SUSE-SU-2024:1983-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Tue Jun 11 12:30:57 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:1983-1  
Rating: important  
References:

  * bsc#1065729
  * bsc#1101816
  * bsc#1141539
  * bsc#1181674
  * bsc#1185902
  * bsc#1187716
  * bsc#1188616
  * bsc#1190317
  * bsc#1190795
  * bsc#1191452
  * bsc#1194591
  * bsc#1197760
  * bsc#1197894
  * bsc#1203935
  * bsc#1206213
  * bsc#1206646
  * bsc#1207186
  * bsc#1209657
  * bsc#1210335
  * bsc#1215702
  * bsc#1216702
  * bsc#1217169
  * bsc#1217519
  * bsc#1218917
  * bsc#1220487
  * bsc#1220513
  * bsc#1220854
  * bsc#1220928
  * bsc#1221044
  * bsc#1221081
  * bsc#1221086
  * bsc#1221543
  * bsc#1221545
  * bsc#1221816
  * bsc#1221977
  * bsc#1221994
  * bsc#1222559
  * bsc#1222619
  * bsc#1222627
  * bsc#1222667
  * bsc#1222671
  * bsc#1222793
  * bsc#1222893
  * bsc#1222894
  * bsc#1223023
  * bsc#1223046
  * bsc#1223048
  * bsc#1223084
  * bsc#1223119
  * bsc#1223138
  * bsc#1223207
  * bsc#1223360
  * bsc#1223384
  * bsc#1223432
  * bsc#1223509
  * bsc#1223512
  * bsc#1223539
  * bsc#1223540
  * bsc#1223626
  * bsc#1223627
  * bsc#1223633
  * bsc#1223653
  * bsc#1223666
  * bsc#1223671
  * bsc#1223712
  * bsc#1223715
  * bsc#1223738
  * bsc#1223744
  * bsc#1223752
  * bsc#1223802
  * bsc#1223819
  * bsc#1223834
  * bsc#1223922
  * bsc#1223923
  * bsc#1223931
  * bsc#1223932
  * bsc#1223948
  * bsc#1223969
  * bsc#1224096
  * bsc#1224174
  * bsc#1224181
  * bsc#1224347
  * bsc#1224482
  * bsc#1224511
  * bsc#1224525
  * bsc#1224566
  * bsc#1224580
  * bsc#1224592
  * bsc#1224601
  * bsc#1224607
  * bsc#1224621
  * bsc#1224644
  * bsc#1224645
  * bsc#1224648
  * bsc#1224650
  * bsc#1224663
  * bsc#1224671
  * bsc#1224676
  * bsc#1224680
  * bsc#1224682
  * bsc#1224725
  * bsc#1224728
  * bsc#1224733
  * bsc#1224738
  * bsc#1224747
  * bsc#1224749
  * bsc#1224759
  * bsc#1224803
  * bsc#1224827
  * bsc#1224830
  * bsc#1224831
  * bsc#1224834
  * bsc#1224838
  * bsc#1224841
  * bsc#1224844
  * bsc#1224846
  * bsc#1224847
  * bsc#1224849
  * bsc#1224854
  * bsc#1224859
  * bsc#1224867
  * bsc#1224880
  * bsc#1224882
  * bsc#1224888
  * bsc#1224889
  * bsc#1224892
  * bsc#1224893
  * bsc#1224899
  * bsc#1224904
  * bsc#1224907
  * bsc#1224916
  * bsc#1224917
  * bsc#1224922
  * bsc#1224926
  * bsc#1224930
  * bsc#1224931
  * bsc#1224942
  * bsc#1224954
  * bsc#1224956
  * bsc#1224957
  * bsc#1224959
  * bsc#1224960
  * bsc#1224961
  * bsc#1224963
  * bsc#1224966
  * bsc#1224968
  * bsc#1224981
  * bsc#1224982
  * bsc#1224983
  * bsc#1224987
  * bsc#1224990
  * bsc#1224996
  * bsc#1225008
  * bsc#1225009
  * bsc#1225010
  * bsc#1225022
  * bsc#1225026
  * bsc#1225030
  * bsc#1225054
  * bsc#1225058
  * bsc#1225059
  * bsc#1225060
  * bsc#1225062
  * bsc#1225082
  * bsc#1225084
  * bsc#1225086
  * bsc#1225092
  * bsc#1225096
  * bsc#1225112
  * bsc#1225124
  * bsc#1225128
  * bsc#1225132
  * bsc#1225141
  * bsc#1225143
  * bsc#1225144
  * bsc#1225151
  * bsc#1225153
  * bsc#1225155
  * bsc#1225157
  * bsc#1225164
  * bsc#1225177
  * bsc#1225189
  * bsc#1225192
  * bsc#1225193
  * bsc#1225198
  * bsc#1225201
  * bsc#1225207
  * bsc#1225208
  * bsc#1225222
  * bsc#1225230
  * bsc#1225242
  * bsc#1225244
  * bsc#1225247
  * bsc#1225251
  * bsc#1225252
  * bsc#1225256
  * bsc#1225303
  * bsc#1225318
  * bsc#1225322
  * bsc#1225329
  * bsc#1225330
  * bsc#1225336
  * bsc#1225347
  * bsc#1225351
  * bsc#1225354
  * bsc#1225355
  * bsc#1225360
  * bsc#1225366
  * bsc#1225367
  * bsc#1225384
  * bsc#1225390
  * bsc#1225404
  * bsc#1225409
  * bsc#1225411
  * bsc#1225438
  * bsc#1225453
  * bsc#1225479
  * bsc#1225482
  * bsc#1225506
  * bsc#1225549
  * bsc#1225560
  * bsc#1225572
  * bsc#1225640
  * bsc#1225708
  * bsc#1225764

  
Cross-References:

  * CVE-2021-46933
  * CVE-2021-46955
  * CVE-2021-47074
  * CVE-2021-47113
  * CVE-2021-47131
  * CVE-2021-47162
  * CVE-2021-47171
  * CVE-2021-47188
  * CVE-2021-47206
  * CVE-2021-47220
  * CVE-2021-47229
  * CVE-2021-47231
  * CVE-2021-47235
  * CVE-2021-47236
  * CVE-2021-47237
  * CVE-2021-47238
  * CVE-2021-47239
  * CVE-2021-47245
  * CVE-2021-47246
  * CVE-2021-47248
  * CVE-2021-47249
  * CVE-2021-47250
  * CVE-2021-47252
  * CVE-2021-47254
  * CVE-2021-47258
  * CVE-2021-47260
  * CVE-2021-47261
  * CVE-2021-47265
  * CVE-2021-47269
  * CVE-2021-47274
  * CVE-2021-47276
  * CVE-2021-47277
  * CVE-2021-47280
  * CVE-2021-47281
  * CVE-2021-47284
  * CVE-2021-47285
  * CVE-2021-47288
  * CVE-2021-47301
  * CVE-2021-47302
  * CVE-2021-47305
  * CVE-2021-47307
  * CVE-2021-47308
  * CVE-2021-47310
  * CVE-2021-47311
  * CVE-2021-47314
  * CVE-2021-47315
  * CVE-2021-47319
  * CVE-2021-47320
  * CVE-2021-47321
  * CVE-2021-47323
  * CVE-2021-47324
  * CVE-2021-47330
  * CVE-2021-47334
  * CVE-2021-47337
  * CVE-2021-47343
  * CVE-2021-47344
  * CVE-2021-47345
  * CVE-2021-47347
  * CVE-2021-47352
  * CVE-2021-47353
  * CVE-2021-47355
  * CVE-2021-47356
  * CVE-2021-47357
  * CVE-2021-47361
  * CVE-2021-47362
  * CVE-2021-47369
  * CVE-2021-47375
  * CVE-2021-47378
  * CVE-2021-47382
  * CVE-2021-47383
  * CVE-2021-47391
  * CVE-2021-47397
  * CVE-2021-47400
  * CVE-2021-47401
  * CVE-2021-47404
  * CVE-2021-47409
  * CVE-2021-47416
  * CVE-2021-47423
  * CVE-2021-47424
  * CVE-2021-47431
  * CVE-2021-47435
  * CVE-2021-47436
  * CVE-2021-47456
  * CVE-2021-47458
  * CVE-2021-47460
  * CVE-2021-47469
  * CVE-2021-47472
  * CVE-2021-47473
  * CVE-2021-47478
  * CVE-2021-47480
  * CVE-2021-47483
  * CVE-2021-47485
  * CVE-2021-47495
  * CVE-2021-47496
  * CVE-2021-47497
  * CVE-2021-47500
  * CVE-2021-47506
  * CVE-2021-47509
  * CVE-2021-47511
  * CVE-2021-47523
  * CVE-2021-47541
  * CVE-2021-47548
  * CVE-2021-47565
  * CVE-2022-48636
  * CVE-2022-48650
  * CVE-2022-48672
  * CVE-2022-48686
  * CVE-2022-48697
  * CVE-2022-48702
  * CVE-2022-48704
  * CVE-2022-48708
  * CVE-2022-48710
  * CVE-2023-0160
  * CVE-2023-1829
  * CVE-2023-42755
  * CVE-2023-47233
  * CVE-2023-52527
  * CVE-2023-52586
  * CVE-2023-52591
  * CVE-2023-52646
  * CVE-2023-52653
  * CVE-2023-52655
  * CVE-2023-52664
  * CVE-2023-52685
  * CVE-2023-52686
  * CVE-2023-52691
  * CVE-2023-52696
  * CVE-2023-52698
  * CVE-2023-52703
  * CVE-2023-52730
  * CVE-2023-52732
  * CVE-2023-52741
  * CVE-2023-52742
  * CVE-2023-52747
  * CVE-2023-52759
  * CVE-2023-52774
  * CVE-2023-52781
  * CVE-2023-52796
  * CVE-2023-52803
  * CVE-2023-52821
  * CVE-2023-52864
  * CVE-2023-52865
  * CVE-2023-52867
  * CVE-2023-52875
  * CVE-2023-52880
  * CVE-2024-0639
  * CVE-2024-26625
  * CVE-2024-26739
  * CVE-2024-26752
  * CVE-2024-26775
  * CVE-2024-26791
  * CVE-2024-26828
  * CVE-2024-26846
  * CVE-2024-26874
  * CVE-2024-26876
  * CVE-2024-26900
  * CVE-2024-26915
  * CVE-2024-26920
  * CVE-2024-26921
  * CVE-2024-26929
  * CVE-2024-26930
  * CVE-2024-26931
  * CVE-2024-26934
  * CVE-2024-26957
  * CVE-2024-26958
  * CVE-2024-26984
  * CVE-2024-26996
  * CVE-2024-27008
  * CVE-2024-27054
  * CVE-2024-27059
  * CVE-2024-27062
  * CVE-2024-27388
  * CVE-2024-27396
  * CVE-2024-27398
  * CVE-2024-27401
  * CVE-2024-27419
  * CVE-2024-27436
  * CVE-2024-35789
  * CVE-2024-35791
  * CVE-2024-35809
  * CVE-2024-35811
  * CVE-2024-35830
  * CVE-2024-35849
  * CVE-2024-35877
  * CVE-2024-35878
