ada 2022 Enum_Rep and Enum_Val attributes are now supported. * The Ada 2022 target name symbol ('@') is now supported by the Ada expression parser. * The 'list' command now accepts '.' as an argument, which tells GDB to print the location around the point of execution within the current frame. If the inferior hasn't started yet, the command will print around the beginning of the 'main' function. * Using the 'list' command with no arguments in a situation where the command would attempt to list past the end of the file now warns the user that the end of file has been reached, refers the user to the newly added '.' argument * Breakpoints can now be inferior-specific. This is similar to the existing thread-specific breakpoint support. Breakpoint conditions can include the 'inferior' keyword followed by an inferior id (as displayed in the 'info inferiors' output). It is invalid to use the 'inferior' keyword with either the 'thread' or 'task' keywords when creating a breakpoint. * New convenience function "$_shell", to execute a shell command and return the result. This lets you run shell commands in expressions. Some examples: (gdb) p $_shell("true") $1 = 0 (gdb) p $_shell("false") $2 = 1 (gdb) break func if $_shell("some command") == 0 * New commands: * set debug breakpoint on|off show debug breakpoint Print additional debug messages about breakpoint insertion and removal. * maintenance print record-instruction [ N ] Print the recorded information for a given instruction. If N is not given prints how GDB would undo the last instruction executed. If N is negative, prints how GDB would undo the N-th previous instruction, and if N is positive, it prints how GDB will redo the N-th following instruction. * maintenance info frame-unwinders List the frame unwinders currently in effect, starting with the highest priority. * maintenance wait-for-index-cache Wait until all pending writes to the index cache have completed. * set always-read-ctf on|off show always-read-ctf When off, CTF is only read if DWARF is not present. When on, CTF is read regardless of whether DWARF is present. Off by default. * info main Get main symbol to identify entry point into program. * set tui mouse-events [on|off] show tui mouse-events When on (default), mouse clicks control the TUI and can be accessed by Python extensions. When off, mouse clicks are handled by the terminal, enabling terminal-native text selection. * MI changes: * MI version 1 has been removed. * mi now reports 'no-history' as a stop reason when hitting the end of the reverse execution history. * When creating a thread-specific breakpoint using the '-p' option, the -break-insert command would report the 'thread' field twice in the reply. The content of both fields was always identical. This has now been fixed; the 'thread' field will be reported just once for thread-specific breakpoints, or not at all for breakpoints without a thread restriction. The same is also true for the 'task' field of an Ada task-specific breakpoint. * It is no longer possible to create a thread-specific breakpoint for a thread that doesn't exist using '-break-insert -p ID'. Creating breakpoints for non-existent threads is not allowed when using the CLI, that the MI allowed it was a long standing bug, which has now been fixed. * The '\--simple-values' argument to the '-stack-list-arguments','-stack-list- locals', '-stack-list-variables', and '-var-list-children' commands now takes reference types into account: that is, a value is now considered simple if it is neither an array, structure, or union, nor a reference to an array, structure, or union. (Previously all references were considered simple.) Support for this feature can be verified by using the '-list- features' command, which should contain "simple-values-ref-types". * The -break-insert command now accepts a '-g thread-group-id' option to allow for the creation of inferior-specific breakpoints. * The bkpt tuple, which appears in breakpoint-created notifications, and in the result of the -break-insert command can now include an optional 'inferior' field for both the main breakpoint, and each location, when the breakpoint is inferior-specific. * Python API: * gdb.ThreadExitedEvent added. Emits a ThreadEvent. * The gdb.unwinder.Unwinder.name attribute is now read-only. * The name argument passed to gdb.unwinder.Unwinder. **init** must now be of type 'str' otherwise a TypeError will be raised. * The gdb.unwinder.Unwinder.enabled attribute can now only accept values of type 'bool'. Changing this attribute will now invalidate GDB's frame-cache, which means GDB will need to rebuild its frame-cache when next required - either with, or without the particular unwinder, depending on how 'enabled' was changed. * New methods added to the gdb.PendingFrame class. These methods have the same behaviour as the corresponding methods on gdb.Frame. The new methods are: * gdb.PendingFrame.name: Return the name for the frame's function, or None. * gdb.PendingFrame.is_valid: Return True if the pending frame object is valid. * gdb.PendingFrame.pc: Return the $pc register value for this frame. * gdb.PendingFrame.language: Return a string containing the language for this frame, or None. * gdb.PendingFrame.find_sal: Return a gdb.Symtab_and_line object for the current location within the pending frame, or None. * gdb.PendingFrame.block: Return a gdb.Block for the current pending frame, or None. * gdb.PendingFrame.function: Return a gdb.Symbol for the current pending frame, or None. * The frame-id passed to gdb.PendingFrame.create_unwind_info can now use either an integer or a gdb.Value object for each of its 'sp', 'pc', and 'special' attributes. * A new class gdb.unwinder.FrameId has been added. Instances of this class are constructed with 'sp' (stack-pointer) and 'pc' (program-counter) values, and can be used as the frame-id when calling gdb.PendingFrame.create_unwind_info. * It is now no longer possible to sub-class the gdb.disassembler.DisassemblerResult type. * The Disassembler API from the gdb.disassembler module has been extended to include styling support: * The DisassemblerResult class can now be initialized with a list of parts. Each part represents part of the disassembled instruction along with the