SUSE-SU-2024:4100-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Thu Nov 28 16:32:38 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4100-1
Release Date: 2024-11-28T12:42:18Z
Rating: important
References:
* bsc#1082555
* bsc#1176081
* bsc#1206344
* bsc#1213034
* bsc#1218562
* bsc#1219125
* bsc#1220439
* bsc#1221980
* bsc#1222629
* bsc#1223384
* bsc#1223824
* bsc#1225189
* bsc#1225336
* bsc#1225611
* bsc#1226585
* bsc#1226606
* bsc#1227437
* bsc#1227885
* bsc#1227941
* bsc#1227947
* bsc#1227952
* bsc#1228000
* bsc#1228410
* bsc#1228564
* bsc#1228620
* bsc#1228743
* bsc#1229005
* bsc#1229042
* bsc#1229154
* bsc#1229568
* bsc#1229769
* bsc#1229837
* bsc#1230179
* bsc#1230405
* bsc#1230725
* bsc#1230802
* bsc#1231072
* bsc#1231094
* bsc#1231096
* bsc#1231105
* bsc#1231111
* bsc#1231115
* bsc#1231148
* bsc#1231191
* bsc#1231197
* bsc#1231203
* bsc#1231293
* bsc#1231375
* bsc#1231537
* bsc#1231539
* bsc#1231540
* bsc#1231673
* bsc#1231858
* bsc#1231859
* bsc#1231861
* bsc#1231864
* bsc#1231888
* bsc#1231889
* bsc#1231890
* bsc#1231893
* bsc#1231897
* bsc#1231903
* bsc#1231914
* bsc#1231929
* bsc#1231935
* bsc#1231938
* bsc#1231939
* bsc#1231942
* bsc#1231954
* bsc#1231958
* bsc#1231979
* bsc#1231987
* bsc#1231988
* bsc#1231995
* bsc#1231996
* bsc#1231997
* bsc#1231998
* bsc#1232006
* bsc#1232007
* bsc#1232016
* bsc#1232025
* bsc#1232026
* bsc#1232035
* bsc#1232037
* bsc#1232038
* bsc#1232039
* bsc#1232047
* bsc#1232056
* bsc#1232069
* bsc#1232070
* bsc#1232071
* bsc#1232089
* bsc#1232097
* bsc#1232111
* bsc#1232123
* bsc#1232126
* bsc#1232133
* bsc#1232134
* bsc#1232135
* bsc#1232140
* bsc#1232141
* bsc#1232142
* bsc#1232149
* bsc#1232151
* bsc#1232152
* bsc#1232160
* bsc#1232172
* bsc#1232175
* bsc#1232180
* bsc#1232191
* bsc#1232199
* bsc#1232200
* bsc#1232201
* bsc#1232217
* bsc#1232218
* bsc#1232221
* bsc#1232236
* bsc#1232253
* bsc#1232282
* bsc#1232285
* bsc#1232286
* bsc#1232304
* bsc#1232305
* bsc#1232313
* bsc#1232314
* bsc#1232339
* bsc#1232354
* bsc#1232392
* bsc#1232394
* bsc#1232418
* bsc#1232424
* bsc#1232432
* bsc#1232442
Cross-References:
* CVE-2021-46936
* CVE-2021-47163
* CVE-2021-47416
* CVE-2021-47612
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48809
* CVE-2022-48946
* CVE-2022-48949
* CVE-2022-48951
* CVE-2022-48956
* CVE-2022-48958
* CVE-2022-48960
* CVE-2022-48962
* CVE-2022-48966
* CVE-2022-48967
* CVE-2022-48969
* CVE-2022-48971
* CVE-2022-48972
* CVE-2022-48973
* CVE-2022-48978
* CVE-2022-48985
* CVE-2022-48988
* CVE-2022-48991
* CVE-2022-48992
* CVE-2022-48997
* CVE-2022-49000
* CVE-2022-49002
* CVE-2022-49010
* CVE-2022-49011
* CVE-2022-49014
* CVE-2022-49015
* CVE-2022-49020
* CVE-2022-49021
* CVE-2022-49026
* CVE-2022-49027
* CVE-2022-49028
* CVE-2022-49029
* CVE-2023-46343
* CVE-2023-52881
* CVE-2023-52898
* CVE-2023-52918
* CVE-2023-52919
* CVE-2023-6270
* CVE-2024-26804
* CVE-2024-27043
* CVE-2024-38538
* CVE-2024-39476
* CVE-2024-40965
* CVE-2024-41016
* CVE-2024-41082
* CVE-2024-42114
* CVE-2024-42145
* CVE-2024-42253
* CVE-2024-44931
* CVE-2024-44958
* CVE-2024-46724
* CVE-2024-46755
* CVE-2024-46802
* CVE-2024-46809
* CVE-2024-46813
* CVE-2024-46816
* CVE-2024-46818
* CVE-2024-46826
* CVE-2024-46834
* CVE-2024-46840
* CVE-2024-46841
* CVE-2024-46848
* CVE-2024-47670
* CVE-2024-47672
* CVE-2024-47673
* CVE-2024-47674
* CVE-2024-47684
* CVE-2024-47685
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47706
* CVE-2024-47707
* CVE-2024-47713
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47742
* CVE-2024-47745
* CVE-2024-47749
* CVE-2024-49851
* CVE-2024-49860
* CVE-2024-49877
* CVE-2024-49881
* CVE-2024-49882
* CVE-2024-49883
* CVE-2024-49890
* CVE-2024-49891
* CVE-2024-49894
* CVE-2024-49896
* CVE-2024-49901
* CVE-2024-49920
* CVE-2024-49929
* CVE-2024-49936
* CVE-2024-49949
* CVE-2024-49957
* CVE-2024-49958
* CVE-2024-49959
* CVE-2024-49962
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49967
* CVE-2024-49982
* CVE-2024-49991
* CVE-2024-49995
* CVE-2024-49996
* CVE-2024-50006
* CVE-2024-50007
* CVE-2024-50024
* CVE-2024-50033
* CVE-2024-50035
* CVE-2024-50045
* CVE-2024-50047
* CVE-2024-50058
CVSS scores:
* CVE-2021-46936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47612 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48946 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48949 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48951 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48956 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48960 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48960 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48960 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48962 ( SUSE ): 7.2
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48962 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2022-48962 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48966 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48966 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48966 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48967 ( SUSE ): 7.0