  * CVE-2024-35887
  * CVE-2024-35895
  * CVE-2024-35914
  * CVE-2024-35932
  * CVE-2024-35935
  * CVE-2024-35936
  * CVE-2024-35944
  * CVE-2024-35955
  * CVE-2024-35969
  * CVE-2024-35982
  * CVE-2024-35984
  * CVE-2024-36015
  * CVE-2024-36029
  * CVE-2024-36954

  
CVSS scores:

  * CVE-2021-46933 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-46933 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-46955 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47074 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47113 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47131 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47171 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47171 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47206 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47220 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47231 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47235 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47236 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47237 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47239 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47245 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47246 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47248 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47249 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47250 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47252 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2021-47254 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47258 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47260 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47261 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47265 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47269 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47274 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47276 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47277 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47280 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47284 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47285 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47288 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-47301 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47302 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47307 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47308 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47310 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47311 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47314 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47315 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47319 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47320 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47321 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47323 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47324 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47330 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47334 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47337 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47343 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2021-47344 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47345 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47347 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47352 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2021-47353 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47355 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47356 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47357 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47361 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47362 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47369 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47375 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47378 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47382 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47383 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47391 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47397 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47400 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47401 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47404 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47409 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47416 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47423 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47424 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47431 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47435 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47456 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47469 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47472 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47473 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47478 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47480 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47483 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47485 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47495 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47496 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47497 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47500 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47506 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47509 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47511 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47523 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47541 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47541 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47548 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2021-47565 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48636 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48650 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48672 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-48672 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48686 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48686 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48697 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-48702 ( SUSE ):  5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48708 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48710 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-1829 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-1829 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-42755 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2023-42755 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( NVD ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52527 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52586 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52591 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52646 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52653 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52685 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52686 