associated style information. This list of parts can be accessed with the new DisassemblerResult.parts property. * New constants gdb.disassembler.STYLE_* representing all the different styles part of an instruction might have. * New methods DisassembleInfo.text_part and DisassembleInfo.address_part which are used to create the new styled parts of a disassembled instruction. * Changes are backwards compatible, the older API can still be used to disassemble instructions without styling. * New function gdb.execute_mi(COMMAND, [ARG]...), that invokes a GDB/MI command and returns the output as a Python dictionary. * New function gdb.block_signals(). This returns a context manager that blocks any signals that GDB needs to handle itself. * New class gdb.Thread. This is a subclass of threading.Thread that calls gdb.block_signals in its "start" method. * gdb.parse_and_eval now has a new "global_context" parameter. This can be used to request that the parse only examine global symbols. * gdb.Inferior now has a new "arguments" attribute. This holds the command- line arguments to the inferior, if known. * gdb.Inferior now has a new "main_name" attribute. This holds the name of the inferior's "main", if known. * gdb.Inferior now has new methods "clear_env", "set_env", and "unset_env". These can be used to modify the inferior's environment before it is started. * gdb.Value now has the 'assign' method. * gdb.Value now has the 'to_array' method. This converts an array-like Value to an array. * gdb.Progspace now has the new method "objfile_for_address". This returns the gdb.Objfile, if any, that covers a given address. * gdb.Breakpoint now has an "inferior" attribute. If the Breakpoint object is inferior specific then this attribute holds the inferior-id (an integer). If the Breakpoint object is not inferior specific, then this field contains None. This field can be written too. * gdb.Type now has the "is_array_like" and "is_string_like" methods. These reflect GDB's internal idea of whether a type might be array- or string- like, even if they do not have the corresponding type code. * gdb.ValuePrinter is a new class that can be used as the base class for the result of applying a pretty-printer. As a base class, it signals to gdb that the printer may implement new pretty-printer methods. * New attribute Progspace.symbol_file. This attribute holds the gdb.Objfile that corresponds to Progspace.filename (when Progspace.filename is not None), otherwise, this attribute is itself None. * New attribute Progspace.executable_filename. This attribute holds a string containing a file name set by the "exec-file" or "file" commands, or None if no executable file is set. This isn't the exact string passed by the user to these commands; the file name will have been partially resolved to an absolute file name. * A new executable_changed event registry is available. This event emits ExecutableChangedEvent objects, which have 'progspace' (a gdb.Progspace) and 'reload' (a Boolean) attributes. This event is emitted when gdb.Progspace.executable_filename changes. * New event registries gdb.events.new_progspace and gdb.events.free_progspace, these emit NewProgspaceEvent and FreeProgspaceEvent event types respectively. Both of these event types have a single 'progspace' attribute, which is the gdb.Progspace that is either being added to GDB, or removed from GDB. * gdb.LazyString now implements the **str** method. * New method gdb.Frame.static_link that returns the outer frame of a nested function frame. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4414=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4414=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4414=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4414=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4414=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4414=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4414=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4414=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4414=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4414=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586 nosrc) * gdb-testresults-14.2-150400.15.20.1 * openSUSE Leap 15.4 (aarch64_ilp32) * gdbserver-64bit-14.2-150400.15.20.1 * gdb-64bit-debuginfo-14.2-150400.15.20.1 * gdbserver-64bit-debuginfo-14.2-150400.15.20.1 * gdb-64bit-14.2-150400.15.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * gdb-testresults-14.2-150400.15.20.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * gdb-testresults-14.2-150400.15.20.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gdb-debugsource-14.2-150400.15.20.1 * gdb-debuginfo-14.2-150400.15.20.1 * gdbserver-14.2-150400.15.20.1 * gdb-14.2-150400.15.20.1 * gdbserver-debuginfo-14.2-150400.15.20.1 ## References: * https://www.suse.com/security/cve/CVE-2022-4806.html * https://bugzilla.suse.com/show_bug.cgi?id=1220490 * https://jira.suse.com/browse/PED-10258 * https://jira.suse.com/browse/PED-10751 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 23 20:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 23 Dec 2024 20:30:10 -0000 Subject: SUSE-SU-2024:4413-1: moderate: Security update for gdb Message-ID: <173498581065.3884.10382719830514592395@smelt2.prg2.suse.org> # Security update for gdb Announcement ID: SUSE-SU-2024:4413-1 Release Date: 2024-12-23T19:42:03Z Rating: moderate References: * bsc#1220490 * jsc#PED-10258 * jsc#PED-10751 Cross-References: * CVE-2022-4806 CVSS scores: * CVE-2022-4806 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2022-4806 ( NVD ): 8.2 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for gdb fixes the following issues: Mention changes in GDB 14: * GDB now supports the AArch64 Scalable Matrix Extension 2 (SME2), which includes a new 512 bit lookup table register named ZT0. * GDB now supports the AArch64 Scalable Matrix Extension (SME), which includes a new matrix register named ZA, a new thread register TPIDR2 and a new vector length register SVG (streaming vector granule). GDB also supports tracking ZA state across signal frames. Some features are still under development or are dependent on ABI specs that are still in alpha stage. For example, manual function calls with ZA state don't have