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48967 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-48967 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-48969 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48971 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48972 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48973 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48973 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-48973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48978 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48978 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48988 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48988 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48988 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48991 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48992 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48997 ( SUSE ): 1.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48997 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2022-48997 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49000 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49002 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49002 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49015 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49020 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49020 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-49028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-46343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-46343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52881 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-39476 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-39476 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42253 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42253 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42253 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46724 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46755 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46813 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46813 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46813 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46816 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46818 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46818 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46818 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46826 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47672 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47673 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47684 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47685 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47685 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-47685 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49860 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49860 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49860 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49890 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49936 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49936 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49936 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49982 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49991 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49991 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49995 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49995 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49996 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50033 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50035 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50035 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50035 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Availability Extension 12 SP5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 120 vulnerabilities and has 13 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The Linux Enterprise 12 SP5 kernel turned LTSS (Extended Security)
The following security bugs were fixed:
* CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
* CVE-2021-47163: kABI fix for tipc: wait and exit until all work queues are
done (bsc#1221980).
* CVE-2021-47612: nfc: fix segfault in nfc_genl_dump_devices_done
(bsc#1226585).
* CVE-2022-48809: net: fix a memleak when uncloning an skb dst and its
metadata (bsc#1227947).
* CVE-2022-48951: ASoC: ops: Correct bounds check for second channel on SX
controls (bsc#1231929).
* CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
* CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in
greth_init_rings() (bsc#1231889).
* CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
(bsc#1231979).
* CVE-2022-48962: net: hisilicon: Fix potential use-after-free in
hisi_femac_rx() (bsc#1232286).
* CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
* CVE-2022-48967: NFC: nci: Bounds check struct nfc_target arrays
(bsc#1232304).
* CVE-2022-48971: Bluetooth: Fix not cleanup led when bt_init fails
(bsc#1232037).
* CVE-2022-48972: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()
(bsc#1232025).
* CVE-2022-48973: gpio: amd8111: Fix PCI device reference count leak
(bsc#1232039).
* CVE-2022-48978: HID: core: fix shift-out-of-bounds in hid_report_raw_event
(bsc#1232038).
* CVE-2022-48991: mm/khugepaged: invoke MMU notifiers in shmem/file collapse
paths (bsc#1232070).
* CVE-2022-48992: ASoC: soc-pcm: Add NULL check in BE reparenting
(bsc#1232071).
* CVE-2022-49000: iommu/vt-d: Fix PCI device refcount leak in
has_external_pci() (bsc#1232123).
* CVE-2022-49002: iommu/vt-d: Fix PCI device refcount leak in
dmar_dev_scope_init() (bsc#1232133).
* CVE-2022-49010: hwmon: (coretemp) Check for null before removing sysfs attrs
(bsc#1232172).
* CVE-2022-49011: hwmon: (coretemp) fix pci device refcount leak in
nv1a_ram_new() (bsc#1232006).
* CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1231890).
* CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
* CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open
(bsc#1232175).
* CVE-2022-49021: net: phy: fix null-ptr-deref while probe() failed
(bsc#1231939).
* CVE-2022-49026: e100: Fix possible use after free in e100_xmit_prepare
(bsc#1231997).
* CVE-2022-49027: iavf: Fix error handling in iavf_init_module()
(bsc#1232007).
* CVE-2022-49028: ixgbevf: Fix resource leak in ixgbevf_init_module()
(bsc#1231996).
* CVE-2022-49029: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc()
fails (bsc#1231995).
* CVE-2023-52898: xhci: Fix null pointer dereference when host dies
(bsc#1229568).
* CVE-2023-52918: media: pci: cx23885: check cx23885_vdev_init() return
(bsc#1232047).
* CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth
(bsc#1222629).
* CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len
bytes (bsc#1226606).
* CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to
clear MD_SB_CHANGE_PENDING (bsc#1227437).
* CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
(bsc#1227885).
* CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
(bsc#1228620).
* CVE-2024-42114: netlink: extend policy range validation (bsc#1228564
prerequisite).
* CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
(bsc#1229005 stable-fixes).
* CVE-2024-44931: gpio: prevent potential speculation leaks in
gpio_device_get_desc() (bsc#1229837 stable-fixes).
* CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
(bsc#1230179).
* CVE-2024-46724: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
(bsc#1230725).
* CVE-2024-46755: wifi: mwifiex: Do not return unused priv in
mwifiex_get_priv_by_id() (bsc#1230802).
* CVE-2024-46802: drm/amd/display: added NULL check at start of
dc_validate_stream (bsc#1231111).
* CVE-2024-46809: drm/amd/display: Check BIOS images before it is used
(bsc#1231148).
* CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
(bsc#1231191).
* CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
greater than max_links (bsc#1231197).
* CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index
(bsc#1231203).
* CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
(bsc#1231115).
* CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
indirection tables (bsc#1231096).
* CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
(bsc#1231105).
* CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
* CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
* CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is
dead (bsc#1231540).
* CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
(bsc#1231539).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231673).
* CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
(bsc#1231987).
* CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
(bsc#1231998).
* CVE-2024-47697: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds
write error (bsc#1231858).
* CVE-2024-47698: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds
write error (bsc#1231859).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231942).
* CVE-2024-47707: ipv6: avoid possible NULL deref in
rt6_uncached_list_flush_dev() (bsc#1231935).
* CVE-2024-47713: wifi: mac80211: use two-phase skb reclamation in
ieee80211_do_stop() (bsc#1232016).
* CVE-2024-47735: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs
enabled (bsc#1232111).
* CVE-2024-47737: nfsd: call cache_put if xdr_reserve_space returns NULL
(bsc#1232056).
* CVE-2024-47742: firmware_loader: Block path traversal (bsc#1232126).
* CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
LSMs in between (bsc#1232135).
* CVE-2024-49851: tpm: Clean up TPM space after command failure (bsc#1232134).
* CVE-2024-49860: ACPI: sysfs: validate return type of _STR method
(bsc#1231861).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
(bsc#1232200).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
(bsc#1232217).
* CVE-2024-49891: scsi: lpfc: Validate hdwq pointers before dereferencing in
reset/errata paths (bsc#1232218).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49896: drm/amd/display: Check stream before comparing them
(bsc#1232221).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
(bsc#1232313).
* CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference
(bsc#1232253).
* CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
(bsc#1232424).
* CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
UFO (bsc#1232160).
* CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
reflink tree (bsc#1232151).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in
acpi_db_convert_to_package() (bsc#1232314).
* CVE-2024-49966: ocfs2: cancel dqi_sync_work before freeing oinfo
(bsc#1232141).
* CVE-2024-49967: ext4: no need to continue when the number of entries is 1
(bsc#1232140).
* CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
(bsc#1232282).
* CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
* CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
(bsc#1232089).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50007: ALSA: asihpi: Fix potential OOB array access (bsc#1232394).
* CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
* CVE-2024-50033: slip: make slhc_remember() more robust against malicious
packets (bsc#1231914).
* CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
* CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
(bsc#1231903).
* CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
* CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too
(bsc#1232285).
The following non-security bugs were fixed:
* arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
* arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
* arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
* arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
* bpf: Fix pointer-leak due to insufficient speculative store bypass
mitigation (bsc#1231375).
* drbd: Add NULL check for net_conf to prevent dereference in state validation
(git-fixes).
* drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* kernel-binary: generate and install compile_commands.json (bsc#1228971)
* net: usb: usbnet: fix name regression (get-fixes).
* nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
* nfsd: fix delegation_blocked() to block correctly for at least 30 seconds
(git-fixes).
* x86/kaslr: Expose and use the end of the physical memory address space
(bsc#1230405).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4100=1
* SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4100=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4100=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4100=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4100=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* gfs2-kmp-default-4.12.14-122.234.1
* kernel-default-debugsource-4.12.14-122.234.1
* cluster-md-kmp-default-4.12.14-122.234.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.234.1
* gfs2-kmp-default-debuginfo-4.12.14-122.234.1
* dlm-kmp-default-debuginfo-4.12.14-122.234.1
* dlm-kmp-default-4.12.14-122.234.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.234.1
* kernel-default-debuginfo-4.12.14-122.234.1
* ocfs2-kmp-default-4.12.14-122.234.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
* kernel-default-4.12.14-122.234.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
x86_64)
* gfs2-kmp-default-4.12.14-122.234.1
* kernel-default-debugsource-4.12.14-122.234.1
* cluster-md-kmp-default-4.12.14-122.234.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.234.1
* gfs2-kmp-default-debuginfo-4.12.14-122.234.1
* dlm-kmp-default-debuginfo-4.12.14-122.234.1
* dlm-kmp-default-4.12.14-122.234.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.234.1
* kernel-default-debuginfo-4.12.14-122.234.1
* ocfs2-kmp-default-4.12.14-122.234.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
* kernel-default-4.12.14-122.234.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.234.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-debugsource-4.12.14-122.234.1
* kernel-default-kgraft-4.12.14-122.234.1
* kernel-default-kgraft-devel-4.12.14-122.234.1
* kernel-default-debuginfo-4.12.14-122.234.1
* kgraft-patch-4_12_14-122_234-default-1-8.3.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-base-debuginfo-4.12.14-122.234.1
* kernel-default-debugsource-4.12.14-122.234.1
* kernel-default-devel-4.12.14-122.234.1
* kernel-default-debuginfo-4.12.14-122.234.1
* kernel-syms-4.12.14-122.234.1
* kernel-default-base-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-devel-4.12.14-122.234.1
* kernel-macros-4.12.14-122.234.1
* kernel-source-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* kernel-default-base-debuginfo-4.12.14-122.234.1
* kernel-default-debugsource-4.12.14-122.234.1
* kernel-default-devel-4.12.14-122.234.1
* kernel-default-devel-debuginfo-4.12.14-122.234.1
* kernel-default-debuginfo-4.12.14-122.234.1
* kernel-syms-4.12.14-122.234.1
* kernel-default-base-4.12.14-122.234.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-devel-4.12.14-122.234.1
* kernel-macros-4.12.14-122.234.1
* kernel-source-4.12.14-122.234.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46936.html
* https://www.suse.com/security/cve/CVE-2021-47163.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47612.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48809.html
* https://www.suse.com/security/cve/CVE-2022-48946.html
* https://www.suse.com/security/cve/CVE-2022-48949.html
* https://www.suse.com/security/cve/CVE-2022-48951.html
* https://www.suse.com/security/cve/CVE-2022-48956.html