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52691 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52698 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52703 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52730 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52741 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52742 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52747 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52781 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52803 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52865 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52867 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52875 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-0639 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-0639 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26625 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26752 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-26775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26828 ( SUSE ):  7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
  * CVE-2024-26846 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26874 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26876 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26900 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26921 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26934 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26996 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27008 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-27054 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27388 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27396 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27398 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27401 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27419 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-27436 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35789 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-35791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35809 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-35877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35936 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35944 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-35955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35984 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36015 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36029 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36954 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Real Time 12 SP5
  * SUSE Linux Enterprise Server 12 SP5

  
  
An update that solves 199 vulnerabilities and has 26 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
  * CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948).
  * CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
  * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
    (bsc#1225201).
  * CVE-2022-48697: Fix a use-after-free (bsc#1223922).
  * CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
  * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
  * CVE-2023-42755: Check user supplied offsets (bsc#1215702).
  * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
  * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
  * CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
  * CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace
    (bsc#1225222).
  * CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks()
    (bsc#1224644)
  * CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506)
  * CVE-2024-36029: Pervent access to suspended controller (bsc#1225708)
  * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
  * CVE-2021-47352: Add validation for used length (bsc#1225124).
  * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
  * CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
  * CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref()
    (bsc#1224645)
  * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
  * CVE-2021-47423: Fix file release memory leak (bsc#1225366).
  * CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
  * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
    (bsc#1225355).
  * CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
  * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
  * CVE-2024-35809: Drain runtime-idle callbacks before driver removal
    (bsc#1224738).
  * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
    (bsc#1225208).
  * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
  * CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
  * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
  * CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
  * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
    ipv6_del_addr (bsc#1224580).
  * CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot
    accesses (bsc#1224960).
  * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in
    svm_register_enc_region() (bsc#1224725).
  * CVE-2021-47401: Fix stack information leak (bsc#1225242).
  * CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
  * CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
  * CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
  * CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
  * CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
  * CVE-2023-52864: Fix opening of char device (bsc#1225132).
  * CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
  * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
    (bsc#1224648).
  * CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
  * CVE-2023-52730: Fix possible resource leaks in some error paths
    (bsc#1224956).
  * CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup()
    (bsc#1225141).
  * CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
  * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()
    (bsc#1224671).
  * CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
  * CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
  * CVE-2021-47397: Break out if skb_header_pointer returns NULL in
    sctp_rcv_ootb (bsc#1225082)
  * CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
  * CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino()
    (bsc#1224733).
  * CVE-2024-27436: Stop parsing channels bits when all channels are found
    (bsc#1224803).
  * CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
  * CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749).
  * CVE-2024-35830: Register v4l2 async device only after successful setup
    (bsc#1224680).
  * CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
  * CVE-2021-47357: Fix possible use-after-free in ia_module_exit()
    (bsc#1225144).
  * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
  * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
  * CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer
    (bzg#1224663)
  * CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit()
    (bsc#1224907).
  * CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
  * CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
  * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
    (bsc#1224174).
  * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
  * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
  * CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
  * CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
  * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
  * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
  * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
  * CVE-2024-27401: Fixed user_length taken into account when fetching packet
    contents (bsc#1224181).
  * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
  * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
  * CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
  * CVE-2021-47206: Check return value after calling platform_get_resource()
    (bsc#1222894).
  * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
  * CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error
    (bsc#1223752).
  * CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
    (bsc#1223048)
  * CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()
    (bsc#1223923).
  * CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931).
  * CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second
    ref (bsc#1221543).
  * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
  * CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up
    (bsc#1221545).
  * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
    fragmenting IPv4 packets (bsc#1220513).
  * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
    found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
  * CVE-2024-27008: Fix out of bounds access (bsc#1223802).
  * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
  * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
    filter (tcindex) (bsc#1210335).

The following non-security bugs were fixed:

  * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
    (bsc#1223384).
  * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
  * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
  * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
  * assoc_array: Fix BUG_ON during garbage collect.
  * autofs: fix a leak in autofs_expire_indirect() (git-fixes)
  * Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
  * btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit
    (git-fixes)
  * btrfs: check if root is readonly while setting security xattr (git-fixes)
  * btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag
    (git-fixes)
  * btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
  * btrfs: do not stop integrity writeback too early (git-fixes)
  * btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
  * btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
  * btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
  * btrfs: fix deadlock when writing out space cache (git-fixes)
  * Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO
    (git-fixes)
  * btrfs: fix lockdep splat and potential deadlock after failure running
    delayed items (git-fixes)
  * btrfs: fix lost error handling when looking up extended ref on log replay
    (git-fixes)
  * btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
  * btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
  * btrfs: fix race when deleting quota root from the dirty cow roots list (git-
    fixes)
  * btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
  * btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
  * btrfs: fix unaligned access in readdir (git-fixes)
  * btrfs: limit device extents to the device size (git-fixes)
  * btrfs: prevent to set invalid default subvolid (git-fixes)
  * btrfs: record delayed inode root in transaction (git-fixes)
  * btrfs: scrub: reject unsupported scrub flags (git-fixes)
  * btrfs: send: ensure send_fd is writable (git-fixes)
  * btrfs: send: in case of IO error log it (git-fixes)
  * btrfs: send: limit number of clones and allocated memory size (git-fixes)
  * btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add
    #include
  * btrfs: tree-checker: add missing return after error in root_item (git-fixes)
  * btrfs: tree-checker: add missing returns after data_ref alignment checks
    (git-fixes)
  * btrfs: tree-checker: do not error out if extent ref hash does not match
    (git-fixes)
  * btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
  * btrfs: tree-checker: Fix misleading group system information (git-fixes)
  * btrfs: undo writable superblocke when sprouting fails (git-fixes)
  * btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
  * ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
  * ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
  * ecryptfs: fix kernel panic with null dev_name (git-fixes)
  * ecryptfs: Fix typo in message (git-fixes)
  * ep_create_wakeup_source(): dentry name can change under you (git-fixes)
  * exportfs_decode_fh(): negative pinned may become positive without the parent
    locked (git-fixes)
  * fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys
    inodes (git-fixes)
  * fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
  * ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-
    fixes).
  * ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-
    fixes).
  * kprobes: Fix possible use-after-free issue on kprobe registration (git-
    fixes).
  * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
    bsc#1225059).
  * l2tp: pass correct message length to ip6_append_data (git-fixes).
  * lib/mpi: use kcalloc in mpi_resize (git-fixes).
  * list: fix a data-race around ep->rdllist (git-fixes).
  * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
  * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
  * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
  * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
  * net: usb: sr9700: stop lying about skb->truesize (git-fixes).
  * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
    (bsc#1223360).
  * net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
  * net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
  * netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
  * netfilter: nft_compat: explicitly reject ERROR and standard target (git-
    fixes).
  * netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
  * nfc: change order inside nfc_se_io error path (git-fixes).
  * powerpc/pseries/lparcfg: drop error message from guest name lookup
    (bsc#1187716 ltc#193451 git-fixes).
  * ppdev: Add an error check in register_device (git-fixes).
  * printk: Disable passing console lock owner completely during panic()
    (bsc#1197894).
  * printk: Update @console_may_schedule in console_trylock_spinning()
    (bsc#1223969).
  * rds: avoid unenecessary cong_update in loop transport (git-fixes).
  * rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
  * ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
  * ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
  * rxrpc: Do not put crypto buffers on the stack (git-fixes).
  * rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
  * rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls
    (git-fixes).
  * rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-
    fixes).
  * rxrpc: Work around usercopy check (git-fixes).
  * s390/cpum_cf: make crypto counters upward compatible across machine types
    (bsc#1224347).
  * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes
    bsc#1225062).
  * tcp: tcp_make_synack() can be called from process context (git-fixes).
  * tls: Fix context leak on tls_device_down (bsc#1221545).
  * tracing: Fix blocked reader of snapshot buffer (git-fixes).
  * tracing: hide unused ftrace_event_id_fops (git-fixes).
  * tracing: Use .flush() call to wake up readers (git-fixes).
  * tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-
    fixes).
  * tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).
  * usb: aqc111: stop lying about skb->truesize (git-fixes).
  * wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
  * wifi: radiotap: fix kernel-doc notation warnings (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Real Time 12 SP5  
    zypper in -t patch SUSE-SLE-RT-12-SP5-2024-1983=1

## Package List:

  * SUSE Linux Enterprise Real Time 12 SP5 (x86_64)
    * gfs2-kmp-rt-debuginfo-4.12.14-10.188.1
    * kernel-rt-devel-4.12.14-10.188.1
    * kernel-rt-debugsource-4.12.14-10.188.1
    * kernel-rt_debug-debugsource-4.12.14-10.188.1
    * cluster-md-kmp-rt-debuginfo-4.12.14-10.188.1
    * dlm-kmp-rt-debuginfo-4.12.14-10.188.1
    * cluster-md-kmp-rt-4.12.14-10.188.1
    * kernel-rt_debug-devel-debuginfo-4.12.14-10.188.1
    * kernel-syms-rt-4.12.14-10.188.1
    * ocfs2-kmp-rt-debuginfo-4.12.14-10.188.1
    * gfs2-kmp-rt-4.12.14-10.188.1
    * kernel-rt-debuginfo-4.12.14-10.188.1
    * kernel-rt-devel-debuginfo-4.12.14-10.188.1
    * kernel-rt-base-4.12.14-10.188.1
    * kernel-rt-base-debuginfo-4.12.14-10.188.1
    * ocfs2-kmp-rt-4.12.14-10.188.1
    * dlm-kmp-rt-4.12.14-10.188.1
    * kernel-rt_debug-debuginfo-4.12.14-10.188.1
    * kernel-rt_debug-devel-4.12.14-10.188.1
  * SUSE Linux Enterprise Real Time 12 SP5 (noarch)
    * kernel-devel-rt-4.12.14-10.188.1
    * kernel-source-rt-4.12.14-10.188.1
  * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64)
    * kernel-rt-4.12.14-10.188.1
    * kernel-rt_debug-4.12.14-10.188.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-46933.html
  * https://www.suse.com/security/cve/CVE-2021-46955.html
  * https://www.suse.com/security/cve/CVE-2021-47074.html
  * https://www.suse.com/security/cve/CVE-2021-47113.html
  * https://www.suse.com/security/cve/CVE-2021-47131.html
  * https://www.suse.com/security/cve/CVE-2021-47162.html
  * https://www.suse.com/security/cve/CVE-2021-47171.html
  * https://www.suse.com/security/cve/CVE-2021-47188.html
  * https://www.suse.com/security/cve/CVE-2021-47206.html
  * https://www.suse.com/security/cve/CVE-2021-47220.html
  * https://www.suse.com/security/cve/CVE-2021-47229.html
  * https://www.suse.com/security/cve/CVE-2021-47231.html
  * https://www.suse.com/security/cve/CVE-2021-47235.html
  * https://www.suse.com/security/cve/CVE-2021-47236.html
  * https://www.suse.com/security/cve/CVE-2021-47237.html
  * https://www.suse.com/security/cve/CVE-2021-47238.html
  * https://www.suse.com/security/cve/CVE-2021-47239.html
  * https://www.suse.com/security/cve/CVE-2021-47245.html
  * https://www.suse.com/security/cve/CVE-2021-47246.html
  * https://www.suse.com/security/cve/CVE-2021-47248.html
  * https://www.suse.com/security/cve/CVE-2021-47249.html
  * https://www.suse.com/security/cve/CVE-2021-47250.html
  * https://www.suse.com/security/cve/CVE-2021-47252.html
  * https://www.suse.com/security/cve/CVE-2021-47254.html
  * https://www.suse.com/security/cve/CVE-2021-47258.html
  * https://www.suse.com/security/cve/CVE-2021-47260.html
  * https://www.suse.com/security/cve/CVE-2021-47261.html
  * https://www.suse.com/security/cve/CVE-2021-47265.html
  * https://www.suse.com/security/cve/CVE-2021-47269.html
  * https://www.suse.com/security/cve/CVE-2021-47274.html
  * https://www.suse.com/security/cve/CVE-2021-47276.html
  * https://www.suse.com/security/cve/CVE-2021-47277.html
  * https://www.suse.com/security/cve/CVE-2021-47280.html
  * https://www.suse.com/security/cve/CVE-2021-47281.html
  * https://www.suse.com/security/cve/CVE-2021-47284.html
  * https://www.suse.com/security/cve/CVE-2021-47285.html
  * https://www.suse.com/security/cve/CVE-2021-47288.html
  * https://www.suse.com/security/cve/CVE-2021-47301.html
  * https://www.suse.com/security/cve/CVE-2021-47302.html
  * https://www.suse.com/security/cve/CVE-2021-47305.html
  * https://www.suse.com/security/cve/CVE-2021-47307.html
  * https://www.suse.com/security/cve/CVE-2021-47308.html
  * https://www.suse.com/security/cve/CVE-2021-47310.html
  * https://www.suse.com/security/cve/CVE-2021-47311.html
  * https://www.suse.com/security/cve/CVE-2021-47314.html
  * https://www.suse.com/security/cve/CVE-2021-47315.html
  * https://www.suse.com/security/cve/CVE-2021-47319.html
  * https://www.suse.com/security/cve/CVE-2021-47320.html
  * https://www.suse.com/security/cve/CVE-2021-47321.html
  * https://www.suse.com/security/cve/CVE-2021-47323.html