any special handling, and tracking of SVG changes based on DWARF information is still not implemented, but there are plans to do so in the future. * GDB now recognizes the NO_COLOR environment variable and disables styling according to the spec. See https://no-color.org/. Styling can be re-enabled with "set style enabled on". * The AArch64 'org.gnu.gdb.aarch64.pauth' Pointer Authentication feature string has been deprecated in favor of the 'org.gnu.gdb.aarch64.pauth_v2' feature string. * GDB now has some support for integer types larger than 64 bits. * Multi-target feature configuration. GDB now supports the individual configuration of remote targets' feature sets. Based on the current selection of a target, the commands 'set remote -packet (on|off|auto)' and 'show remote -packet' can be used to configure a target's feature packet and to display its configuration, respectively. * GDB has initial built-in support for the Debugger Adapter Protocol. * For the break command, multiple uses of the 'thread' or 'task' keywords will now give an error instead of just using the thread or task id from the last instance of the keyword. E.g.: break foo thread 1 thread 2 will now give an error rather than using 'thread 2'. * For the watch command, multiple uses of the 'task' keyword will now give an error instead of just using the task id from the last instance of the keyword. E.g.: watch my_var task 1 task 2 will now give an error rather than using 'task 2'. The 'thread' keyword already gave an error when used multiple times with the watch command, this remains unchanged. * The 'set print elements' setting now helps when printing large arrays. If an array would otherwise exceed max-value-size, but 'print elements' is set such that the size of elements to print is less than or equal to 'max-value- size', GDB will now still print the array, however only 'max-value-size' worth of data will be added into the value history. * For both the break and watch commands, it is now invalid to use both the 'thread' and 'task' keywords within the same command. For example the following commnds will now give an error: break foo thread 1 task 1 watch var thread 2 task 3 * The printf command now accepts a '%V' output format which will format an expression just as the 'print' command would. Print options can be placed withing '[...]' after the '%V' to modify how the value is printed. E.g: printf "%V", some_array printf "%V[-array-indexes on]", some_array will print the array without, or with array indexes included, just as the array would be printed by the 'print' command. This functionality is also available for dprintf when dprintf-style is 'gdb'. * When the printf command requires a string to be fetched from the inferior, GDB now uses the existing 'max-value-size' setting to the limit the memory allocated within GDB. The default 'max-value-size' is 64k. To print longer strings you should increase 'max-value-size'. * The Ada 2022 Enum_Rep and Enum_Val attributes are now supported. * The Ada 2022 target name symbol ('@') is now supported by the Ada expression parser. * The 'list' command now accepts '.' as an argument, which tells GDB to print the location around the point of execution within the current frame. If the inferior hasn't started yet, the command will print around the beginning of the 'main' function. * Using the 'list' command with no arguments in a situation where the command would attempt to list past the end of the file now warns the user that the end of file has been reached, refers the user to the newly added '.' argument * Breakpoints can now be inferior-specific. This is similar to the existing thread-specific breakpoint support. Breakpoint conditions can include the 'inferior' keyword followed by an inferior id (as displayed in the 'info inferiors' output). It is invalid to use the 'inferior' keyword with either the 'thread' or 'task' keywords when creating a breakpoint. * New convenience function "$_shell", to execute a shell command and return the result. This lets you run shell commands in expressions. Some examples: (gdb) p $_shell("true") $1 = 0 (gdb) p $_shell("false") $2 = 1 (gdb) break func if $_shell("some command") == 0 * New commands: * set debug breakpoint on|off show debug breakpoint Print additional debug messages about breakpoint insertion and removal. * maintenance print record-instruction [ N ] Print the recorded information for a given instruction. If N is not given prints how GDB would undo the last instruction executed. If N is negative, prints how GDB would undo the N-th previous instruction, and if N is positive, it prints how GDB will redo the N-th following instruction. * maintenance info frame-unwinders List the frame unwinders currently in effect, starting with the highest priority. * maintenance wait-for-index-cache Wait until all pending writes to the index cache have completed. * set always-read-ctf on|off show always-read-ctf When off, CTF is only read if DWARF is not present. When on, CTF is read regardless of whether DWARF is present. Off by default. * info main Get main symbol to identify entry point into program. * set tui mouse-events [on|off] show tui mouse-events When on (default), mouse clicks control the TUI and can be accessed by Python extensions. When off, mouse clicks are handled by the terminal, enabling terminal-native text selection. * MI changes: * MI version 1 has been removed. * mi now reports 'no-history' as a stop reason when hitting the end of the reverse execution history. * When creating a thread-specific breakpoint using the '-p' option, the -break-insert command would report the 'thread' field twice in the reply. The content of both fields was always identical. This has now been fixed; the 'thread' field will be reported just once for thread-specific breakpoints, or not at all for breakpoints without a thread restriction. The same is also true for the 'task' field of an Ada task-specific breakpoint. * It is no longer possible to create a thread-specific breakpoint for a thread that doesn't exist using '-break-insert -p ID'. Creating breakpoints for non-existent threads is not allowed when using the CLI, that the MI allowed it was a long standing bug, which has now been fixed. * The '\--simple-values' argument