SUSE-SU-2024:4367-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Dec 17 20:31:07 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:4367-1  
Release Date: 2024-12-17T17:59:55Z  
Rating: important  
References:

  * bsc#1082555
  * bsc#1157160
  * bsc#1218644
  * bsc#1221977
  * bsc#1222364
  * bsc#1222413
  * bsc#1223044
  * bsc#1223057
  * bsc#1223769
  * bsc#1224526
  * bsc#1225730
  * bsc#1225742
  * bsc#1225764
  * bsc#1228015
  * bsc#1228650
  * bsc#1228708
  * bsc#1228779
  * bsc#1230231
  * bsc#1230429
  * bsc#1230766
  * bsc#1230773
  * bsc#1230784
  * bsc#1230827
  * bsc#1231184
  * bsc#1231439
  * bsc#1231904
  * bsc#1231920
  * bsc#1231930
  * bsc#1232157
  * bsc#1232159
  * bsc#1232165
  * bsc#1232198
  * bsc#1232201
  * bsc#1232224
  * bsc#1232251
  * bsc#1232272
  * bsc#1232329
  * bsc#1232371
  * bsc#1232436
  * bsc#1232507
  * bsc#1232520
  * bsc#1232552
  * bsc#1232873
  * bsc#1232887
  * bsc#1232888
  * bsc#1232897
  * bsc#1232919
  * bsc#1232928
  * bsc#1233049
  * bsc#1233051
  * bsc#1233057
  * bsc#1233063
  * bsc#1233070
  * bsc#1233097
  * bsc#1233103
  * bsc#1233108
  * bsc#1233111
  * bsc#1233123
  * bsc#1233130
  * bsc#1233191
  * bsc#1233211
  * bsc#1233212
  * bsc#1233216
  * bsc#1233453
  * bsc#1233454
  * bsc#1233456
  * bsc#1233462
  * bsc#1233467
  * bsc#1233468
  * bsc#1233478
  * bsc#1233479
  * bsc#1233485
  * bsc#1233490
  * bsc#1233491
  * bsc#1233552
  * bsc#1233555
  * bsc#1233557
  * bsc#1233560
  * bsc#1233577
  * bsc#1233580
  * bsc#1234025
  * bsc#1234072
  * bsc#1234087

  
Cross-References:

  * CVE-2021-47162
  * CVE-2022-48853
  * CVE-2024-26801
  * CVE-2024-26852
  * CVE-2024-26886
  * CVE-2024-27051
  * CVE-2024-35937
  * CVE-2024-36886
  * CVE-2024-36905
  * CVE-2024-36954
  * CVE-2024-42098
  * CVE-2024-42131
  * CVE-2024-42229
  * CVE-2024-44995
  * CVE-2024-45016
  * CVE-2024-46771
  * CVE-2024-46777
  * CVE-2024-46800
  * CVE-2024-47660
  * CVE-2024-47679
  * CVE-2024-47701
  * CVE-2024-49858
  * CVE-2024-49868
  * CVE-2024-49884
  * CVE-2024-49921
  * CVE-2024-49925
  * CVE-2024-49938
  * CVE-2024-49945
  * CVE-2024-49950
  * CVE-2024-49952
  * CVE-2024-50044
  * CVE-2024-50055
  * CVE-2024-50073
  * CVE-2024-50074
  * CVE-2024-50095
  * CVE-2024-50099
  * CVE-2024-50115
  * CVE-2024-50117
  * CVE-2024-50125
  * CVE-2024-50135
  * CVE-2024-50148
  * CVE-2024-50150
  * CVE-2024-50154
  * CVE-2024-50167
  * CVE-2024-50171
  * CVE-2024-50179
  * CVE-2024-50183
  * CVE-2024-50187
  * CVE-2024-50194
  * CVE-2024-50195
  * CVE-2024-50210
  * CVE-2024-50218
  * CVE-2024-50234
  * CVE-2024-50236
  * CVE-2024-50237
  * CVE-2024-50264
  * CVE-2024-50265
  * CVE-2024-50267
  * CVE-2024-50273
  * CVE-2024-50278
  * CVE-2024-50279
  * CVE-2024-50289
  * CVE-2024-50290
  * CVE-2024-50296
  * CVE-2024-50301
  * CVE-2024-50302
  * CVE-2024-53058
  * CVE-2024-53061
  * CVE-2024-53063
  * CVE-2024-53066
  * CVE-2024-53085
  * CVE-2024-53088
  * CVE-2024-53104
  * CVE-2024-53114
  * CVE-2024-53142