  * https://www.suse.com/security/cve/CVE-2021-47324.html
  * https://www.suse.com/security/cve/CVE-2021-47330.html
  * https://www.suse.com/security/cve/CVE-2021-47334.html
  * https://www.suse.com/security/cve/CVE-2021-47337.html
  * https://www.suse.com/security/cve/CVE-2021-47343.html
  * https://www.suse.com/security/cve/CVE-2021-47344.html
  * https://www.suse.com/security/cve/CVE-2021-47345.html
  * https://www.suse.com/security/cve/CVE-2021-47347.html
  * https://www.suse.com/security/cve/CVE-2021-47352.html
  * https://www.suse.com/security/cve/CVE-2021-47353.html
  * https://www.suse.com/security/cve/CVE-2021-47355.html
  * https://www.suse.com/security/cve/CVE-2021-47356.html
  * https://www.suse.com/security/cve/CVE-2021-47357.html
  * https://www.suse.com/security/cve/CVE-2021-47361.html
  * https://www.suse.com/security/cve/CVE-2021-47362.html
  * https://www.suse.com/security/cve/CVE-2021-47369.html
  * https://www.suse.com/security/cve/CVE-2021-47375.html
  * https://www.suse.com/security/cve/CVE-2021-47378.html
  * https://www.suse.com/security/cve/CVE-2021-47382.html
  * https://www.suse.com/security/cve/CVE-2021-47383.html
  * https://www.suse.com/security/cve/CVE-2021-47391.html
  * https://www.suse.com/security/cve/CVE-2021-47397.html
  * https://www.suse.com/security/cve/CVE-2021-47400.html
  * https://www.suse.com/security/cve/CVE-2021-47401.html
  * https://www.suse.com/security/cve/CVE-2021-47404.html
  * https://www.suse.com/security/cve/CVE-2021-47409.html
  * https://www.suse.com/security/cve/CVE-2021-47416.html
  * https://www.suse.com/security/cve/CVE-2021-47423.html
  * https://www.suse.com/security/cve/CVE-2021-47424.html
  * https://www.suse.com/security/cve/CVE-2021-47431.html
  * https://www.suse.com/security/cve/CVE-2021-47435.html
  * https://www.suse.com/security/cve/CVE-2021-47436.html
  * https://www.suse.com/security/cve/CVE-2021-47456.html
  * https://www.suse.com/security/cve/CVE-2021-47458.html
  * https://www.suse.com/security/cve/CVE-2021-47460.html
  * https://www.suse.com/security/cve/CVE-2021-47469.html
  * https://www.suse.com/security/cve/CVE-2021-47472.html
  * https://www.suse.com/security/cve/CVE-2021-47473.html
  * https://www.suse.com/security/cve/CVE-2021-47478.html
  * https://www.suse.com/security/cve/CVE-2021-47480.html
  * https://www.suse.com/security/cve/CVE-2021-47483.html
  * https://www.suse.com/security/cve/CVE-2021-47485.html
  * https://www.suse.com/security/cve/CVE-2021-47495.html
  * https://www.suse.com/security/cve/CVE-2021-47496.html
  * https://www.suse.com/security/cve/CVE-2021-47497.html
  * https://www.suse.com/security/cve/CVE-2021-47500.html
  * https://www.suse.com/security/cve/CVE-2021-47506.html
  * https://www.suse.com/security/cve/CVE-2021-47509.html
  * https://www.suse.com/security/cve/CVE-2021-47511.html
  * https://www.suse.com/security/cve/CVE-2021-47523.html
  * https://www.suse.com/security/cve/CVE-2021-47541.html
  * https://www.suse.com/security/cve/CVE-2021-47548.html
  * https://www.suse.com/security/cve/CVE-2021-47565.html
  * https://www.suse.com/security/cve/CVE-2022-48636.html
  * https://www.suse.com/security/cve/CVE-2022-48650.html
  * https://www.suse.com/security/cve/CVE-2022-48672.html
  * https://www.suse.com/security/cve/CVE-2022-48686.html
  * https://www.suse.com/security/cve/CVE-2022-48697.html
  * https://www.suse.com/security/cve/CVE-2022-48702.html
  * https://www.suse.com/security/cve/CVE-2022-48704.html
  * https://www.suse.com/security/cve/CVE-2022-48708.html
  * https://www.suse.com/security/cve/CVE-2022-48710.html
  * https://www.suse.com/security/cve/CVE-2023-0160.html
  * https://www.suse.com/security/cve/CVE-2023-1829.html
  * https://www.suse.com/security/cve/CVE-2023-42755.html
  * https://www.suse.com/security/cve/CVE-2023-47233.html
  * https://www.suse.com/security/cve/CVE-2023-52527.html
  * https://www.suse.com/security/cve/CVE-2023-52586.html
  * https://www.suse.com/security/cve/CVE-2023-52591.html
  * https://www.suse.com/security/cve/CVE-2023-52646.html
  * https://www.suse.com/security/cve/CVE-2023-52653.html
  * https://www.suse.com/security/cve/CVE-2023-52655.html
  * https://www.suse.com/security/cve/CVE-2023-52664.html
  * https://www.suse.com/security/cve/CVE-2023-52685.html
  * https://www.suse.com/security/cve/CVE-2023-52686.html
  * https://www.suse.com/security/cve/CVE-2023-52691.html
  * https://www.suse.com/security/cve/CVE-2023-52696.html
  * https://www.suse.com/security/cve/CVE-2023-52698.html
  * https://www.suse.com/security/cve/CVE-2023-52703.html
  * https://www.suse.com/security/cve/CVE-2023-52730.html
  * https://www.suse.com/security/cve/CVE-2023-52732.html
  * https://www.suse.com/security/cve/CVE-2023-52741.html
  * https://www.suse.com/security/cve/CVE-2023-52742.html
  * https://www.suse.com/security/cve/CVE-2023-52747.html
  * https://www.suse.com/security/cve/CVE-2023-52759.html
  * https://www.suse.com/security/cve/CVE-2023-52774.html
  * https://www.suse.com/security/cve/CVE-2023-52781.html
  * https://www.suse.com/security/cve/CVE-2023-52796.html
  * https://www.suse.com/security/cve/CVE-2023-52803.html
  * https://www.suse.com/security/cve/CVE-2023-52821.html
  * https://www.suse.com/security/cve/CVE-2023-52864.html
  * https://www.suse.com/security/cve/CVE-2023-52865.html
  * https://www.suse.com/security/cve/CVE-2023-52867.html
  * https://www.suse.com/security/cve/CVE-2023-52875.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2024-0639.html
  * https://www.suse.com/security/cve/CVE-2024-26625.html
  * https://www.suse.com/security/cve/CVE-2024-26739.html
  * https://www.suse.com/security/cve/CVE-2024-26752.html
  * https://www.suse.com/security/cve/CVE-2024-26775.html
  * https://www.suse.com/security/cve/CVE-2024-26791.html
  * https://www.suse.com/security/cve/CVE-2024-26828.html
  * https://www.suse.com/security/cve/CVE-2024-26846.html
  * https://www.suse.com/security/cve/CVE-2024-26874.html
  * https://www.suse.com/security/cve/CVE-2024-26876.html
  * https://www.suse.com/security/cve/CVE-2024-26900.html
  * https://www.suse.com/security/cve/CVE-2024-26915.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-26921.html
  * https://www.suse.com/security/cve/CVE-2024-26929.html
  * https://www.suse.com/security/cve/CVE-2024-26930.html
  * https://www.suse.com/security/cve/CVE-2024-26931.html
  * https://www.suse.com/security/cve/CVE-2024-26934.html
  * https://www.suse.com/security/cve/CVE-2024-26957.html
  * https://www.suse.com/security/cve/CVE-2024-26958.html
  * https://www.suse.com/security/cve/CVE-2024-26984.html
  * https://www.suse.com/security/cve/CVE-2024-26996.html
  * https://www.suse.com/security/cve/CVE-2024-27008.html
  * https://www.suse.com/security/cve/CVE-2024-27054.html
  * https://www.suse.com/security/cve/CVE-2024-27059.html
  * https://www.suse.com/security/cve/CVE-2024-27062.html
  * https://www.suse.com/security/cve/CVE-2024-27388.html
  * https://www.suse.com/security/cve/CVE-2024-27396.html
  * https://www.suse.com/security/cve/CVE-2024-27398.html
  * https://www.suse.com/security/cve/CVE-2024-27401.html
  * https://www.suse.com/security/cve/CVE-2024-27419.html
  * https://www.suse.com/security/cve/CVE-2024-27436.html
  * https://www.suse.com/security/cve/CVE-2024-35789.html
  * https://www.suse.com/security/cve/CVE-2024-35791.html
  * https://www.suse.com/security/cve/CVE-2024-35809.html
  * https://www.suse.com/security/cve/CVE-2024-35811.html
  * https://www.suse.com/security/cve/CVE-2024-35830.html
  * https://www.suse.com/security/cve/CVE-2024-35849.html
  * https://www.suse.com/security/cve/CVE-2024-35877.html
  * https://www.suse.com/security/cve/CVE-2024-35878.html
  * https://www.suse.com/security/cve/CVE-2024-35887.html
  * https://www.suse.com/security/cve/CVE-2024-35895.html
  * https://www.suse.com/security/cve/CVE-2024-35914.html
  * https://www.suse.com/security/cve/CVE-2024-35932.html
  * https://www.suse.com/security/cve/CVE-2024-35935.html
  * https://www.suse.com/security/cve/CVE-2024-35936.html
  * https://www.suse.com/security/cve/CVE-2024-35944.html
  * https://www.suse.com/security/cve/CVE-2024-35955.html
  * https://www.suse.com/security/cve/CVE-2024-35969.html
  * https://www.suse.com/security/cve/CVE-2024-35982.html
  * https://www.suse.com/security/cve/CVE-2024-35984.html
  * https://www.suse.com/security/cve/CVE-2024-36015.html
  * https://www.suse.com/security/cve/CVE-2024-36029.html
  * https://www.suse.com/security/cve/CVE-2024-36954.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1101816
  * https://bugzilla.suse.com/show_bug.cgi?id=1141539