to the '-stack-list-arguments','-stack-list- locals', '-stack-list-variables', and '-var-list-children' commands now takes reference types into account: that is, a value is now considered simple if it is neither an array, structure, or union, nor a reference to an array, structure, or union. (Previously all references were considered simple.) Support for this feature can be verified by using the '-list- features' command, which should contain "simple-values-ref-types". * The -break-insert command now accepts a '-g thread-group-id' option to allow for the creation of inferior-specific breakpoints. * The bkpt tuple, which appears in breakpoint-created notifications, and in the result of the -break-insert command can now include an optional 'inferior' field for both the main breakpoint, and each location, when the breakpoint is inferior-specific. * Python API: * gdb.ThreadExitedEvent added. Emits a ThreadEvent. * The gdb.unwinder.Unwinder.name attribute is now read-only. * The name argument passed to gdb.unwinder.Unwinder. **init** must now be of type 'str' otherwise a TypeError will be raised. * The gdb.unwinder.Unwinder.enabled attribute can now only accept values of type 'bool'. Changing this attribute will now invalidate GDB's frame-cache, which means GDB will need to rebuild its frame-cache when next required - either with, or without the particular unwinder, depending on how 'enabled' was changed. * New methods added to the gdb.PendingFrame class. These methods have the same behaviour as the corresponding methods on gdb.Frame. The new methods are: * gdb.PendingFrame.name: Return the name for the frame's function, or None. * gdb.PendingFrame.is_valid: Return True if the pending frame object is valid. * gdb.PendingFrame.pc: Return the $pc register value for this frame. * gdb.PendingFrame.language: Return a string containing the language for this frame, or None. * gdb.PendingFrame.find_sal: Return a gdb.Symtab_and_line object for the current location within the pending frame, or None. * gdb.PendingFrame.block: Return a gdb.Block for the current pending frame, or None. * gdb.PendingFrame.function: Return a gdb.Symbol for the current pending frame, or None. * The frame-id passed to gdb.PendingFrame.create_unwind_info can now use either an integer or a gdb.Value object for each of its 'sp', 'pc', and 'special' attributes. * A new class gdb.unwinder.FrameId has been added. Instances of this class are constructed with 'sp' (stack-pointer) and 'pc' (program-counter) values, and can be used as the frame-id when calling gdb.PendingFrame.create_unwind_info. * It is now no longer possible to sub-class the gdb.disassembler.DisassemblerResult type. * The Disassembler API from the gdb.disassembler module has been extended to include styling support: * The DisassemblerResult class can now be initialized with a list of parts. Each part represents part of the disassembled instruction along with the associated style information. This list of parts can be accessed with the new DisassemblerResult.parts property. * New constants gdb.disassembler.STYLE_* representing all the different styles part of an instruction might have. * New methods DisassembleInfo.text_part and DisassembleInfo.address_part which are used to create the new styled parts of a disassembled instruction. * Changes are backwards compatible, the older API can still be used to disassemble instructions without styling. * New function gdb.execute_mi(COMMAND, [ARG]...), that invokes a GDB/MI command and returns the output as a Python dictionary. * New function gdb.block_signals(). This returns a context manager that blocks any signals that GDB needs to handle itself. * New class gdb.Thread. This is a subclass of threading.Thread that calls gdb.block_signals in its "start" method. * gdb.parse_and_eval now has a new "global_context" parameter. This can be used to request that the parse only examine global symbols. * gdb.Inferior now has a new "arguments" attribute. This holds the command- line arguments to the inferior, if known. * gdb.Inferior now has a new "main_name" attribute. This holds the name of the inferior's "main", if known. * gdb.Inferior now has new methods "clear_env", "set_env", and "unset_env". These can be used to modify the inferior's environment before it is started. * gdb.Value now has the 'assign' method. * gdb.Value now has the 'to_array' method. This converts an array-like Value to an array. * gdb.Progspace now has the new method "objfile_for_address". This returns the gdb.Objfile, if any, that covers a given address. * gdb.Breakpoint now has an "inferior" attribute. If the Breakpoint object is inferior specific then this attribute holds the inferior-id (an integer). If the Breakpoint object is not inferior specific, then this field contains None. This field can be written too. * gdb.Type now has the "is_array_like" and "is_string_like" methods. These reflect GDB's internal idea of whether a type might be array- or string- like, even if they do not have the corresponding type code. * gdb.ValuePrinter is a new class that can be used as the base class for the result of applying a pretty-printer. As a base class, it signals to gdb that the printer may implement new pretty-printer methods. * New attribute Progspace.symbol_file. This attribute holds the gdb.Objfile that corresponds to Progspace.filename (when Progspace.filename is not None), otherwise, this attribute is itself None. * New attribute Progspace.executable_filename. This attribute holds a string containing a file name set by the "exec-file" or "file" commands, or None if no executable file is set. This isn't the exact string passed by the user to these commands; the file name will have been partially resolved to an absolute file name. * A new executable_changed event registry is available. This event emits ExecutableChangedEvent objects, which have 'progspace' (a gdb.Progspace) and 'reload' (a Boolean) attributes. This event is emitted when gdb.Progspace.executable_filename changes. * New event registries gdb.events.new_progspace and gdb.events.free_progspace, these emit NewProgspaceEvent and FreeProgspaceEvent event types respectively. Both of these event types have a single 'progspace' attribute, which is the gdb.Progspace that is either being added to GDB, or removed from GDB. * gdb.LazyString now implements the **str** method. * New method gdb.Frame.static_link that returns the outer frame of a nested function frame. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4413=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4413=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4413=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-4413=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4413=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4413=1 * SUSE Linux Enterprise Server 15 SP2 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4413=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64 x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 * SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64) * gdb-debuginfo-14.2-150100.8.45.1 * gdbserver-14.2-150100.8.45.1 * gdbserver-debuginfo-14.2-150100.8.45.1 * gdb-14.2-150100.8.45.1 * gdb-debugsource-14.2-150100.8.45.1 ## References: * https://www.suse.com/security/cve/CVE-2022-4806.html * https://bugzilla.suse.com/show_bug.cgi?id=1220490 * https://jira.suse.com/browse/PED-10258 * https://jira.suse.com/browse/PED-10751 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 24 12:30:17 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 24 Dec 2024 12:30:17 -0000 Subject: SUSE-SU-2024:4416-1: moderate: Security update for vhostmd Message-ID: <173504341713.13380.12816429232116414349@smelt2.prg2.suse.org> # Security update for vhostmd Announcement ID: SUSE-SU-2024:4416-1 Release Date: 2024-12-24T08:21:06Z Rating: moderate References: * bsc#1129772 * bsc#1152803 * bsc#1154838 * bsc#1181400 * bsc#1230961 Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has five security fixes can now be installed. ## Description: This update for vhostmd fixes the following issues: Updated to version 1.2 * Fix actions using the 'free' command * Fix buffer accounting when generating metric XML * Change actions to retrieve vendor and product info * Add a 'unit' attribute to the metrics element * vif-stats.py: convert to Python3 * conf: Update the 'VirtualizationVendor' action to strip any URLs that may follow the vendor name (bsc#1230961) * Fix virtio transport to work with libvirt >= 9.7.0 * Added hardening to systemd service (bsc#1181400) * spec: Don't replace user-modified dtd in /etc/vhostmd/ (bsc#1154838) * Relax virtio requirement in config file (bsc#1152803) Updated to version 1.1 (bsc#1129772) * Merge libserialclient with libmetrics * Misc bug fixes and improvements ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2024-4416=1 openSUSE-SLE-15.6-2024-4416=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-4416=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * vhostmd-1.2-150600.17.3.1 * vm-dump-metrics-debuginfo-1.2-150600.17.3.1 * vhostmd-debugsource-1.2-150600.17.3.1 * libmetrics0-debuginfo-1.2-150600.17.3.1 * vm-dump-metrics-1.2-150600.17.3.1 * libmetrics-devel-1.2-150600.17.3.1 * libmetrics0-1.2-150600.17.3.1 * vhostmd-debuginfo-1.2-150600.17.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * vhostmd-1.2-150600.17.3.1 * vm-dump-metrics-debuginfo-1.2-150600.17.3.1 * vhostmd-debugsource-1.2-150600.17.3.1 * vm-dump-metrics-1.2-150600.17.3.1 * vhostmd-debuginfo-1.2-150600.17.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1129772 * https://bugzilla.suse.com/show_bug.cgi?id=1152803 * https://bugzilla.suse.com/show_bug.cgi?id=1154838 * https://bugzilla.suse.com/show_bug.cgi?id=1181400 * https://bugzilla.suse.com/show_bug.cgi?id=1230961 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 24 16:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 24 Dec 2024 16:30:03 -0000 Subject: SUSE-SU-2024:4422-1: moderate: Security update for poppler Message-ID: <173505780323.13558.1805528766896524813@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:4422-1 Release Date: 2024-12-24T12:40:53Z Rating: moderate References: * bsc#1234795 Cross-References: * CVE-2024-56378 CVSS scores: * CVE-2024-56378 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56378 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-56378: out-of-bounds read within JBIG2Bitmap::combine, which can lead to an application crash. (bsc#1234795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4422=1 openSUSE-SLE-15.5-2024-4422=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-devel-23.01.0-150500.3.14.1 * libpoppler126-debuginfo-23.01.0-150500.3.14.1 * poppler-qt5-debugsource-23.01.0-150500.3.14.1 * libpoppler-qt6-3-23.01.0-150500.3.14.1 * libpoppler-glib8-23.01.0-150500.3.14.1 * libpoppler-qt6-devel-23.01.0-150500.3.14.1 * libpoppler126-23.01.0-150500.3.14.1 * typelib-1_0-Poppler-0_18-23.01.0-150500.3.14.1 * poppler-qt6-debugsource-23.01.0-150500.3.14.1 * libpoppler-qt5-1-debuginfo-23.01.0-150500.3.14.1 * poppler-tools-23.01.0-150500.3.14.1 * libpoppler-qt6-3-debuginfo-23.01.0-150500.3.14.1 * libpoppler-cpp0-debuginfo-23.01.0-150500.3.14.1 * libpoppler-glib-devel-23.01.0-150500.3.14.1 * poppler-tools-debuginfo-23.01.0-150500.3.14.1 * libpoppler-cpp0-23.01.0-150500.3.14.1 * libpoppler-qt5-1-23.01.0-150500.3.14.1 * poppler-debugsource-23.01.0-150500.3.14.1 * libpoppler-glib8-debuginfo-23.01.0-150500.3.14.1 * libpoppler-qt5-devel-23.01.0-150500.3.14.1 * openSUSE Leap 15.5 (x86_64) * libpoppler126-32bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler-cpp0-32bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler-qt5-1-32bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler-cpp0-32bit-23.01.0-150500.3.14.1 * libpoppler126-32bit-23.01.0-150500.3.14.1 * libpoppler-qt5-1-32bit-23.01.0-150500.3.14.1 * libpoppler-glib8-32bit-23.01.0-150500.3.14.1 * libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.14.