SUSE-SU-2024:1979-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Tue Jun 11 08:30:46 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1979-1
Rating: important
References:
* bsc#1065729
* bsc#1101816
* bsc#1181674
* bsc#1185902
* bsc#1187716
* bsc#1188616
* bsc#1190317
* bsc#1190795
* bsc#1191452
* bsc#1194591
* bsc#1197760
* bsc#1206213
* bsc#1206646
* bsc#1207186
* bsc#1209657
* bsc#1210335
* bsc#1215702
* bsc#1216702
* bsc#1217169
* bsc#1217519
* bsc#1220487
* bsc#1220854
* bsc#1220928
* bsc#1221044
* bsc#1221081
* bsc#1221086
* bsc#1221977
* bsc#1221994
* bsc#1222619
* bsc#1222627
* bsc#1222667
* bsc#1222671
* bsc#1222893
* bsc#1222894
* bsc#1223023
* bsc#1223046
* bsc#1223048
* bsc#1223084
* bsc#1223138
* bsc#1223207
* bsc#1223360
* bsc#1223384
* bsc#1223633
* bsc#1223653
* bsc#1223666
* bsc#1223671
* bsc#1223738
* bsc#1223752
* bsc#1223834
* bsc#1223922
* bsc#1223932
* bsc#1223948
* bsc#1224096
* bsc#1224174
* bsc#1224181
* bsc#1224347
* bsc#1224482
* bsc#1224511
* bsc#1224525
* bsc#1224566
* bsc#1224580
* bsc#1224592
* bsc#1224601
* bsc#1224607
* bsc#1224621
* bsc#1224644
* bsc#1224645
* bsc#1224648
* bsc#1224650
* bsc#1224663
* bsc#1224671
* bsc#1224676
* bsc#1224680
* bsc#1224682
* bsc#1224725
* bsc#1224728
* bsc#1224733
* bsc#1224738
* bsc#1224747
* bsc#1224749
* bsc#1224759
* bsc#1224803
* bsc#1224827
* bsc#1224830
* bsc#1224831
* bsc#1224834
* bsc#1224838
* bsc#1224841
* bsc#1224844
* bsc#1224846
* bsc#1224847
* bsc#1224849
* bsc#1224854
* bsc#1224859
* bsc#1224867
* bsc#1224880
* bsc#1224882
* bsc#1224888
* bsc#1224889
* bsc#1224892
* bsc#1224893
* bsc#1224899
* bsc#1224904
* bsc#1224907
* bsc#1224916
* bsc#1224917
* bsc#1224922
* bsc#1224926
* bsc#1224930
* bsc#1224931
* bsc#1224942
* bsc#1224954
* bsc#1224957
* bsc#1224959
* bsc#1224960
* bsc#1224961
* bsc#1224963
* bsc#1224966
* bsc#1224968
* bsc#1224981
* bsc#1224982
* bsc#1224983
* bsc#1224987
* bsc#1224990
* bsc#1224996
* bsc#1225008
* bsc#1225009
* bsc#1225010
* bsc#1225022
* bsc#1225026
* bsc#1225030
* bsc#1225054
* bsc#1225058
* bsc#1225059
* bsc#1225060
* bsc#1225062
* bsc#1225082
* bsc#1225084
* bsc#1225086
* bsc#1225092
* bsc#1225096
* bsc#1225112
* bsc#1225124
* bsc#1225128
* bsc#1225132
* bsc#1225141
* bsc#1225143
* bsc#1225144
* bsc#1225151
* bsc#1225153
* bsc#1225155
* bsc#1225157
* bsc#1225164
* bsc#1225177
* bsc#1225189
* bsc#1225192
* bsc#1225193
* bsc#1225198
* bsc#1225201
* bsc#1225207
* bsc#1225208
* bsc#1225222
* bsc#1225230
* bsc#1225242
* bsc#1225244
* bsc#1225247
* bsc#1225251
* bsc#1225252
* bsc#1225256
* bsc#1225303
* bsc#1225318
* bsc#1225322
* bsc#1225329
* bsc#1225330
* bsc#1225336
* bsc#1225347
* bsc#1225351
* bsc#1225354
* bsc#1225355
* bsc#1225360
* bsc#1225366
* bsc#1225367
* bsc#1225384
* bsc#1225390
* bsc#1225404
* bsc#1225409
* bsc#1225411
* bsc#1225438
* bsc#1225453
* bsc#1225479
* bsc#1225482
* bsc#1225506
* bsc#1225549
* bsc#1225560
* bsc#1225572
* bsc#1225640
* bsc#1225708
* bsc#1225764
Cross-References:
* CVE-2021-46933
* CVE-2021-47074
* CVE-2021-47162
* CVE-2021-47171
* CVE-2021-47188
* CVE-2021-47206
* CVE-2021-47220
* CVE-2021-47229
* CVE-2021-47231
* CVE-2021-47235
* CVE-2021-47236
* CVE-2021-47237
* CVE-2021-47238
* CVE-2021-47239
* CVE-2021-47245
* CVE-2021-47246
* CVE-2021-47248
* CVE-2021-47249
* CVE-2021-47250
* CVE-2021-47252
* CVE-2021-47254
* CVE-2021-47258
* CVE-2021-47260
* CVE-2021-47261
* CVE-2021-47265
* CVE-2021-47269
* CVE-2021-47274
* CVE-2021-47276
* CVE-2021-47277
* CVE-2021-47280
* CVE-2021-47281
* CVE-2021-47284
* CVE-2021-47285
* CVE-2021-47288
* CVE-2021-47301
* CVE-2021-47302
* CVE-2021-47305
* CVE-2021-47307
* CVE-2021-47308
* CVE-2021-47310
* CVE-2021-47311
* CVE-2021-47314
* CVE-2021-47315
* CVE-2021-47319
* CVE-2021-47320
* CVE-2021-47321
* CVE-2021-47323
* CVE-2021-47324
* CVE-2021-47330
* CVE-2021-47334
* CVE-2021-47337
* CVE-2021-47343
* CVE-2021-47344
* CVE-2021-47345