  
CVSS scores:

  * CVE-2021-47162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48853 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26801 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26852 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26852 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26886 ( NVD ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27051 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-35937 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-36886 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36886 ( NVD ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36905 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36954 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42131 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42229 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-42229 ( NVD ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44995 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-45016 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-45016 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46771 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46777 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46800 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-47660 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-47660 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-47660 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47679 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47679 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47679 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47701 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47701 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47701 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49858 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49858 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-49858 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49868 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49868 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49921 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49921 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49921 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49925 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49925 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49938 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49938 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49945 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49952 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49952 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50044 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50055 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50073 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50074 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50115 ( SUSE ):  4.5
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
  * CVE-2024-50115 ( SUSE ):  7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
  * CVE-2024-50115 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50117 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50117 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50117 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50125 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50125 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50125 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50135 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50135 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50135 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50148 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50148 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50148 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50150 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50150 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50150 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50154 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50154 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50167 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50171 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50171 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-50171 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50179 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50183 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50183 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50183 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50187 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50187 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50194 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50195 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50210 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50210 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50210 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50234 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50234 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50236 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-50236 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50237 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50264 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50264 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50265 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50265 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50267 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50267 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50273 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50273 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50278 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
  * CVE-2024-50278 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50279 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-50279 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-50290 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50296 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50301 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50301 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50302 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53058 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53061 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53061 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53063 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53066 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53088 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-53088 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53104 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53114 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53114 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53142 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-53142 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Availability Extension 12 SP5
  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 75 vulnerabilities and has eight security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2022-48853: swiotlb: fix info leak with DMA_FROM_DEVICE (bsc#1228015).
  * CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset
    (bsc#1222413).
  * CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
    (bsc#1223057).
  * CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
  * CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for
    cpufreq_cpu_get's return value (bsc#1223769).
  * CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
    (bsc#1224526).
  * CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
    (bsc#1225742).
  * CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
  * CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use
    (bsc#1228708).
  * CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
    resetting (bsc#1230231).
  * CVE-2024-45016: netem: fix return value if duplicate enqueue fails
    (bsc#1230429).
  * CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered
    (bsc#1230766).
  * CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
  * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
    (bsc#1230827).
  * CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
  * CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
    (bsc#1231930).
  * CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
    the filesystem (bsc#1231920).
  * CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid
    corruption (bsc#1232251).
  * CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
    new trasacntion (bsc#1232272).
  * CVE-2024-49921: drm/amd/display: Check null pointers before used
    (bsc#1232371).
  * CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
    (bsc#1232224)
  * CVE-2024-49938: wifi: ath9k_htc: Use __skb_set_length() for resetting urb
    before resubmit (bsc#1232552).
  * CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
    associated structure (bsc#1232165).
  * CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
  * CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
    (bsc#1232157).
  * CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in
    rfcomm_sk_state_change (bsc#1231904).
  * CVE-2024-50055: driver core: bus: Fix double free in driver API
    bus_register() (bsc#1232329).
  * CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
    (bsc#1232520).
  * CVE-2024-50074: parport: Proper fix for array out-of-bounds access
    (bsc#1232507).
  * CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent
    (bsc#1232873).
  * CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
    (bsc#1232919).
  * CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method
    (bsc#1232897).
  * CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
  * CVE-2024-50135: nvme-pci: fix race condition between reset and
    nvme_dev_disable() (bsc#1232888).
  * CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister
    (bsc#1233063).
  * CVE-2024-50150: usb: typec: altmode should keep reference to parent
    (bsc#1233051).
  * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
    (bsc#1233070).
  * CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
    (bsc#1233049).
  * CVE-2024-50171: net: systemport: fix potential memory leak in
    bcm_sysport_xmit() (bsc#1233057).
  * CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting
    an NPIV instance (bsc#1233130).
  * CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed
    (bsc#1233108).
  * CVE-2024-50195: posix-clock: Fix missing timespec64 check in
    pc_clock_settime() (bsc#1233103).
  * CVE-2024-50218: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
    (bsc#1233191).
  * CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming
    device (bsc#1233211).
  * CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx
    (bsc#1233212).
  * CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in
    .get_txpower (bsc#1233216).
  * CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
    occurring in vsk->trans (bsc#1233453).
  * CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in
    ocfs2_xa_remove() (bsc#1233454).
  * CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
    (bsc#1233456).
  * CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
    the list (bsc#1233462).
  * CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first
    resume (bsc#1233467).
  * CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
    resizing (bsc#1233468).
  * CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
  * CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus
    (bsc#1233479).
  * CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
    (bsc#1233485).
  * CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
    (bsc#1233490).
  * CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
  * CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
    SKB data (bsc#1233552).
  * CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
  * CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
    (bsc#1233557).
  * CVE-2024-53066: nfs: Fix KMSAN warning in decode_getfattr_attrs()
    (bsc#1233560).
  * CVE-2024-53085: tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555
    bsc#1233577).
  * CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
    sync state (bsc#1233580).
  * CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
    UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
  * CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client
    (bsc#1234072).