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libpoppler126-64bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler-qt5-1-64bit-23.01.0-150500.3.14.1 * libpoppler-qt5-1-64bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler-cpp0-64bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler126-64bit-23.01.0-150500.3.14.1 * libpoppler-cpp0-64bit-23.01.0-150500.3.14.1 * libpoppler-glib8-64bit-debuginfo-23.01.0-150500.3.14.1 * libpoppler-glib8-64bit-23.01.0-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56378.html * https://bugzilla.suse.com/show_bug.cgi?id=1234795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Dec 24 16:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 24 Dec 2024 16:30:06 -0000 Subject: SUSE-SU-2024:4421-1: moderate: Security update for poppler Message-ID: <173505780663.13558.6347423111401780463@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:4421-1 Release Date: 2024-12-24T12:40:42Z Rating: moderate References: * bsc#1234795 Cross-References: * CVE-2024-56378 CVSS scores: * CVE-2024-56378 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56378 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-56378: Fixed out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc (bsc#1234795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4421=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-qt5-1-debuginfo-22.01.0-150400.3.25.1 * libpoppler117-debuginfo-22.01.0-150400.3.25.1 * poppler-debugsource-22.01.0-150400.3.25.1 * libpoppler-glib8-22.01.0-150400.3.25.1 * libpoppler-cpp0-debuginfo-22.01.0-150400.3.25.1 * libpoppler-glib8-debuginfo-22.01.0-150400.3.25.1 * typelib-1_0-Poppler-0_18-22.01.0-150400.3.25.1 * libpoppler-qt6-3-debuginfo-22.01.0-150400.3.25.1 * poppler-tools-debuginfo-22.01.0-150400.3.25.1 * libpoppler-qt5-1-22.01.0-150400.3.25.1 * libpoppler-glib-devel-22.01.0-150400.3.25.1 * libpoppler117-22.01.0-150400.3.25.1 * poppler-tools-22.01.0-150400.3.25.1 * libpoppler-qt6-3-22.01.0-150400.3.25.1 * libpoppler-qt6-devel-22.01.0-150400.3.25.1 * poppler-qt6-debugsource-22.01.0-150400.3.25.1 * libpoppler-qt5-devel-22.01.0-150400.3.25.1 * poppler-qt5-debugsource-22.01.0-150400.3.25.1 * libpoppler-devel-22.01.0-150400.3.25.1 * libpoppler-cpp0-22.01.0-150400.3.25.1 * openSUSE Leap 15.4 (x86_64) * libpoppler-qt5-1-32bit-22.01.0-150400.3.25.1 * libpoppler-qt5-1-32bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler-cpp0-32bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler117-32bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler117-32bit-22.01.0-150400.3.25.1 * libpoppler-glib8-32bit-22.01.0-150400.3.25.1 * libpoppler-cpp0-32bit-22.01.0-150400.3.25.1 * libpoppler-glib8-32bit-debuginfo-22.01.0-150400.3.25.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libpoppler117-64bit-22.01.0-150400.3.25.1 * libpoppler-glib8-64bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler-glib8-64bit-22.01.0-150400.3.25.1 * libpoppler-qt5-1-64bit-22.01.0-150400.3.25.1 * libpoppler-qt5-1-64bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler117-64bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler-cpp0-64bit-debuginfo-22.01.0-150400.3.25.1 * libpoppler-cpp0-64bit-22.01.0-150400.3.25.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56378.html * https://bugzilla.suse.com/show_bug.cgi?id=1234795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Dec 26 20:30:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 26 Dec 2024 20:30:05 -0000 Subject: SUSE-SU-2024:4423-1: moderate: Security update for poppler Message-ID: <173524500502.13380.3011293605181046112@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:4423-1 Release Date: 2024-12-26T19:42:17Z Rating: moderate References: * bsc#1234795 Cross-References: * CVE-2024-56378 CVSS scores: * CVE-2024-56378 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56378 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-56378: Fixed out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc (bsc#1234795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4423=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpoppler60-debuginfo-0.43.0-16.52.1 * poppler-debugsource-0.43.0-16.52.1 * libpoppler60-0.43.0-16.52.1 * libpoppler-glib8-debuginfo-0.43.0-16.52.1 * libpoppler-glib8-0.43.0-16.52.1 * libpoppler-glib-devel-0.43.0-16.52.1 * libpoppler-qt4-4-0.43.0-16.52.1 * poppler-tools-0.43.0-16.52.1 * libpoppler-devel-0.43.0-16.52.1 * poppler-tools-debuginfo-0.43.0-16.52.1 * libpoppler-qt4-4-debuginfo-0.43.0-16.52.1 * libpoppler-qt4-devel-0.43.0-16.52.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56378.html * https://bugzilla.suse.com/show_bug.cgi?id=1234795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 27 12:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 27 Dec 2024 12:30:07 -0000 Subject: SUSE-SU-2024:4429-1: moderate: Security update for python-grpcio Message-ID: <173530260795.15021.10875439021519684156@smelt2.prg2.suse.org> # Security update for python-grpcio Announcement ID: SUSE-SU-2024:4429-1 Release Date: 2024-12-27T10:16:46Z Rating: moderate References: * bsc#1228919 * bsc#1233821 Cross-References: * CVE-2024-11407 * CVE-2024-7246 CVSS scores: * CVE-2024-11407 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-11407 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2024-11407 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-7246 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-7246 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-grpcio fixes the following issues: * CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821) * CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4429=1 openSUSE-SLE-15.5-2024-4429=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4429=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-4429=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * python311-grpcio-debuginfo-1.60.1-150500.12.6.1 * python-grpcio-debugsource-1.60.1-150500.12.6.1 * python311-grpcio-1.60.1-150500.12.6.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-grpcio-debuginfo-1.60.1-150500.12.6.1 * python-grpcio-debugsource-1.60.1-150500.12.6.1 * python311-grpcio-1.60.1-150500.12.6.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-grpcio-debuginfo-1.60.1-150500.12.6.1 * python-grpcio-debugsource-1.60.1-150500.12.6.1 * python311-grpcio-1.60.1-150500.12.