* CVE-2021-47347
* CVE-2021-47352
* CVE-2021-47353
* CVE-2021-47355
* CVE-2021-47356
* CVE-2021-47357
* CVE-2021-47361
* CVE-2021-47362
* CVE-2021-47369
* CVE-2021-47375
* CVE-2021-47378
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47391
* CVE-2021-47397
* CVE-2021-47400
* CVE-2021-47401
* CVE-2021-47404
* CVE-2021-47409
* CVE-2021-47416
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47431
* CVE-2021-47435
* CVE-2021-47436
* CVE-2021-47456
* CVE-2021-47458
* CVE-2021-47460
* CVE-2021-47469
* CVE-2021-47472
* CVE-2021-47473
* CVE-2021-47478
* CVE-2021-47480
* CVE-2021-47483
* CVE-2021-47485
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47500
* CVE-2021-47506
* CVE-2021-47509
* CVE-2021-47511
* CVE-2021-47523
* CVE-2021-47541
* CVE-2021-47548
* CVE-2021-47565
* CVE-2022-48686
* CVE-2022-48697
* CVE-2022-48704
* CVE-2022-48708
* CVE-2022-48710
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-42755
* CVE-2023-47233
* CVE-2023-52527
* CVE-2023-52586
* CVE-2023-52591
* CVE-2023-52655
* CVE-2023-52664
* CVE-2023-52685
* CVE-2023-52686
* CVE-2023-52691
* CVE-2023-52696
* CVE-2023-52698
* CVE-2023-52703
* CVE-2023-52730
* CVE-2023-52732
* CVE-2023-52741
* CVE-2023-52742
* CVE-2023-52747
* CVE-2023-52759
* CVE-2023-52774
* CVE-2023-52781
* CVE-2023-52796
* CVE-2023-52803
* CVE-2023-52821
* CVE-2023-52864
* CVE-2023-52865
* CVE-2023-52867
* CVE-2023-52875
* CVE-2023-52880
* CVE-2024-26625
* CVE-2024-26752
* CVE-2024-26775
* CVE-2024-26828
* CVE-2024-26846
* CVE-2024-26874
* CVE-2024-26900
* CVE-2024-26915
* CVE-2024-26920
* CVE-2024-26921
* CVE-2024-26934
* CVE-2024-26957
* CVE-2024-26958
* CVE-2024-26984
* CVE-2024-26996
* CVE-2024-27059
* CVE-2024-27062
* CVE-2024-27396
* CVE-2024-27398
* CVE-2024-27401
* CVE-2024-27419
* CVE-2024-27436
* CVE-2024-35789
* CVE-2024-35791
* CVE-2024-35809
* CVE-2024-35811
* CVE-2024-35830
* CVE-2024-35849
* CVE-2024-35877
* CVE-2024-35878
* CVE-2024-35887
* CVE-2024-35895
* CVE-2024-35914
* CVE-2024-35932
* CVE-2024-35935
* CVE-2024-35936
* CVE-2024-35944
* CVE-2024-35955
* CVE-2024-35969
* CVE-2024-35982
* CVE-2024-35984
* CVE-2024-36015
* CVE-2024-36029
* CVE-2024-36954
CVSS scores:
* CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47248 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47250 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47311 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47319 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47345 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47352 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47355 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47357 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47361 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47362 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47472 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47548 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48708 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42755 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2023-42755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52586 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52703 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52747 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52781 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52803 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52865 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52867 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52875 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27419 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35789 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 180 vulnerabilities and has 18 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948). Update
blacklist.conf: remove entry
* CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225201).