The following non-security bugs were fixed:

  * drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108).
  * initramfs: avoid filename buffer overrun (bsc#1232436).
  * kernel-binary: Enable livepatch package only when livepatch is enabled
    (bsc#1218644).
  * lpfc: size cpu map by last cpu id set (bsc#1157160).
  * net: relax socket state check at accept time (git-fixes).
  * ocfs2: uncache inode which has failed entering the group (bsc#1234087).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4367=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4367=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4367=1

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1

  * SUSE Linux Enterprise High Availability Extension 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1

## Package List:

  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.237.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kernel-default-kgraft-4.12.14-122.237.1
    * kernel-default-debuginfo-4.12.14-122.237.1
    * kernel-default-kgraft-devel-4.12.14-122.237.1
    * kernel-default-debugsource-4.12.14-122.237.1
    * kgraft-patch-4_12_14-122_237-default-1-8.3.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * kernel-syms-4.12.14-122.237.1
    * kernel-default-devel-4.12.14-122.237.1
    * kernel-default-base-4.12.14-122.237.1
    * kernel-default-debuginfo-4.12.14-122.237.1
    * kernel-default-debugsource-4.12.14-122.237.1
    * kernel-default-base-debuginfo-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * kernel-devel-4.12.14-122.237.1
    * kernel-source-4.12.14-122.237.1
    * kernel-macros-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
    * kernel-default-man-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
    * kernel-default-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * kernel-syms-4.12.14-122.237.1
    * kernel-default-devel-debuginfo-4.12.14-122.237.1
    * kernel-default-devel-4.12.14-122.237.1
    * kernel-default-base-4.12.14-122.237.1
    * kernel-default-debuginfo-4.12.14-122.237.1
    * kernel-default-debugsource-4.12.14-122.237.1
    * kernel-default-base-debuginfo-4.12.14-122.237.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * kernel-devel-4.12.14-122.237.1
    * kernel-source-4.12.14-122.237.1
    * kernel-macros-4.12.14-122.237.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * gfs2-kmp-default-4.12.14-122.237.1
    * ocfs2-kmp-default-4.12.14-122.237.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.237.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.237.1
    * dlm-kmp-default-4.12.14-122.237.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.237.1
    * kernel-default-debuginfo-4.12.14-122.237.1
    * dlm-kmp-default-debuginfo-4.12.14-122.237.1
    * cluster-md-kmp-default-4.12.14-122.237.1
    * kernel-default-debugsource-4.12.14-122.237.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.237.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
    x86_64)
    * gfs2-kmp-default-4.12.14-122.237.1
    * ocfs2-kmp-default-4.12.14-122.237.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.237.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.237.1
    * dlm-kmp-default-4.12.14-122.237.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.237.1
    * kernel-default-debuginfo-4.12.14-122.237.1
    * dlm-kmp-default-debuginfo-4.12.14-122.237.1
    * cluster-md-kmp-default-4.12.14-122.237.1
    * kernel-default-debugsource-4.12.14-122.237.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.237.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-47162.html
  * https://www.suse.com/security/cve/CVE-2022-48853.html
  * https://www.suse.com/security/cve/CVE-2024-26801.html
  * https://www.suse.com/security/cve/CVE-2024-26852.html
  * https://www.suse.com/security/cve/CVE-2024-26886.html
  * https://www.suse.com/security/cve/CVE-2024-27051.html
  * https://www.suse.com/security/cve/CVE-2024-35937.html
  * https://www.suse.com/security/cve/CVE-2024-36886.html
  * https://www.suse.com/security/cve/CVE-2024-36905.html
  * https://www.suse.com/security/cve/CVE-2024-36954.html
  * https://www.suse.com/security/cve/CVE-2024-42098.html
  * https://www.suse.com/security/cve/CVE-2024-42131.html
  * https://www.suse.com/security/cve/CVE-2024-42229.html
  * https://www.suse.com/security/cve/CVE-2024-44995.html
  * https://www.suse.com/security/cve/CVE-2024-45016.html
  * https://www.suse.com/security/cve/CVE-2024-46771.html
  * https://www.suse.com/security/cve/CVE-2024-46777.html
  * https://www.suse.com/security/cve/CVE-2024-46800.html
  * https://www.suse.com/security/cve/CVE-2024-47660.html
  * https://www.suse.com/security/cve/CVE-2024-47679.html
  * https://www.suse.com/security/cve/CVE-2024-47701.html
  * https://www.suse.com/security/cve/CVE-2024-49858.html
  * https://www.suse.com/security/cve/CVE-2024-49868.html
  * https://www.suse.com/security/cve/CVE-2024-49884.html
  * https://www.suse.com/security/cve/CVE-2024-49921.html
  * https://www.suse.com/security/cve/CVE-2024-49925.html
  * https://www.suse.com/security/cve/CVE-2024-49938.html
  * https://www.suse.com/security/cve/CVE-2024-49945.html
  * https://www.suse.com/security/cve/CVE-2024-49950.html
  * https://www.suse.com/security/cve/CVE-2024-49952.html
  * https://www.suse.com/security/cve/CVE-2024-50044.html
  * https://www.suse.com/security/cve/CVE-2024-50055.html
  * https://www.suse.com/security/cve/CVE-2024-50073.html
  * https://www.suse.com/security/cve/CVE-2024-50074.html
  * https://www.suse.com/security/cve/CVE-2024-50095.html
  * https://www.suse.com/security/cve/CVE-2024-50099.html
  * https://www.suse.com/security/cve/CVE-2024-50115.html
  * https://www.suse.com/security/cve/CVE-2024-50117.html
  * https://www.suse.com/security/cve/CVE-2024-50125.html
  * https://www.suse.com/security/cve/CVE-2024-50135.html
  * https://www.suse.com/security/cve/CVE-2024-50148.html
  * https://www.suse.com/security/cve/CVE-2024-50150.html
  * https://www.suse.com/security/cve/CVE-2024-50154.html
  * https://www.suse.com/security/cve/CVE-2024-50167.html
  * https://www.suse.com/security/cve/CVE-2024-50171.html
  * https://www.suse.com/security/cve/CVE-2024-50179.html
  * https://www.suse.com/security/cve/CVE-2024-50183.html
  * https://www.suse.com/security/cve/CVE-2024-50187.html
  * https://www.suse.com/security/cve/CVE-2024-50194.html
  * https://www.suse.com/security/cve/CVE-2024-50195.html
  * https://www.suse.com/security/cve/CVE-2024-50210.html
  * https://www.suse.com/security/cve/CVE-2024-50218.html
  * https://www.suse.com/security/cve/CVE-2024-50234.html
  * https://www.suse.com/security/cve/CVE-2024-50236.html
  * https://www.suse.com/security/cve/CVE-2024-50237.html
  * https://www.suse.com/security/cve/CVE-2024-50264.html
  * https://www.suse.com/security/cve/CVE-2024-50265.html
  * https://www.suse.com/security/cve/CVE-2024-50267.html
  * https://www.suse.com/security/cve/CVE-2024-50273.html
  * https://www.suse.com/security/cve/CVE-2024-50278.html
  * https://www.suse.com/security/cve/CVE-2024-50279.html
  * https://www.suse.com/security/cve/CVE-2024-50289.html
  * https://www.suse.com/security/cve/CVE-2024-50290.html
  * https://www.suse.com/security/cve/CVE-2024-50296.html
  * https://www.suse.com/security/cve/CVE-2024-50301.html
  * https://www.suse.com/security/cve/CVE-2024-50302.html
  * https://www.suse.com/security/cve/CVE-2024-53058.html
  * https://www.suse.com/security/cve/CVE-2024-53061.html
  * https://www.suse.com/security/cve/CVE-2024-53063.html
  * https://www.suse.com/security/cve/CVE-2024-53066.html
  * https://www.suse.com/security/cve/CVE-2024-53085.html
  * https://www.suse.com/security/cve/CVE-2024-53088.html
  * https://www.suse.com/security/cve/CVE-2024-53104.html
  * https://www.suse.com/security/cve/CVE-2024-53114.html
  * https://www.suse.com/security/cve/CVE-2024-53142.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1082555
  * https://bugzilla.suse.com/show_bug.cgi?id=1157160
  * https://bugzilla.suse.com/show_bug.cgi?id=1218644
  * https://bugzilla.suse.com/show_bug.cgi?id=1221977
  * https://bugzilla.suse.com/show_bug.cgi?id=1222364
  * https://bugzilla.suse.com/show_bug.cgi?id=1222413
  * https://bugzilla.suse.com/show_bug.cgi?id=1223044
  * https://bugzilla.suse.com/show_bug.cgi?id=1223057
  * https://bugzilla.suse.com/show_bug.cgi?id=1223769
  * https://bugzilla.suse.com/show_bug.cgi?id=1224526
  * https://bugzilla.suse.com/show_bug.cgi?id=1225730
  * https://bugzilla.suse.com/show_bug.cgi?id=1225742
  * https://bugzilla.suse.com/show_bug.cgi?id=1225764
  * https://bugzilla.suse.com/show_bug.cgi?id=1228015
  * https://bugzilla.suse.com/show_bug.cgi?id=1228650
  * https://bugzilla.suse.com/show_bug.cgi?id=1228708
  * https://bugzilla.suse.com/show_bug.cgi?id=1228779
  * https://bugzilla.suse.com/show_bug.cgi?id=1230231
  * https://bugzilla.suse.com/show_bug.cgi?id=1230429
  * https://bugzilla.suse.com/show_bug.cgi?id=1230766
  * https://bugzilla.suse.com/show_bug.cgi?id=1230773
  * https://bugzilla.suse.com/show_bug.cgi?id=1230784
  * https://bugzilla.suse.com/show_bug.cgi?id=1230827
  * https://bugzilla.suse.com/show_bug.cgi?id=1231184
  * https://bugzilla.suse.com/show_bug.cgi?id=1231439
  * https://bugzilla.suse.com/show_bug.cgi?id=1231904
  * https://bugzilla.suse.com/show_bug.cgi?id=1231920
  * https://bugzilla.suse.com/show_bug.cgi?id=1231930
  * https://bugzilla.suse.com/show_bug.cgi?id=1232157
  * https://bugzilla.suse.com/show_bug.cgi?id=1232159
  * https://bugzilla.suse.com/show_bug.cgi?id=1232165
  * https://bugzilla.suse.com/show_bug.cgi?id=1232198
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232224
  * https://bugzilla.suse.com/show_bug.cgi?id=1232251
  * https://bugzilla.suse.com/show_bug.cgi?id=1232272
  * https://bugzilla.suse.com/show_bug.cgi?id=1232329
  * https://bugzilla.suse.com/show_bug.cgi?id=1232371
  * https://bugzilla.suse.com/show_bug.cgi?id=1232436
  * https://bugzilla.suse.com/show_bug.cgi?id=1232507
  * https://bugzilla.suse.com/show_bug.cgi?id=1232520
  * https://bugzilla.suse.com/show_bug.cgi?id=1232552
  * https://bugzilla.suse.com/show_bug.cgi?id=1232873
  * https://bugzilla.suse.com/show_bug.cgi?id=1232887
  * https://bugzilla.suse.com/show_bug.cgi?id=1232888
  * https://bugzilla.suse.com/show_bug.cgi?id=1232897
  * https://bugzilla.suse.com/show_bug.cgi?id=1232919
  * https://bugzilla.suse.com/show_bug.cgi?id=1232928
  * https://bugzilla.suse.com/show_bug.cgi?id=1233049
  * https://bugzilla.suse.com/show_bug.cgi?id=1233051
  * https://bugzilla.suse.com/show_bug.cgi?id=1233057
  * https://bugzilla.suse.com/show_bug.cgi?id=1233063
  * https://bugzilla.suse.com/show_bug.cgi?id=1233070
  * https://bugzilla.suse.com/show_bug.cgi?id=1233097
  * https://bugzilla.suse.com/show_bug.cgi?id=1233103
  * https://bugzilla.suse.com/show_bug.cgi?id=1233108
  * https://bugzilla.suse.com/show_bug.cgi?id=1233111
  * https://bugzilla.suse.com/show_bug.cgi?id=1233123
  * https://bugzilla.suse.com/show_bug.cgi?id=1233130
  * https://bugzilla.suse.com/show_bug.cgi?id=1233191
  * https://bugzilla.suse.com/show_bug.cgi?id=1233211
  * https://bugzilla.suse.com/show_bug.cgi?id=1233212
  * https://bugzilla.suse.com/show_bug.cgi?id=1233216
  * https://bugzilla.suse.com/show_bug.cgi?id=1233453
  * https://bugzilla.suse.com/show_bug.cgi?id=1233454
  * https://bugzilla.suse.com/show_bug.cgi?id=1233456
  * https://bugzilla.suse.com/show_bug.cgi?id=1233462
  * https://bugzilla.suse.com/show_bug.cgi?id=1233467
  * https://bugzilla.suse.com/show_bug.cgi?id=1233468
  * https://bugzilla.suse.com/show_bug.cgi?id=1233478
  * https://bugzilla.suse.com/show_bug.cgi?id=1233479
  * https://bugzilla.suse.com/show_bug.cgi?id=1233485
  * https://bugzilla.suse.com/show_bug.cgi?id=1233490
  * https://bugzilla.suse.com/show_bug.cgi?id=1233491
  * https://bugzilla.suse.com/show_bug.cgi?id=1233552
  * https://bugzilla.suse.com/show_bug.cgi?id=1233555
  * https://bugzilla.suse.com/show_bug.cgi?id=1233557
  * https://bugzilla.suse.com/show_bug.cgi?id=1233560
  * https://bugzilla.suse.com/show_bug.cgi?id=1233577
  * https://bugzilla.suse.com/show_bug.cgi?id=1233580
  * https://bugzilla.suse.com/show_bug.cgi?id=1234025
  * https://bugzilla.suse.com/show_bug.cgi?id=1234072
  * https://bugzilla.suse.com/show_bug.cgi?id=1234087

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20241217/8e335f9b/attachment.htm>


More information about the sle-security-updates mailing list