* https://www.suse.com/security/cve/CVE-2022-48958.html
* https://www.suse.com/security/cve/CVE-2022-48960.html
* https://www.suse.com/security/cve/CVE-2022-48962.html
* https://www.suse.com/security/cve/CVE-2022-48966.html
* https://www.suse.com/security/cve/CVE-2022-48967.html
* https://www.suse.com/security/cve/CVE-2022-48969.html
* https://www.suse.com/security/cve/CVE-2022-48971.html
* https://www.suse.com/security/cve/CVE-2022-48972.html
* https://www.suse.com/security/cve/CVE-2022-48973.html
* https://www.suse.com/security/cve/CVE-2022-48978.html
* https://www.suse.com/security/cve/CVE-2022-48985.html
* https://www.suse.com/security/cve/CVE-2022-48988.html
* https://www.suse.com/security/cve/CVE-2022-48991.html
* https://www.suse.com/security/cve/CVE-2022-48992.html
* https://www.suse.com/security/cve/CVE-2022-48997.html
* https://www.suse.com/security/cve/CVE-2022-49000.html
* https://www.suse.com/security/cve/CVE-2022-49002.html
* https://www.suse.com/security/cve/CVE-2022-49010.html
* https://www.suse.com/security/cve/CVE-2022-49011.html
* https://www.suse.com/security/cve/CVE-2022-49014.html
* https://www.suse.com/security/cve/CVE-2022-49015.html
* https://www.suse.com/security/cve/CVE-2022-49020.html
* https://www.suse.com/security/cve/CVE-2022-49021.html
* https://www.suse.com/security/cve/CVE-2022-49026.html
* https://www.suse.com/security/cve/CVE-2022-49027.html
* https://www.suse.com/security/cve/CVE-2022-49028.html
* https://www.suse.com/security/cve/CVE-2022-49029.html
* https://www.suse.com/security/cve/CVE-2023-46343.html
* https://www.suse.com/security/cve/CVE-2023-52881.html
* https://www.suse.com/security/cve/CVE-2023-52898.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52919.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-26804.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-38538.html
* https://www.suse.com/security/cve/CVE-2024-39476.html
* https://www.suse.com/security/cve/CVE-2024-40965.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41082.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42253.html
* https://www.suse.com/security/cve/CVE-2024-44931.html
* https://www.suse.com/security/cve/CVE-2024-44958.html
* https://www.suse.com/security/cve/CVE-2024-46724.html
* https://www.suse.com/security/cve/CVE-2024-46755.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46809.html
* https://www.suse.com/security/cve/CVE-2024-46813.html
* https://www.suse.com/security/cve/CVE-2024-46816.html
* https://www.suse.com/security/cve/CVE-2024-46818.html
* https://www.suse.com/security/cve/CVE-2024-46826.html
* https://www.suse.com/security/cve/CVE-2024-46834.html
* https://www.suse.com/security/cve/CVE-2024-46840.html
* https://www.suse.com/security/cve/CVE-2024-46841.html
* https://www.suse.com/security/cve/CVE-2024-46848.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47672.html
* https://www.suse.com/security/cve/CVE-2024-47673.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47684.html
* https://www.suse.com/security/cve/CVE-2024-47685.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-47707.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49860.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49882.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49890.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49896.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49920.html
* https://www.suse.com/security/cve/CVE-2024-49929.html
* https://www.suse.com/security/cve/CVE-2024-49936.html
* https://www.suse.com/security/cve/CVE-2024-49949.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49958.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49962.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49967.html
* https://www.suse.com/security/cve/CVE-2024-49982.html
* https://www.suse.com/security/cve/CVE-2024-49991.html
* https://www.suse.com/security/cve/CVE-2024-49995.html
* https://www.suse.com/security/cve/CVE-2024-49996.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50024.html
* https://www.suse.com/security/cve/CVE-2024-50033.html
* https://www.suse.com/security/cve/CVE-2024-50035.html
* https://www.suse.com/security/cve/CVE-2024-50045.html
* https://www.suse.com/security/cve/CVE-2024-50047.html
* https://www.suse.com/security/cve/CVE-2024-50058.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1176081
* https://bugzilla.suse.com/show_bug.cgi?id=1206344
* https://bugzilla.suse.com/show_bug.cgi?id=1213034
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219125
* https://bugzilla.suse.com/show_bug.cgi?id=1220439
* https://bugzilla.suse.com/show_bug.cgi?id=1221980
* https://bugzilla.suse.com/show_bug.cgi?id=1222629
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225611