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11407.html * https://www.suse.com/security/cve/CVE-2024-7246.html * https://bugzilla.suse.com/show_bug.cgi?id=1228919 * https://bugzilla.suse.com/show_bug.cgi?id=1233821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Dec 27 12:30:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 27 Dec 2024 12:30:12 -0000 Subject: SUSE-SU-2024:4428-1: moderate: Security update for python-grpcio Message-ID: <173530261217.15021.10161859483309813021@smelt2.prg2.suse.org> # Security update for python-grpcio Announcement ID: SUSE-SU-2024:4428-1 Release Date: 2024-12-27T10:16:24Z Rating: moderate References: * bsc#1228919 * bsc#1233821 Cross-References: * CVE-2024-11407 * CVE-2024-7246 CVSS scores: * CVE-2024-11407 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-11407 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2024-11407 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-7246 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-7246 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-grpcio fixes the following issues: * CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821) * CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4428=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4428=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python-grpcio-debugsource-1.60.1-150400.9.10.1 * python311-grpcio-1.60.1-150400.9.10.1 * python311-grpcio-debuginfo-1.60.1-150400.9.10.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-grpcio-debugsource-1.60.1-150400.9.10.1 * python311-grpcio-1.60.1-150400.9.10.1 * python311-grpcio-debuginfo-1.60.1-150400.9.10.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11407.html * https://www.suse.com/security/cve/CVE-2024-7246.html * https://bugzilla.suse.com/show_bug.cgi?id=1228919 * https://bugzilla.suse.com/show_bug.cgi?id=1233821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 30 12:30:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 30 Dec 2024 12:30:12 -0000 Subject: SUSE-SU-2024:4433-1: moderate: Security update for govulncheck-vulndb Message-ID: <173556181215.13579.8837166522963644908@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2024:4433-1 Release Date: 2024-12-30T08:24:02Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20241218T202206 2024-12-18T20:22:06Z. (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2024-3333 * Update to version 0.0.20241218T163557 2024-12-18T16:35:57Z. (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2024-3331 GHSA-9j3m-fr7q-jxfw * GO-2024-3334 GHSA-qqc8-rv37-79q5 * GO-2024-3335 GHSA-xx83-cxmq-x89m * GO-2024-3336 GHSA-cwq8-g58r-32hg * GO-2024-3337 GHSA-69pr-78gv-7c6h * GO-2024-3338 GHSA-826h-p4c3-477p * GO-2024-3339 GHSA-8wcc-m6j2-qxvm * GO-2024-3340 GHSA-v647-h8jj-fw5r * Update to version 0.0.20241213T205935 2024-12-13T20:59:35Z. (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2022-0635 GHSA-7f33-f4f5-xwgw * GO-2022-0646 GHSA-f5pg-7wfw-84q9 * GO-2022-0828 GHSA-fx8w-mjvm-hvpc * GO-2023-2170 GHSA-q78c-gwqw-jcmc * GO-2023-2330 GHSA-7fxm-f474-hf8w * GO-2024-2901 GHSA-8hqg-whrw-pv92 * GO-2024-3104 GHSA-846m-99qv-67mg * GO-2024-3122 GHSA-q3hw-3gm4-w5cr * GO-2024-3140 GHSA-xxxw-3j6h-q7h6 * GO-2024-3169 GHSA-fhqq-8f65-5xfc * GO-2024-3186 GHSA-586p-749j-fhwp * GO-2024-3205 GHSA-xhr3-wf7j-h255 * GO-2024-3218 GHSA-mqr9-hjr8-2m9w * GO-2024-3245 GHSA-95j2-w8x7-hm88 * GO-2024-3248 GHSA-p26r-gfgc-c47h * GO-2024-3259 GHSA-p7mv-53f2-4cwj * GO-2024-3265 GHSA-gppm-hq3p-h4rp * GO-2024-3268 GHSA-r864-28pw-8682 * GO-2024-3279 GHSA-7225-m954-23v7 * GO-2024-3282 GHSA-r4pg-vg54-wxx4 * GO-2024-3286 GHSA-27wf-5967-98gx * GO-2024-3293 * GO-2024-3295 GHSA-55v3-xh23-96gh * GO-2024-3302 GHSA-px8v-pp82-rcvr * GO-2024-3306 GHSA-7mwh-q3xm-qh6p * GO-2024-3312 GHSA-4c49-9fpc-hc3v * GO-2024-3313 GHSA-jpmc-7p9c-4rxf * GO-2024-3314 GHSA-c2xf-9v2r-r2rx * GO-2024-3315 * GO-2024-3319 GHSA-vmg2-r3xv-r3xf * GO-2024-3321 GHSA-v778-237x-gjrc * GO-2024-3323 GHSA-25w9-wqfq-gwqx * GO-2024-3324 GHSA-4pjc-pwgq-q9jp * GO-2024-3325 GHSA-c7xh-gjv4-4jgv * GO-2024-3326 GHSA-fqj6-whhx-47p7 * GO-2024-3327 GHSA-xx68-37v4-4596 * GO-2024-3330 GHSA-7prj-hgx4-2xc3 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4433=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4433=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4433=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4433=1 ## Package List: * openSUSE Leap 15.5 (noarch) * govulncheck-vulndb-0.0.20241218T202206-150000.1.23.1 * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20241218T202206-150000.1.23.1 * SUSE Package Hub 15 15-SP5 (noarch) * govulncheck-vulndb-0.0.20241218T202206-150000.1.23.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20241218T202206-150000.1.23.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 30 12:30:14 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 30 Dec 2024 12:30:14 -0000 Subject: SUSE-SU-2024:4432-1: moderate: Security update for poppler Message-ID: <173556181470.13579.12484615695757263667@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:4432-1 Release Date: 2024-12-30T08:23:36Z Rating: moderate References: * bsc#1234795 Cross-References: * CVE-2024-56378 CVSS scores: * CVE-2024-56378 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56378 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-56378 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-56378: Fixed out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc (bsc#1234795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4432=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.35.1 * poppler-debugsource-0.79.0-150200.3.35.1 * libpoppler89-0.79.0-150200.3.35.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56378.html * https://bugzilla.suse.com/show_bug.cgi?id=1234795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 30 16:30:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 30 Dec 2024 16:30:22 -0000 Subject: SUSE-SU-2024:4436-1: moderate: Security update for grpc Message-ID: <173557622287.14908.6277306743303844039@smelt2.prg2.suse.org> # Security update for grpc Announcement ID: SUSE-SU-2024:4436-1 Release Date: 2024-12-30T13:23:26Z Rating: moderate References: * bsc#1228919 * bsc#1233821 Cross-References: * CVE-2024-11407 * CVE-2024-7246 CVSS scores: * CVE-2024-11407 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-11407 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2024-11407 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green * CVE-2024-7246 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L * CVE-2024-7246 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for grpc fixes the following issues: * CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919) * CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-4436=1 openSUSE-SLE-15.5-2024-4436=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4436=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4436=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * grpc-devel-1.60.0-150500.11.8.1 * libupb37-1.60.0-150500.11.8.1 * libgrpc++1_60-1.60.0-150500.11.8.1 * libgrpc++1_60-debuginfo-1.60.0-150500.11.8.1 * libgrpc37-debuginfo-1.60.0-150500.11.8.1 * libgrpc1_60-1.60.0-150500.11.8.1 * upb-devel-1.60.0-150500.11.8.1 * libgrpc1_60-debuginfo-1.60.0-150500.11.8.1 * libupb37-debuginfo-1.60.0-150500.11.8.1 * grpc-devel-debuginfo-1.60.0-150500.11.8.1 * grpc-debuginfo-1.60.0-150500.11.8.1 * libgrpc37-1.60.0-150500.11.8.1 * grpc-debugsource-1.60.0-150500.11.8.1 * openSUSE Leap 15.5 (noarch) * grpc-source-1.60.0-150500.11.8.