* CVE-2022-48697: Fix a use-after-free (bsc#1223922). Update blacklist.conf:
drop entry from it
* CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
* CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
* CVE-2023-42755: Check user supplied offsets (bsc#1215702).
* CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
* CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
* CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
* CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace
(bsc#1225222 CVE-2023-52732).
* CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks()
(bsc#1224644)
* CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
* CVE-2024-36029: Pervent access to suspended controller (bsc#1225708
CVE-2024-36029)
* CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
* CVE-2021-47352: Add validation for used length (bsc#1225124).
* CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
* CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
* CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref()
(bsc#1224645)
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2021-47423: Fix file release memory leak (bsc#1225366).
* CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
* CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
(bsc#1225355).
* CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
* CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
* CVE-2024-35809: Drain runtime-idle callbacks before driver removal
(bsc#1224738).
* CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
(bsc#1225208).
* CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
* CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
* CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
* CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
* CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
ipv6_del_addr (bsc#1224580).
* CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot
accesses (bsc#1224960, CVE-2021-47277).
* CVE-2024-35791: Flush pages under kvm->lock to fix UAF in
svm_register_enc_region() (bsc#1224725).
* CVE-2021-47401: Fix stack information leak (bsc#1225242).
* CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
* CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
* CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
* CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
* CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
* CVE-2023-52864: Fix opening of char device (bsc#1225132).
* CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
* CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
(bsc#1224648).
* CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
* CVE-2023-52730: Fix possible resource leaks in some error paths
(bsc#1224956).
* CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup()
(bsc#1225141).
* CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
* CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()
(bsc#1224671).
* CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
* CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
* CVE-2021-47397: Break out if skb_header_pointer returns NULL in
sctp_rcv_ootb (bsc#1225082)
* CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
* CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino()
(bsc#1224733).
* CVE-2024-27436: Stop parsing channels bits when all channels are found
(bsc#1224803).
* CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
* CVE-2024-35789: Clear fast rx for non-4addr in VLAN netdev (bsc#1224749).
* CVE-2024-35830: Register v4l2 async device only after successful setup
(bsc#1224680).
* CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
* CVE-2021-47357: Fix possible use-after-free in ia_module_exit()
(bsc#1225144).
* CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
* CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
* CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer
(bsc#1224663)
* CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit()
(bsc#1224907).
* CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
* CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
* CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
* CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
* CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
* CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
* CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
* CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
* CVE-2024-27401: Fixed user_length taken into account when fetching packet
contents (bsc#1224181).
* CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
* CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
* CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
* CVE-2021-47206: Check return value after calling platform_get_resource()
(bsc#1222894).
* CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
* CVE-2024-26996: Fix UAF ncm object at re-bind after usb transport error
(bsc#1223752).
* CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
(bsc#1223048)
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
* assoc_array: Fix BUG_ON during garbage collect.