* https://bugzilla.suse.com/show_bug.cgi?id=1226585
* https://bugzilla.suse.com/show_bug.cgi?id=1226606
* https://bugzilla.suse.com/show_bug.cgi?id=1227437
* https://bugzilla.suse.com/show_bug.cgi?id=1227885
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227947
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228620
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1229005
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229568
* https://bugzilla.suse.com/show_bug.cgi?id=1229769
* https://bugzilla.suse.com/show_bug.cgi?id=1229837
* https://bugzilla.suse.com/show_bug.cgi?id=1230179
* https://bugzilla.suse.com/show_bug.cgi?id=1230405
* https://bugzilla.suse.com/show_bug.cgi?id=1230725
* https://bugzilla.suse.com/show_bug.cgi?id=1230802
* https://bugzilla.suse.com/show_bug.cgi?id=1231072
* https://bugzilla.suse.com/show_bug.cgi?id=1231094
* https://bugzilla.suse.com/show_bug.cgi?id=1231096
* https://bugzilla.suse.com/show_bug.cgi?id=1231105
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231115
* https://bugzilla.suse.com/show_bug.cgi?id=1231148
* https://bugzilla.suse.com/show_bug.cgi?id=1231191
* https://bugzilla.suse.com/show_bug.cgi?id=1231197
* https://bugzilla.suse.com/show_bug.cgi?id=1231203
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231375
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231539
* https://bugzilla.suse.com/show_bug.cgi?id=1231540
* https://bugzilla.suse.com/show_bug.cgi?id=1231673
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231861
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231888
* https://bugzilla.suse.com/show_bug.cgi?id=1231889
* https://bugzilla.suse.com/show_bug.cgi?id=1231890
* https://bugzilla.suse.com/show_bug.cgi?id=1231893
* https://bugzilla.suse.com/show_bug.cgi?id=1231897
* https://bugzilla.suse.com/show_bug.cgi?id=1231903
* https://bugzilla.suse.com/show_bug.cgi?id=1231914
* https://bugzilla.suse.com/show_bug.cgi?id=1231929
* https://bugzilla.suse.com/show_bug.cgi?id=1231935
* https://bugzilla.suse.com/show_bug.cgi?id=1231938
* https://bugzilla.suse.com/show_bug.cgi?id=1231939
* https://bugzilla.suse.com/show_bug.cgi?id=1231942
* https://bugzilla.suse.com/show_bug.cgi?id=1231954
* https://bugzilla.suse.com/show_bug.cgi?id=1231958
* https://bugzilla.suse.com/show_bug.cgi?id=1231979
* https://bugzilla.suse.com/show_bug.cgi?id=1231987
* https://bugzilla.suse.com/show_bug.cgi?id=1231988
* https://bugzilla.suse.com/show_bug.cgi?id=1231995
* https://bugzilla.suse.com/show_bug.cgi?id=1231996
* https://bugzilla.suse.com/show_bug.cgi?id=1231997
* https://bugzilla.suse.com/show_bug.cgi?id=1231998
* https://bugzilla.suse.com/show_bug.cgi?id=1232006
* https://bugzilla.suse.com/show_bug.cgi?id=1232007
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232025
* https://bugzilla.suse.com/show_bug.cgi?id=1232026
* https://bugzilla.suse.com/show_bug.cgi?id=1232035
* https://bugzilla.suse.com/show_bug.cgi?id=1232037
* https://bugzilla.suse.com/show_bug.cgi?id=1232038
* https://bugzilla.suse.com/show_bug.cgi?id=1232039
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232069
* https://bugzilla.suse.com/show_bug.cgi?id=1232070
* https://bugzilla.suse.com/show_bug.cgi?id=1232071
* https://bugzilla.suse.com/show_bug.cgi?id=1232089
* https://bugzilla.suse.com/show_bug.cgi?id=1232097
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232123
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232133
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232140
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232151
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232160
* https://bugzilla.suse.com/show_bug.cgi?id=1232172
* https://bugzilla.suse.com/show_bug.cgi?id=1232175
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232191
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232200
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232217
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232221
* https://bugzilla.suse.com/show_bug.cgi?id=1232236
* https://bugzilla.suse.com/show_bug.cgi?id=1232253
* https://bugzilla.suse.com/show_bug.cgi?id=1232282
* https://bugzilla.suse.com/show_bug.cgi?id=1232285
* https://bugzilla.suse.com/show_bug.cgi?id=1232286
* https://bugzilla.suse.com/show_bug.cgi?id=1232304
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232313
* https://bugzilla.suse.com/show_bug.cgi?id=1232314
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232392
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232418
* https://bugzilla.suse.com/show_bug.cgi?id=1232424
* https://bugzilla.suse.com/show_bug.cgi?id=1232432
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20241128/72d8eb2e/attachment.htm>
More information about the sle-security-updates
mailing list