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * grpc-devel-1.60.0-150500.11.8.1 * libupb37-1.60.0-150500.11.8.1 * libgrpc++1_60-1.60.0-150500.11.8.1 * libgrpc++1_60-debuginfo-1.60.0-150500.11.8.1 * libgrpc37-debuginfo-1.60.0-150500.11.8.1 * libgrpc1_60-1.60.0-150500.11.8.1 * libgrpc1_60-debuginfo-1.60.0-150500.11.8.1 * libupb37-debuginfo-1.60.0-150500.11.8.1 * grpc-debuginfo-1.60.0-150500.11.8.1 * libgrpc37-1.60.0-150500.11.8.1 * grpc-debugsource-1.60.0-150500.11.8.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libupb37-1.60.0-150500.11.8.1 * libgrpc37-debuginfo-1.60.0-150500.11.8.1 * libgrpc1_60-1.60.0-150500.11.8.1 * libgrpc1_60-debuginfo-1.60.0-150500.11.8.1 * libupb37-debuginfo-1.60.0-150500.11.8.1 * grpc-debuginfo-1.60.0-150500.11.8.1 * libgrpc37-1.60.0-150500.11.8.1 * grpc-debugsource-1.60.0-150500.11.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11407.html * https://www.suse.com/security/cve/CVE-2024-7246.html * https://bugzilla.suse.com/show_bug.cgi?id=1228919 * https://bugzilla.suse.com/show_bug.cgi?id=1233821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Dec 30 16:30:26 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 30 Dec 2024 16:30:26 -0000 Subject: SUSE-SU-2024:4435-1: moderate: Security update for poppler Message-ID: <173557622642.14908.16185915144563762459@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2024:4435-1 Release Date: 2024-12-30T13:23:04Z Rating: moderate References: * bsc#1234795 Cross-References: * CVE-2024-56378 CVSS scores: * CVE-2024-56378 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56378 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2024-56378 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2024-56378: out-of-bounds read within JBIG2Bitmap::combine, which can lead to an application crash. (bsc#1234795) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-4435=1 SUSE-2024-4435=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4435=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4435=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-qt5-1-debuginfo-24.03.0-150600.3.5.1 * libpoppler-devel-24.03.0-150600.3.5.1 * libpoppler-qt5-devel-24.03.0-150600.3.5.1 * libpoppler-qt6-devel-24.03.0-150600.3.5.1 * libpoppler-qt6-3-24.03.0-150600.3.5.1 * libpoppler-glib8-24.03.0-150600.3.5.1 * libpoppler-qt5-1-24.03.0-150600.3.5.1 * poppler-tools-24.03.0-150600.3.5.1 * poppler-qt5-debugsource-24.03.0-150600.3.5.1 * libpoppler135-24.03.0-150600.3.5.1 * poppler-tools-debuginfo-24.03.0-150600.3.5.1 * poppler-qt6-debugsource-24.03.0-150600.3.5.1 * poppler-debugsource-24.03.0-150600.3.5.1 * libpoppler-cpp0-24.03.0-150600.3.5.1 * libpoppler-glib-devel-24.03.0-150600.3.5.1 * libpoppler-cpp0-debuginfo-24.03.0-150600.3.5.1 * typelib-1_0-Poppler-0_18-24.03.0-150600.3.5.1 * libpoppler135-debuginfo-24.03.0-150600.3.5.1 * libpoppler-qt6-3-debuginfo-24.03.0-150600.3.5.1 * libpoppler-glib8-debuginfo-24.03.0-150600.3.5.1 * openSUSE Leap 15.6 (x86_64) * libpoppler135-32bit-24.03.0-150600.3.5.1 * libpoppler135-32bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler-qt5-1-32bit-24.03.0-150600.3.5.1 * libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler-cpp0-32bit-24.03.0-150600.3.5.1 * libpoppler-qt5-1-32bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler-glib8-32bit-24.03.0-150600.3.5.1 * libpoppler-cpp0-32bit-debuginfo-24.03.0-150600.3.5.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpoppler-glib8-64bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler-cpp0-64bit-24.03.0-150600.3.5.1 * libpoppler-cpp0-64bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler135-64bit-24.03.0-150600.3.5.1 * libpoppler135-64bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler-qt5-1-64bit-24.03.0-150600.3.5.1 * libpoppler-qt5-1-64bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler-glib8-64bit-24.03.0-150600.3.5.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpoppler-devel-24.03.0-150600.3.5.1 * poppler-tools-24.03.0-150600.3.5.1 * libpoppler-glib8-24.03.0-150600.3.5.1 * poppler-tools-debuginfo-24.03.0-150600.3.5.1 * libpoppler135-24.03.0-150600.3.5.1 * poppler-debugsource-24.03.0-150600.3.5.1 * libpoppler-cpp0-24.03.0-150600.3.5.1 * libpoppler-glib-devel-24.03.0-150600.3.5.1 * libpoppler-cpp0-debuginfo-24.03.0-150600.3.5.1 * typelib-1_0-Poppler-0_18-24.03.0-150600.3.5.1 * libpoppler135-debuginfo-24.03.0-150600.3.5.1 * libpoppler-glib8-debuginfo-24.03.0-150600.3.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libpoppler-qt5-1-debuginfo-24.03.0-150600.3.5.1 * libpoppler-devel-24.03.0-150600.3.5.1 * libpoppler-qt5-devel-24.03.0-150600.3.5.1 * libpoppler-qt6-devel-24.03.0-150600.3.5.1 * libpoppler-qt6-3-24.03.0-150600.3.5.1 * libpoppler-qt5-1-24.03.0-150600.3.5.1 * poppler-qt6-debugsource-24.03.0-150600.3.5.1 * poppler-debugsource-24.03.0-150600.3.5.1 * libpoppler-cpp0-24.03.0-150600.3.5.1 * libpoppler-cpp0-debuginfo-24.03.0-150600.3.5.1 * libpoppler-qt6-3-debuginfo-24.03.0-150600.3.5.1 * poppler-qt5-debugsource-24.03.0-150600.3.5.1 * SUSE Package Hub 15 15-SP6 (x86_64) * libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.5.1 * libpoppler135-32bit-24.03.0-150600.3.5.1 * libpoppler-glib8-32bit-24.03.0-150600.3.5.1 * libpoppler135-32bit-debuginfo-24.03.0-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56378.html * https://bugzilla.suse.com/show_bug.cgi?id=1234795 -------------- next part -------------- An HTML attachment was scrubbed... URL: