SUSE-SU-2024:2010-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Wed Jun 12 20:32:08 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2010-1
Rating: important
References:
* bsc#1065729
* bsc#1151927
* bsc#1152472
* bsc#1154353
* bsc#1156395
* bsc#1174585
* bsc#1176447
* bsc#1176774
* bsc#1176869
* bsc#1178134
* bsc#1181147
* bsc#1184631
* bsc#1185589
* bsc#1185902
* bsc#1186885
* bsc#1188616
* bsc#1188772
* bsc#1189883
* bsc#1190795
* bsc#1191452
* bsc#1192107
* bsc#1194288
* bsc#1194591
* bsc#1196956
* bsc#1197760
* bsc#1198029
* bsc#1199304
* bsc#1200619
* bsc#1203389
* bsc#1206646
* bsc#1209657
* bsc#1210335
* bsc#1210629
* bsc#1213476
* bsc#1215420
* bsc#1216702
* bsc#1217169
* bsc#1220137
* bsc#1220144
* bsc#1220754
* bsc#1220877
* bsc#1220960
* bsc#1221044
* bsc#1221113
* bsc#1221829
* bsc#1222251
* bsc#1222619
* bsc#1222838
* bsc#1222867
* bsc#1223084
* bsc#1223138
* bsc#1223384
* bsc#1223390
* bsc#1223512
* bsc#1223626
* bsc#1223715
* bsc#1223932
* bsc#1223934
* bsc#1224099
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224511
* bsc#1224592
* bsc#1224816
* bsc#1224826
* bsc#1224830
* bsc#1224831
* bsc#1224832
* bsc#1224834
* bsc#1224841
* bsc#1224842
* bsc#1224843
* bsc#1224844
* bsc#1224846
* bsc#1224849
* bsc#1224852
* bsc#1224853
* bsc#1224854
* bsc#1224859
* bsc#1224882
* bsc#1224886
* bsc#1224888
* bsc#1224889
* bsc#1224891
* bsc#1224892
* bsc#1224893
* bsc#1224899
* bsc#1224904
* bsc#1224907
* bsc#1224909
* bsc#1224916
* bsc#1224917
* bsc#1224922
* bsc#1224923
* bsc#1224924
* bsc#1224926
* bsc#1224928
* bsc#1224953
* bsc#1224954
* bsc#1224955
* bsc#1224957
* bsc#1224961
* bsc#1224963
* bsc#1224965
* bsc#1224966
* bsc#1224968
* bsc#1224981
* bsc#1224982
* bsc#1224983
* bsc#1224984
* bsc#1224987
* bsc#1224990
* bsc#1224993
* bsc#1224996
* bsc#1224997
* bsc#1225026
* bsc#1225030
* bsc#1225058
* bsc#1225060
* bsc#1225083
* bsc#1225084
* bsc#1225091
* bsc#1225112
* bsc#1225113
* bsc#1225128
* bsc#1225140
* bsc#1225143
* bsc#1225148
* bsc#1225155
* bsc#1225164
* bsc#1225177
* bsc#1225178
* bsc#1225181
* bsc#1225192
* bsc#1225193
* bsc#1225198
* bsc#1225201
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225230
* bsc#1225232
* bsc#1225233
* bsc#1225237
* bsc#1225238
* bsc#1225243
* bsc#1225244
* bsc#1225247
* bsc#1225251
* bsc#1225252
* bsc#1225256
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225301
* bsc#1225303
* bsc#1225316
* bsc#1225318
* bsc#1225320
* bsc#1225321
* bsc#1225322
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225330
* bsc#1225333
* bsc#1225336
* bsc#1225341
* bsc#1225346
* bsc#1225351
* bsc#1225354
* bsc#1225355
* bsc#1225357
* bsc#1225358
* bsc#1225360
* bsc#1225361
* bsc#1225366
* bsc#1225367
* bsc#1225369
* bsc#1225370
* bsc#1225372
* bsc#1225374
* bsc#1225384
* bsc#1225386
* bsc#1225387
* bsc#1225390
* bsc#1225393
* bsc#1225400
* bsc#1225404
* bsc#1225405
* bsc#1225409
* bsc#1225411
* bsc#1225424
* bsc#1225427
* bsc#1225435
* bsc#1225437
* bsc#1225438
* bsc#1225439
* bsc#1225446
* bsc#1225447
* bsc#1225448
* bsc#1225450
* bsc#1225453
* bsc#1225455
* bsc#1225468
* bsc#1225499
* bsc#1225500
* bsc#1225508
* bsc#1225534
Cross-References:
* CVE-2020-36788
* CVE-2021-3743
* CVE-2021-39698
* CVE-2021-43056
* CVE-2021-47104
* CVE-2021-47192
* CVE-2021-47200
* CVE-2021-47220
* CVE-2021-47227
* CVE-2021-47228
* CVE-2021-47229
* CVE-2021-47230
* CVE-2021-47231
* CVE-2021-47235
* CVE-2021-47236
* CVE-2021-47237
* CVE-2021-47239
* CVE-2021-47240
* CVE-2021-47241
* CVE-2021-47246
* CVE-2021-47252
* CVE-2021-47253
* CVE-2021-47254
* CVE-2021-47255
* CVE-2021-47258
* CVE-2021-47259
* CVE-2021-47260
* CVE-2021-47261
* CVE-2021-47263
* CVE-2021-47265
* CVE-2021-47267
* CVE-2021-47269
* CVE-2021-47270
* CVE-2021-47274
* CVE-2021-47275
* CVE-2021-47276
* CVE-2021-47280
* CVE-2021-47281
* CVE-2021-47284
* CVE-2021-47285
* CVE-2021-47288
* CVE-2021-47289
* CVE-2021-47296
* CVE-2021-47301
* CVE-2021-47302
* CVE-2021-47305
* CVE-2021-47307
* CVE-2021-47308
* CVE-2021-47314
* CVE-2021-47315
* CVE-2021-47320
* CVE-2021-47321
* CVE-2021-47323
* CVE-2021-47324
* CVE-2021-47329
* CVE-2021-47330
* CVE-2021-47332
* CVE-2021-47333
* CVE-2021-47334
* CVE-2021-47337
* CVE-2021-47338
* CVE-2021-47340
* CVE-2021-47341
* CVE-2021-47343
* CVE-2021-47344
* CVE-2021-47347
* CVE-2021-47348
* CVE-2021-47350
* CVE-2021-47353
* CVE-2021-47354
* CVE-2021-47356
* CVE-2021-47369
* CVE-2021-47375
* CVE-2021-47378
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47387
* CVE-2021-47388
* CVE-2021-47391
* CVE-2021-47392
* CVE-2021-47393
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47399
* CVE-2021-47402
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47409
* CVE-2021-47413
* CVE-2021-47416
* CVE-2021-47422
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47426
* CVE-2021-47428
* CVE-2021-47431
* CVE-2021-47434
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47444
* CVE-2021-47445
* CVE-2021-47451
* CVE-2021-47456
* CVE-2021-47458
* CVE-2021-47460
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47468
* CVE-2021-47473
* CVE-2021-47478
* CVE-2021-47480
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47485
* CVE-2021-47493
* CVE-2021-47494
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47498
* CVE-2021-47499
* CVE-2021-47500
* CVE-2021-47501
* CVE-2021-47502
* CVE-2021-47503
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47507
* CVE-2021-47509
* CVE-2021-47511
* CVE-2021-47512
* CVE-2021-47516
* CVE-2021-47518
* CVE-2021-47521
* CVE-2021-47522
* CVE-2021-47523
* CVE-2021-47527
* CVE-2021-47535
* CVE-2021-47536
* CVE-2021-47538
* CVE-2021-47540
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47549
* CVE-2021-47557
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47565
* CVE-2022-1195
* CVE-2022-20132
* CVE-2022-48636
* CVE-2022-48673
* CVE-2022-48704
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2176
* CVE-2023-4244
* CVE-2023-47233
* CVE-2023-52433
* CVE-2023-52581
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52686
* CVE-2023-52840
* CVE-2023-52871
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-26581
* CVE-2024-26643
* CVE-2024-26828
* CVE-2024-26921
* CVE-2024-26925
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35895
* CVE-2024-35914
CVSS scores:
* CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47329 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves 186 vulnerabilities and has 27 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225201).
* CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
* CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
(bsc#1225355).
* CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
* CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
* CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
(bsc#1225208).
* CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
* CVE-2023-52840: Fix use after free in rmi_unregister_function()
(bsc#1224928).
* CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
* CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626).
* CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
* CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
The following non-security bugs were fixed:
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* cifs: add missing spinlock around tcon refcount (bsc#1213476).
* cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
* cifs: avoid race conditions with parallel reconnects (bsc#1213476).
* cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
* cifs: avoid use of global locks for high contention data (bsc#1213476).
* cifs: check only tcon status on tcon related functions (bsc#1213476).
* cifs: do all necessary checks for credits within or before locking
(bsc#1213476).
* cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
* cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
* cifs: do not take exclusive lock for updating target hints (bsc#1213476).
* cifs: fix confusing debug message (bsc#1213476).
* cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
* cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
* cifs: fix refresh of cached referrals (bsc#1213476).
* cifs: fix return of uninitialized rc in dfs_cache_update_tgthint()
(bsc#1213476).
* cifs: fix source pathname comparison of dfs supers (bsc#1213476).
* cifs: fix status checks in cifs_tree_connect (bsc#1213476).
* cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
* cifs: get rid of dns resolve worker (bsc#1213476).
* cifs: get rid of mount options string parsing (bsc#1213476).
* cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
* cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
* cifs: match even the scope id for ipv6 addresses (bsc#1213476).
* cifs: optimize reconnect of nested links (bsc#1213476).
* cifs: prevent data race in smb2_reconnect() (bsc#1213476).
* cifs: refresh root referrals (bsc#1213476).
* cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
* cifs: remove unused function (bsc#1213476).
* cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
* cifs: return DFS root session id in DebugData (bsc#1213476).
* cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
* cifs: set correct ipc status after initial tree connect (bsc#1213476).
* cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
* cifs: set correct tcon status after initial tree connect (bsc#1213476).
* cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
* cifs: set resolved ip in sockaddr (bsc#1213476).
* cifs: share dfs connections and supers (bsc#1213476).
* cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
* cifs: use fs_context for automounts (bsc#1213476).
* cifs: use origin fullpath for automounts (bsc#1213476).
* cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
* netfilter: nf_tables: defer gc run if previous batch is still pending (git-
fixes).
* netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path (git-fixes).
* netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
* netfilter: nf_tables: fix memleak when more than 255 elements expired (git-
fixes).
* netfilter: nf_tables: GC transaction race with abort path (git-fixes).
* netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
* netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
* netfilter: nf_tables: mark set as dead when unbinding anonymous set with
timeout (git-fixes).
* netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-
fixes).
* netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
(git-fixes).
* netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
* netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
* netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-
fixes).
* netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
* netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named
sets (git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match
(git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
* netfilter: nft_set_rbtree: Do not account for expired elements on insertion
(git-fixes).
* netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on
insertion (git-fixes).
* netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
* netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
* netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap
detection (git-fixes).
* netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start()
(git-fixes).
* netfilter: nft_set_rbtree: overlap detection with element re-addition after
deletion (git-fixes).
* netfilter: nft_set_rbtree: skip elements in transaction from garbage
collection (git-fixes).
* netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
* netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
(git-fixes).
* netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
(git-fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* NFC: nxp: add NXP1002 (bsc#1185589).
* PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
* smb: client: fix dfs link mount against w2k8 (git-fixes).
* smb: client: fix null auth (bsc#1213476).
* smb: client: set correct id, uid and cruid for multiuser automounts (git-
fixes).
* x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2010=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2010=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2010=1
## Package List:
* SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
* kernel-rt-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* kernel-rt-debugsource-5.3.18-150300.172.1
* kernel-rt-debuginfo-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* kernel-source-rt-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
* kernel-rt-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* kernel-rt-debugsource-5.3.18-150300.172.1
* kernel-rt-debuginfo-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* kernel-source-rt-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
* kernel-rt-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* kernel-rt-debugsource-5.3.18-150300.172.1
* kernel-rt-debuginfo-5.3.18-150300.172.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* kernel-source-rt-5.3.18-150300.172.1
## References:
* https://www.suse.com/security/cve/CVE-2020-36788.html
* https://www.suse.com/security/cve/CVE-2021-3743.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47220.html
* https://www.suse.com/security/cve/CVE-2021-47227.html
* https://www.suse.com/security/cve/CVE-2021-47228.html
* https://www.suse.com/security/cve/CVE-2021-47229.html
* https://www.suse.com/security/cve/CVE-2021-47230.html
* https://www.suse.com/security/cve/CVE-2021-47231.html
* https://www.suse.com/security/cve/CVE-2021-47235.html
* https://www.suse.com/security/cve/CVE-2021-47236.html
* https://www.suse.com/security/cve/CVE-2021-47237.html
* https://www.suse.com/security/cve/CVE-2021-47239.html
* https://www.suse.com/security/cve/CVE-2021-47240.html
* https://www.suse.com/security/cve/CVE-2021-47241.html
* https://www.suse.com/security/cve/CVE-2021-47246.html
* https://www.suse.com/security/cve/CVE-2021-47252.html
* https://www.suse.com/security/cve/CVE-2021-47253.html
* https://www.suse.com/security/cve/CVE-2021-47254.html
* https://www.suse.com/security/cve/CVE-2021-47255.html
* https://www.suse.com/security/cve/CVE-2021-47258.html
* https://www.suse.com/security/cve/CVE-2021-47259.html
* https://www.suse.com/security/cve/CVE-2021-47260.html
* https://www.suse.com/security/cve/CVE-2021-47261.html
* https://www.suse.com/security/cve/CVE-2021-47263.html
* https://www.suse.com/security/cve/CVE-2021-47265.html
* https://www.suse.com/security/cve/CVE-2021-47267.html
* https://www.suse.com/security/cve/CVE-2021-47269.html
* https://www.suse.com/security/cve/CVE-2021-47270.html
* https://www.suse.com/security/cve/CVE-2021-47274.html
* https://www.suse.com/security/cve/CVE-2021-47275.html
* https://www.suse.com/security/cve/CVE-2021-47276.html
* https://www.suse.com/security/cve/CVE-2021-47280.html
* https://www.suse.com/security/cve/CVE-2021-47281.html
* https://www.suse.com/security/cve/CVE-2021-47284.html
* https://www.suse.com/security/cve/CVE-2021-47285.html
* https://www.suse.com/security/cve/CVE-2021-47288.html
* https://www.suse.com/security/cve/CVE-2021-47289.html
* https://www.suse.com/security/cve/CVE-2021-47296.html
* https://www.suse.com/security/cve/CVE-2021-47301.html
* https://www.suse.com/security/cve/CVE-2021-47302.html
* https://www.suse.com/security/cve/CVE-2021-47305.html
* https://www.suse.com/security/cve/CVE-2021-47307.html
* https://www.suse.com/security/cve/CVE-2021-47308.html
* https://www.suse.com/security/cve/CVE-2021-47314.html
* https://www.suse.com/security/cve/CVE-2021-47315.html
* https://www.suse.com/security/cve/CVE-2021-47320.html
* https://www.suse.com/security/cve/CVE-2021-47321.html
* https://www.suse.com/security/cve/CVE-2021-47323.html
* https://www.suse.com/security/cve/CVE-2021-47324.html
* https://www.suse.com/security/cve/CVE-2021-47329.html
* https://www.suse.com/security/cve/CVE-2021-47330.html
* https://www.suse.com/security/cve/CVE-2021-47332.html
* https://www.suse.com/security/cve/CVE-2021-47333.html
* https://www.suse.com/security/cve/CVE-2021-47334.html
* https://www.suse.com/security/cve/CVE-2021-47337.html
* https://www.suse.com/security/cve/CVE-2021-47338.html
* https://www.suse.com/security/cve/CVE-2021-47340.html
* https://www.suse.com/security/cve/CVE-2021-47341.html
* https://www.suse.com/security/cve/CVE-2021-47343.html
* https://www.suse.com/security/cve/CVE-2021-47344.html
* https://www.suse.com/security/cve/CVE-2021-47347.html
* https://www.suse.com/security/cve/CVE-2021-47348.html
* https://www.suse.com/security/cve/CVE-2021-47350.html
* https://www.suse.com/security/cve/CVE-2021-47353.html
* https://www.suse.com/security/cve/CVE-2021-47354.html
* https://www.suse.com/security/cve/CVE-2021-47356.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47387.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47392.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47413.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47422.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47426.html
* https://www.suse.com/security/cve/CVE-2021-47428.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47444.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47451.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47493.html
* https://www.suse.com/security/cve/CVE-2021-47494.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47498.html
* https://www.suse.com/security/cve/CVE-2021-47499.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47501.html
* https://www.suse.com/security/cve/CVE-2021-47502.html
* https://www.suse.com/security/cve/CVE-2021-47503.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47507.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47512.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47518.html
* https://www.suse.com/security/cve/CVE-2021-47521.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47535.html
* https://www.suse.com/security/cve/CVE-2021-47536.html
* https://www.suse.com/security/cve/CVE-2021-47538.html
* https://www.suse.com/security/cve/CVE-2021-47540.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47549.html
* https://www.suse.com/security/cve/CVE-2021-47557.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-1195.html
* https://www.suse.com/security/cve/CVE-2022-20132.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-4244.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52433.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-26581.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1151927
* https://bugzilla.suse.com/show_bug.cgi?id=1152472
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1156395
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1176447
* https://bugzilla.suse.com/show_bug.cgi?id=1176774
* https://bugzilla.suse.com/show_bug.cgi?id=1176869
* https://bugzilla.suse.com/show_bug.cgi?id=1178134
* https://bugzilla.suse.com/show_bug.cgi?id=1181147
* https://bugzilla.suse.com/show_bug.cgi?id=1184631
* https://bugzilla.suse.com/show_bug.cgi?id=1185589
* https://bugzilla.suse.com/show_bug.cgi?id=1185902
* https://bugzilla.suse.com/show_bug.cgi?id=1186885
* https://bugzilla.suse.com/show_bug.cgi?id=1188616
* https://bugzilla.suse.com/show_bug.cgi?id=1188772
* https://bugzilla.suse.com/show_bug.cgi?id=1189883
* https://bugzilla.suse.com/show_bug.cgi?id=1190795
* https://bugzilla.suse.com/show_bug.cgi?id=1191452
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1194591
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1197760
* https://bugzilla.suse.com/show_bug.cgi?id=1198029
* https://bugzilla.suse.com/show_bug.cgi?id=1199304
* https://bugzilla.suse.com/show_bug.cgi?id=1200619
* https://bugzilla.suse.com/show_bug.cgi?id=1203389
* https://bugzilla.suse.com/show_bug.cgi?id=1206646
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1213476
* https://bugzilla.suse.com/show_bug.cgi?id=1215420
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1220137
* https://bugzilla.suse.com/show_bug.cgi?id=1220144
* https://bugzilla.suse.com/show_bug.cgi?id=1220754
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221113
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1222251
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224816
* https://bugzilla.suse.com/show_bug.cgi?id=1224826
* https://bugzilla.suse.com/show_bug.cgi?id=1224830
* https://bugzilla.suse.com/show_bug.cgi?id=1224831
* https://bugzilla.suse.com/show_bug.cgi?id=1224832
* https://bugzilla.suse.com/show_bug.cgi?id=1224834
* https://bugzilla.suse.com/show_bug.cgi?id=1224841
* https://bugzilla.suse.com/show_bug.cgi?id=1224842
* https://bugzilla.suse.com/show_bug.cgi?id=1224843
* https://bugzilla.suse.com/show_bug.cgi?id=1224844
* https://bugzilla.suse.com/show_bug.cgi?id=1224846
* https://bugzilla.suse.com/show_bug.cgi?id=1224849
* https://bugzilla.suse.com/show_bug.cgi?id=1224852
* https://bugzilla.suse.com/show_bug.cgi?id=1224853
* https://bugzilla.suse.com/show_bug.cgi?id=1224854
* https://bugzilla.suse.com/show_bug.cgi?id=1224859
* https://bugzilla.suse.com/show_bug.cgi?id=1224882
* https://bugzilla.suse.com/show_bug.cgi?id=1224886
* https://bugzilla.suse.com/show_bug.cgi?id=1224888
* https://bugzilla.suse.com/show_bug.cgi?id=1224889
* https://bugzilla.suse.com/show_bug.cgi?id=1224891
* https://bugzilla.suse.com/show_bug.cgi?id=1224892
* https://bugzilla.suse.com/show_bug.cgi?id=1224893
* https://bugzilla.suse.com/show_bug.cgi?id=1224899
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224916
* https://bugzilla.suse.com/show_bug.cgi?id=1224917
* https://bugzilla.suse.com/show_bug.cgi?id=1224922
* https://bugzilla.suse.com/show_bug.cgi?id=1224923
* https://bugzilla.suse.com/show_bug.cgi?id=1224924
* https://bugzilla.suse.com/show_bug.cgi?id=1224926
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224953
* https://bugzilla.suse.com/show_bug.cgi?id=1224954
* https://bugzilla.suse.com/show_bug.cgi?id=1224955
* https://bugzilla.suse.com/show_bug.cgi?id=1224957
* https://bugzilla.suse.com/show_bug.cgi?id=1224961
* https://bugzilla.suse.com/show_bug.cgi?id=1224963
* https://bugzilla.suse.com/show_bug.cgi?id=1224965
* https://bugzilla.suse.com/show_bug.cgi?id=1224966
* https://bugzilla.suse.com/show_bug.cgi?id=1224968
* https://bugzilla.suse.com/show_bug.cgi?id=1224981
* https://bugzilla.suse.com/show_bug.cgi?id=1224982
* https://bugzilla.suse.com/show_bug.cgi?id=1224983
* https://bugzilla.suse.com/show_bug.cgi?id=1224984
* https://bugzilla.suse.com/show_bug.cgi?id=1224987
* https://bugzilla.suse.com/show_bug.cgi?id=1224990
* https://bugzilla.suse.com/show_bug.cgi?id=1224993
* https://bugzilla.suse.com/show_bug.cgi?id=1224996
* https://bugzilla.suse.com/show_bug.cgi?id=1224997
* https://bugzilla.suse.com/show_bug.cgi?id=1225026
* https://bugzilla.suse.com/show_bug.cgi?id=1225030
* https://bugzilla.suse.com/show_bug.cgi?id=1225058
* https://bugzilla.suse.com/show_bug.cgi?id=1225060
* https://bugzilla.suse.com/show_bug.cgi?id=1225083
* https://bugzilla.suse.com/show_bug.cgi?id=1225084
* https://bugzilla.suse.com/show_bug.cgi?id=1225091
* https://bugzilla.suse.com/show_bug.cgi?id=1225112
* https://bugzilla.suse.com/show_bug.cgi?id=1225113
* https://bugzilla.suse.com/show_bug.cgi?id=1225128
* https://bugzilla.suse.com/show_bug.cgi?id=1225140
* https://bugzilla.suse.com/show_bug.cgi?id=1225143
* https://bugzilla.suse.com/show_bug.cgi?id=1225148
* https://bugzilla.suse.com/show_bug.cgi?id=1225155
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225177
* https://bugzilla.suse.com/show_bug.cgi?id=1225178
* https://bugzilla.suse.com/show_bug.cgi?id=1225181
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225233
* https://bugzilla.suse.com/show_bug.cgi?id=1225237
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225243
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225316
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225320
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225333
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225357
* https://bugzilla.suse.com/show_bug.cgi?id=1225358
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225361
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225369
* https://bugzilla.suse.com/show_bug.cgi?id=1225370
* https://bugzilla.suse.com/show_bug.cgi?id=1225372
* https://bugzilla.suse.com/show_bug.cgi?id=1225374
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225386
* https://bugzilla.suse.com/show_bug.cgi?id=1225387
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225405
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225424
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225435
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225439
* https://bugzilla.suse.com/show_bug.cgi?id=1225446
* https://bugzilla.suse.com/show_bug.cgi?id=1225447
* https://bugzilla.suse.com/show_bug.cgi?id=1225448
* https://bugzilla.suse.com/show_bug.cgi?id=1225450
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225468
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225508
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240612/65d68fc4/attachment-0001.htm>
More information about the sle-security-updates
mailing list