* autofs: fix a leak in autofs_expire_indirect() (git-fixes)
* Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
* btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit
(git-fixes)
* btrfs: check if root is readonly while setting security xattr (git-fixes)
* btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag
(git-fixes)
* btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
* btrfs: do not stop integrity writeback too early (git-fixes)
* btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
* btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
* btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
* btrfs: fix deadlock when writing out space cache (git-fixes)
* Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO
(git-fixes)
* btrfs: fix lockdep splat and potential deadlock after failure running
delayed items (git-fixes)
* btrfs: fix lost error handling when looking up extended ref on log replay
(git-fixes)
* btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
* btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
* btrfs: fix race when deleting quota root from the dirty cow roots list (git-
fixes)
* btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
* btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
* btrfs: fix unaligned access in readdir (git-fixes)
* btrfs: limit device extents to the device size (git-fixes)
* btrfs: prevent to set invalid default subvolid (git-fixes)
* btrfs: record delayed inode root in transaction (git-fixes)
* btrfs: scrub: reject unsupported scrub flags (git-fixes)
* btrfs: send: ensure send_fd is writable (git-fixes)
* btrfs: send: in case of IO error log it (git-fixes)
* btrfs: send: limit number of clones and allocated memory size (git-fixes)
* btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add
#include
* btrfs: tree-checker: add missing return after error in root_item (git-fixes)
* btrfs: tree-checker: add missing returns after data_ref alignment checks
(git-fixes)
* btrfs: tree-checker: do not error out if extent ref hash does not match
(git-fixes)
* btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
* btrfs: tree-checker: Fix misleading group system information (git-fixes)
* btrfs: undo writable superblocke when sprouting fails (git-fixes)
* btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
* ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
* ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
* ecryptfs: fix kernel panic with null dev_name (git-fixes)
* ecryptfs: Fix typo in message (git-fixes)
* ep_create_wakeup_source(): dentry name can change under you (git-fixes)
* exportfs_decode_fh(): negative pinned may become positive without the parent
locked (git-fixes)
* fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys
inodes (git-fixes)
* fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
* ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-
fixes).
* ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-
fixes).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
bsc#1225059).
* l2tp: pass correct message length to ip6_append_data (git-fixes).
* lib/mpi: use kcalloc in mpi_resize (git-fixes).
* list: fix a data-race around ep->rdllist (git-fixes).
* net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
* net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
* net: usb: sr9700: stop lying about skb->truesize (git-fixes).
* net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
(bsc#1223360).
* net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
* netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
* netfilter: nft_compat: explicitly reject ERROR and standard target (git-
fixes).
* netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
* nfc: change order inside nfc_se_io error path (git-fixes).
* powerpc/pseries/lparcfg: drop error message from guest name lookup
(bsc#1187716 ltc#193451 git-fixes).
* ppdev: Add an error check in register_device (git-fixes).
* rds: avoid unenecessary cong_update in loop transport (git-fixes).
* rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
* ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
* ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
* rxrpc: Do not put crypto buffers on the stack (git-fixes).
* rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
* rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls
(git-fixes).
* rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-
fixes).
* rxrpc: Work around usercopy check (git-fixes).
* s390/cpum_cf: make crypto counters upward compatible across machine types
(bsc#1224347).
* s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes
bsc#1225062).
* tcp: tcp_make_synack() can be called from process context (git-fixes).
* tracing: Fix blocked reader of snapshot buffer (git-fixes).
* tracing: hide unused ftrace_event_id_fops (git-fixes).
* tracing: Use .flush() call to wake up readers (git-fixes).
* tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-
fixes).
* usb: aqc111: stop lying about skb->truesize (git-fixes).
* wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
* wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1979=1
* SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1979=1
* SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1979=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64)
* kernel-azure-4.12.14-16.188.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
* kernel-azure-base-4.12.14-16.188.1
* kernel-syms-azure-4.12.14-16.188.1
* kernel-azure-debuginfo-4.12.14-16.188.1
* kernel-azure-devel-4.12.14-16.188.1
* kernel-azure-base-debuginfo-4.12.14-16.188.1
* kernel-azure-debugsource-4.12.14-16.188.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
* kernel-devel-azure-4.12.14-16.188.1
* kernel-source-azure-4.12.14-16.188.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64)
* kernel-azure-4.12.14-16.188.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
* kernel-azure-base-4.12.14-16.188.1
* kernel-syms-azure-4.12.14-16.188.1
* kernel-azure-debuginfo-4.12.14-16.188.1
* kernel-azure-devel-4.12.14-16.188.1
* kernel-azure-base-debuginfo-4.12.14-16.188.1
* kernel-azure-debugsource-4.12.14-16.188.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
* kernel-devel-azure-4.12.14-16.188.1
* kernel-source-azure-4.12.14-16.188.1
* SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64)
* kernel-azure-4.12.14-16.188.1
* SUSE Linux Enterprise Server 12 SP5 (x86_64)
* kernel-azure-base-4.12.14-16.188.1
* kernel-syms-azure-4.12.14-16.188.1
* kernel-azure-debuginfo-4.12.14-16.188.1
* kernel-azure-devel-4.12.14-16.188.1
* kernel-azure-base-debuginfo-4.12.14-16.188.1
* kernel-azure-debugsource-4.12.14-16.188.1
* SUSE Linux Enterprise Server 12 SP5 (noarch)
* kernel-devel-azure-4.12.14-16.188.1
* kernel-source-azure-4.12.14-16.188.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46933.html
* https://www.suse.com/security/cve/CVE-2021-47074.html
* https://www.suse.com/security/cve/CVE-2021-47162.html
* https://www.suse.com/security/cve/CVE-2021-47171.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47220.html
* https://www.suse.com/security/cve/CVE-2021-47229.html
* https://www.suse.com/security/cve/CVE-2021-47231.html
* https://www.suse.com/security/cve/CVE-2021-47235.html
* https://www.suse.com/security/cve/CVE-2021-47236.html
* https://www.suse.com/security/cve/CVE-2021-47237.html
* https://www.suse.com/security/cve/CVE-2021-47238.html
* https://www.suse.com/security/cve/CVE-2021-47239.html
* https://www.suse.com/security/cve/CVE-2021-47245.html
* https://www.suse.com/security/cve/CVE-2021-47246.html
* https://www.suse.com/security/cve/CVE-2021-47248.html
* https://www.suse.com/security/cve/CVE-2021-47249.html
* https://www.suse.com/security/cve/CVE-2021-47250.html
* https://www.suse.com/security/cve/CVE-2021-47252.html
* https://www.suse.com/security/cve/CVE-2021-47254.html
* https://www.suse.com/security/cve/CVE-2021-47258.html
* https://www.suse.com/security/cve/CVE-2021-47260.html
* https://www.suse.com/security/cve/CVE-2021-47261.html
* https://www.suse.com/security/cve/CVE-2021-47265.html
* https://www.suse.com/security/cve/CVE-2021-47269.html
* https://www.suse.com/security/cve/CVE-2021-47274.html
* https://www.suse.com/security/cve/CVE-2021-47276.html
* https://www.suse.com/security/cve/CVE-2021-47277.html
* https://www.suse.com/security/cve/CVE-2021-47280.html
* https://www.suse.com/security/cve/CVE-2021-47281.html
* https://www.suse.com/security/cve/CVE-2021-47284.html
* https://www.suse.com/security/cve/CVE-2021-47285.html
* https://www.suse.com/security/cve/CVE-2021-47288.html
* https://www.suse.com/security/cve/CVE-2021-47301.html
* https://www.suse.com/security/cve/CVE-2021-47302.html
* https://www.suse.com/security/cve/CVE-2021-47305.html
* https://www.suse.com/security/cve/CVE-2021-47307.html
* https://www.suse.com/security/cve/CVE-2021-47308.html
* https://www.suse.com/security/cve/CVE-2021-47310.html
* https://www.suse.com/security/cve/CVE-2021-47311.html
* https://www.suse.com/security/cve/CVE-2021-47314.html
* https://www.suse.com/security/cve/CVE-2021-47315.html
* https://www.suse.com/security/cve/CVE-2021-47319.html
* https://www.suse.com/security/cve/CVE-2021-47320.html
* https://www.suse.com/security/cve/CVE-2021-47321.html
* https://www.suse.com/security/cve/CVE-2021-47323.html
* https://www.suse.com/security/cve/CVE-2021-47324.html
* https://www.suse.com/security/cve/CVE-2021-47330.html
* https://www.suse.com/security/cve/CVE-2021-47334.html
* https://www.suse.com/security/cve/CVE-2021-47337.html
* https://www.suse.com/security/cve/CVE-2021-47343.html
* https://www.suse.com/security/cve/CVE-2021-47344.html
* https://www.suse.com/security/cve/CVE-2021-47345.html
* https://www.suse.com/security/cve/CVE-2021-47347.html
* https://www.suse.com/security/cve/CVE-2021-47352.html
* https://www.suse.com/security/cve/CVE-2021-47353.html
* https://www.suse.com/security/cve/CVE-2021-47355.html
* https://www.suse.com/security/cve/CVE-2021-47356.html
* https://www.suse.com/security/cve/CVE-2021-47357.html
* https://www.suse.com/security/cve/CVE-2021-47361.html
* https://www.suse.com/security/cve/CVE-2021-47362.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47397.html
* https://www.suse.com/security/cve/CVE-2021-47400.html
* https://www.suse.com/security/cve/CVE-2021-47401.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47409.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47435.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47458.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47469.html
* https://www.suse.com/security/cve/CVE-2021-47472.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47478.html
* https://www.suse.com/security/cve/CVE-2021-47480.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47509.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47523.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47548.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2022-48708.html
* https://www.suse.com/security/cve/CVE-2022-48710.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-42755.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52527.html
* https://www.suse.com/security/cve/CVE-2023-52586.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52664.html
* https://www.suse.com/security/cve/CVE-2023-52685.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52691.html
* https://www.suse.com/security/cve/CVE-2023-52696.html
* https://www.suse.com/security/cve/CVE-2023-52698.html
* https://www.suse.com/security/cve/CVE-2023-52703.html
* https://www.suse.com/security/cve/CVE-2023-52730.html
* https://www.suse.com/security/cve/CVE-2023-52732.html
* https://www.suse.com/security/cve/CVE-2023-52741.html
* https://www.suse.com/security/cve/CVE-2023-52742.html
* https://www.suse.com/security/cve/CVE-2023-52747.html
* https://www.suse.com/security/cve/CVE-2023-52759.html
* https://www.suse.com/security/cve/CVE-2023-52774.html
* https://www.suse.com/security/cve/CVE-2023-52781.html
* https://www.suse.com/security/cve/CVE-2023-52796.html
* https://www.suse.com/security/cve/CVE-2023-52803.html
* https://www.suse.com/security/cve/CVE-2023-52821.html
* https://www.suse.com/security/cve/CVE-2023-52864.html
* https://www.suse.com/security/cve/CVE-2023-52865.html
* https://www.suse.com/security/cve/CVE-2023-52867.html
* https://www.suse.com/security/cve/CVE-2023-52875.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2024-26625.html
* https://www.suse.com/security/cve/CVE-2024-26752.html
* https://www.suse.com/security/cve/CVE-2024-26775.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26846.html
* https://www.suse.com/security/cve/CVE-2024-26874.html
* https://www.suse.com/security/cve/CVE-2024-26900.html
* https://www.suse.com/security/cve/CVE-2024-26915.html
* https://www.suse.com/security/cve/CVE-2024-26920.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26934.html
* https://www.suse.com/security/cve/CVE-2024-26957.html
* https://www.suse.com/security/cve/CVE-2024-26958.html
* https://www.suse.com/security/cve/CVE-2024-26984.html
* https://www.suse.com/security/cve/CVE-2024-26996.html
* https://www.suse.com/security/cve/CVE-2024-27059.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-27396.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27401.html
* https://www.suse.com/security/cve/CVE-2024-27419.html
* https://www.suse.com/security/cve/CVE-2024-27436.html
* https://www.suse.com/security/cve/CVE-2024-35789.html
* https://www.suse.com/security/cve/CVE-2024-35791.html
* https://www.suse.com/security/cve/CVE-2024-35809.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35830.html
* https://www.suse.com/security/cve/CVE-2024-35849.html
* https://www.suse.com/security/cve/CVE-2024-35877.html
* https://www.suse.com/security/cve/CVE-2024-35878.html
* https://www.suse.com/security/cve/CVE-2024-35887.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-35932.html
* https://www.suse.com/security/cve/CVE-2024-35935.html
* https://www.suse.com/security/cve/CVE-2024-35936.html
* https://www.suse.com/security/cve/CVE-2024-35944.html
* https://www.suse.com/security/cve/CVE-2024-35955.html
* https://www.suse.com/security/cve/CVE-2024-35969.html
* https://www.suse.com/security/cve/CVE-2024-35982.html
* https://www.suse.com/security/cve/CVE-2024-35984.html
* https://www.suse.com/security/cve/CVE-2024-36015.html
* https://www.suse.com/security/cve/CVE-2024-36029.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1101816
* https://bugzilla.suse.com/show_bug.cgi?id=1181674
* https://bugzilla.suse.com/show_bug.cgi?id=1185902
* https://bugzilla.suse.com/show_bug.cgi?id=1187716
* https://bugzilla.suse.com/show_bug.cgi?id=1188616
* https://bugzilla.suse.com/show_bug.cgi?id=1190317
* https://bugzilla.suse.com/show_bug.cgi?id=1190795
* https://bugzilla.suse.com/show_bug.cgi?id=1191452
* https://bugzilla.suse.com/show_bug.cgi?id=1194591
* https://bugzilla.suse.com/show_bug.cgi?id=1197760
* https://bugzilla.suse.com/show_bug.cgi?id=1206213
* https://bugzilla.suse.com/show_bug.cgi?id=1206646
* https://bugzilla.suse.com/show_bug.cgi?id=1207186
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1215702
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217519
* https://bugzilla.suse.com/show_bug.cgi?id=1220487
* https://bugzilla.suse.com/show_bug.cgi?id=1220854
* https://bugzilla.suse.com/show_bug.cgi?id=1220928
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221081
* https://bugzilla.suse.com/show_bug.cgi?id=1221086
* https://bugzilla.suse.com/show_bug.cgi?id=1221977
* https://bugzilla.suse.com/show_bug.cgi?id=1221994
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1222627
* https://bugzilla.suse.com/show_bug.cgi?id=1222667
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222893
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1223023
* https://bugzilla.suse.com/show_bug.cgi?id=1223046
* https://bugzilla.suse.com/show_bug.cgi?id=1223048
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223207
* https://bugzilla.suse.com/show_bug.cgi?id=1223360
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223633
* https://bugzilla.suse.com/show_bug.cgi?id=1223653
* https://bugzilla.suse.com/show_bug.cgi?id=1223666
* https://bugzilla.suse.com/show_bug.cgi?id=1223671
* https://bugzilla.suse.com/show_bug.cgi?id=1223738
* https://bugzilla.suse.com/show_bug.cgi?id=1223752
* https://bugzilla.suse.com/show_bug.cgi?id=1223834
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1224096
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224181
* https://bugzilla.suse.com/show_bug.cgi?id=1224347
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224525
* https://bugzilla.suse.com/show_bug.cgi?id=1224566
* https://bugzilla.suse.com/show_bug.cgi?id=1224580
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224601
* https://bugzilla.suse.com/show_bug.cgi?id=1224607
* https://bugzilla.suse.com/show_bug.cgi?id=1224621
* https://bugzilla.suse.com/show_bug.cgi?id=1224644
* https://bugzilla.suse.com/show_bug.cgi?id=1224645
* https://bugzilla.suse.com/show_bug.cgi?id=1224648
* https://bugzilla.suse.com/show_bug.cgi?id=1224650
* https://bugzilla.suse.com/show_bug.cgi?id=1224663
* https://bugzilla.suse.com/show_bug.cgi?id=1224671
* https://bugzilla.suse.com/show_bug.cgi?id=1224676
* https://bugzilla.suse.com/show_bug.cgi?id=1224680
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224725
* https://bugzilla.suse.com/show_bug.cgi?id=1224728
* https://bugzilla.suse.com/show_bug.cgi?id=1224733
* https://bugzilla.suse.com/show_bug.cgi?id=1224738
* https://bugzilla.suse.com/show_bug.cgi?id=1224747
* https://bugzilla.suse.com/show_bug.cgi?id=1224749
* https://bugzilla.suse.com/show_bug.cgi?id=1224759
* https://bugzilla.suse.com/show_bug.cgi?id=1224803
* https://bugzilla.suse.com/show_bug.cgi?id=1224827
* https://bugzilla.suse.com/show_bug.cgi?id=1224830
* https://bugzilla.suse.com/show_bug.cgi?id=1224831
* https://bugzilla.suse.com/show_bug.cgi?id=1224834
* https://bugzilla.suse.com/show_bug.cgi?id=1224838
* https://bugzilla.suse.com/show_bug.cgi?id=1224841
* https://bugzilla.suse.com/show_bug.cgi?id=1224844
* https://bugzilla.suse.com/show_bug.cgi?id=1224846
* https://bugzilla.suse.com/show_bug.cgi?id=1224847
* https://bugzilla.suse.com/show_bug.cgi?id=1224849
* https://bugzilla.suse.com/show_bug.cgi?id=1224854
* https://bugzilla.suse.com/show_bug.cgi?id=1224859
* https://bugzilla.suse.com/show_bug.cgi?id=1224867
* https://bugzilla.suse.com/show_bug.cgi?id=1224880
* https://bugzilla.suse.com/show_bug.cgi?id=1224882
* https://bugzilla.suse.com/show_bug.cgi?id=1224888
* https://bugzilla.suse.com/show_bug.cgi?id=1224889
* https://bugzilla.suse.com/show_bug.cgi?id=1224892
* https://bugzilla.suse.com/show_bug.cgi?id=1224893
* https://bugzilla.suse.com/show_bug.cgi?id=1224899
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224916
* https://bugzilla.suse.com/show_bug.cgi?id=1224917
* https://bugzilla.suse.com/show_bug.cgi?id=1224922
* https://bugzilla.suse.com/show_bug.cgi?id=1224926
* https://bugzilla.suse.com/show_bug.cgi?id=1224930
* https://bugzilla.suse.com/show_bug.cgi?id=1224931
* https://bugzilla.suse.com/show_bug.cgi?id=1224942
* https://bugzilla.suse.com/show_bug.cgi?id=1224954
* https://bugzilla.suse.com/show_bug.cgi?id=1224957
* https://bugzilla.suse.com/show_bug.cgi?id=1224959
* https://bugzilla.suse.com/show_bug.cgi?id=1224960
* https://bugzilla.suse.com/show_bug.cgi?id=1224961
* https://bugzilla.suse.com/show_bug.cgi?id=1224963
* https://bugzilla.suse.com/show_bug.cgi?id=1224966
* https://bugzilla.suse.com/show_bug.cgi?id=1224968
* https://bugzilla.suse.com/show_bug.cgi?id=1224981
* https://bugzilla.suse.com/show_bug.cgi?id=1224982
* https://bugzilla.suse.com/show_bug.cgi?id=1224983
* https://bugzilla.suse.com/show_bug.cgi?id=1224987
* https://bugzilla.suse.com/show_bug.cgi?id=1224990
* https://bugzilla.suse.com/show_bug.cgi?id=1224996
* https://bugzilla.suse.com/show_bug.cgi?id=1225008
* https://bugzilla.suse.com/show_bug.cgi?id=1225009
* https://bugzilla.suse.com/show_bug.cgi?id=1225010
* https://bugzilla.suse.com/show_bug.cgi?id=1225022
* https://bugzilla.suse.com/show_bug.cgi?id=1225026
* https://bugzilla.suse.com/show_bug.cgi?id=1225030
* https://bugzilla.suse.com/show_bug.cgi?id=1225054
* https://bugzilla.suse.com/show_bug.cgi?id=1225058
* https://bugzilla.suse.com/show_bug.cgi?id=1225059
* https://bugzilla.suse.com/show_bug.cgi?id=1225060
* https://bugzilla.suse.com/show_bug.cgi?id=1225062
* https://bugzilla.suse.com/show_bug.cgi?id=1225082
* https://bugzilla.suse.com/show_bug.cgi?id=1225084
* https://bugzilla.suse.com/show_bug.cgi?id=1225086
* https://bugzilla.suse.com/show_bug.cgi?id=1225092
* https://bugzilla.suse.com/show_bug.cgi?id=1225096
* https://bugzilla.suse.com/show_bug.cgi?id=1225112
* https://bugzilla.suse.com/show_bug.cgi?id=1225124
* https://bugzilla.suse.com/show_bug.cgi?id=1225128
* https://bugzilla.suse.com/show_bug.cgi?id=1225132
* https://bugzilla.suse.com/show_bug.cgi?id=1225141
* https://bugzilla.suse.com/show_bug.cgi?id=1225143
* https://bugzilla.suse.com/show_bug.cgi?id=1225144
* https://bugzilla.suse.com/show_bug.cgi?id=1225151
* https://bugzilla.suse.com/show_bug.cgi?id=1225153
* https://bugzilla.suse.com/show_bug.cgi?id=1225155
* https://bugzilla.suse.com/show_bug.cgi?id=1225157
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225177
* https://bugzilla.suse.com/show_bug.cgi?id=1225189
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225198
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225222
* https://bugzilla.suse.com/show_bug.cgi?id=1225230
* https://bugzilla.suse.com/show_bug.cgi?id=1225242
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225247
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225252
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225322
* https://bugzilla.suse.com/show_bug.cgi?id=1225329
* https://bugzilla.suse.com/show_bug.cgi?id=1225330
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225347
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225409
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225438
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225479
* https://bugzilla.suse.com/show_bug.cgi?id=1225482
* https://bugzilla.suse.com/show_bug.cgi?id=1225506
* https://bugzilla.suse.com/show_bug.cgi?id=1225549
* https://bugzilla.suse.com/show_bug.cgi?id=1225560
* https://bugzilla.suse.com/show_bug.cgi?id=1225572
* https://bugzilla.suse.com/show_bug.cgi?id=1225640
* https://bugzilla.suse.com/show_bug.cgi?id=1225708
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240611/89f219ab/attachment.htm>
More information about the sle-updates
mailing list