  * https://bugzilla.suse.com/show_bug.cgi?id=1181674
  * https://bugzilla.suse.com/show_bug.cgi?id=1185902
  * https://bugzilla.suse.com/show_bug.cgi?id=1187716
  * https://bugzilla.suse.com/show_bug.cgi?id=1188616
  * https://bugzilla.suse.com/show_bug.cgi?id=1190317
  * https://bugzilla.suse.com/show_bug.cgi?id=1190795
  * https://bugzilla.suse.com/show_bug.cgi?id=1191452
  * https://bugzilla.suse.com/show_bug.cgi?id=1194591
  * https://bugzilla.suse.com/show_bug.cgi?id=1197760
  * https://bugzilla.suse.com/show_bug.cgi?id=1197894
  * https://bugzilla.suse.com/show_bug.cgi?id=1203935
  * https://bugzilla.suse.com/show_bug.cgi?id=1206213
  * https://bugzilla.suse.com/show_bug.cgi?id=1206646
  * https://bugzilla.suse.com/show_bug.cgi?id=1207186
  * https://bugzilla.suse.com/show_bug.cgi?id=1209657
  * https://bugzilla.suse.com/show_bug.cgi?id=1210335
  * https://bugzilla.suse.com/show_bug.cgi?id=1215702
  * https://bugzilla.suse.com/show_bug.cgi?id=1216702
  * https://bugzilla.suse.com/show_bug.cgi?id=1217169
  * https://bugzilla.suse.com/show_bug.cgi?id=1217519
  * https://bugzilla.suse.com/show_bug.cgi?id=1218917
  * https://bugzilla.suse.com/show_bug.cgi?id=1220487
  * https://bugzilla.suse.com/show_bug.cgi?id=1220513
  * https://bugzilla.suse.com/show_bug.cgi?id=1220854
  * https://bugzilla.suse.com/show_bug.cgi?id=1220928
  * https://bugzilla.suse.com/show_bug.cgi?id=1221044
  * https://bugzilla.suse.com/show_bug.cgi?id=1221081
  * https://bugzilla.suse.com/show_bug.cgi?id=1221086
  * https://bugzilla.suse.com/show_bug.cgi?id=1221543
  * https://bugzilla.suse.com/show_bug.cgi?id=1221545
  * https://bugzilla.suse.com/show_bug.cgi?id=1221816
  * https://bugzilla.suse.com/show_bug.cgi?id=1221977
  * https://bugzilla.suse.com/show_bug.cgi?id=1221994
  * https://bugzilla.suse.com/show_bug.cgi?id=1222559
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222627
  * https://bugzilla.suse.com/show_bug.cgi?id=1222667
  * https://bugzilla.suse.com/show_bug.cgi?id=1222671
  * https://bugzilla.suse.com/show_bug.cgi?id=1222793
  * https://bugzilla.suse.com/show_bug.cgi?id=1222893
  * https://bugzilla.suse.com/show_bug.cgi?id=1222894
  * https://bugzilla.suse.com/show_bug.cgi?id=1223023
  * https://bugzilla.suse.com/show_bug.cgi?id=1223046
  * https://bugzilla.suse.com/show_bug.cgi?id=1223048
  * https://bugzilla.suse.com/show_bug.cgi?id=1223084
  * https://bugzilla.suse.com/show_bug.cgi?id=1223119
  * https://bugzilla.suse.com/show_bug.cgi?id=1223138
  * https://bugzilla.suse.com/show_bug.cgi?id=1223207
  * https://bugzilla.suse.com/show_bug.cgi?id=1223360
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223432
  * https://bugzilla.suse.com/show_bug.cgi?id=1223509
  * https://bugzilla.suse.com/show_bug.cgi?id=1223512
  * https://bugzilla.suse.com/show_bug.cgi?id=1223539
  * https://bugzilla.suse.com/show_bug.cgi?id=1223540
  * https://bugzilla.suse.com/show_bug.cgi?id=1223626
  * https://bugzilla.suse.com/show_bug.cgi?id=1223627
  * https://bugzilla.suse.com/show_bug.cgi?id=1223633
  * https://bugzilla.suse.com/show_bug.cgi?id=1223653
  * https://bugzilla.suse.com/show_bug.cgi?id=1223666
  * https://bugzilla.suse.com/show_bug.cgi?id=1223671
  * https://bugzilla.suse.com/show_bug.cgi?id=1223712
  * https://bugzilla.suse.com/show_bug.cgi?id=1223715
  * https://bugzilla.suse.com/show_bug.cgi?id=1223738
  * https://bugzilla.suse.com/show_bug.cgi?id=1223744
  * https://bugzilla.suse.com/show_bug.cgi?id=1223752
  * https://bugzilla.suse.com/show_bug.cgi?id=1223802
  * https://bugzilla.suse.com/show_bug.cgi?id=1223819
  * https://bugzilla.suse.com/show_bug.cgi?id=1223834
  * https://bugzilla.suse.com/show_bug.cgi?id=1223922
  * https://bugzilla.suse.com/show_bug.cgi?id=1223923
  * https://bugzilla.suse.com/show_bug.cgi?id=1223931
  * https://bugzilla.suse.com/show_bug.cgi?id=1223932
  * https://bugzilla.suse.com/show_bug.cgi?id=1223948
  * https://bugzilla.suse.com/show_bug.cgi?id=1223969
  * https://bugzilla.suse.com/show_bug.cgi?id=1224096
  * https://bugzilla.suse.com/show_bug.cgi?id=1224174
  * https://bugzilla.suse.com/show_bug.cgi?id=1224181
  * https://bugzilla.suse.com/show_bug.cgi?id=1224347
  * https://bugzilla.suse.com/show_bug.cgi?id=1224482
  * https://bugzilla.suse.com/show_bug.cgi?id=1224511
  * https://bugzilla.suse.com/show_bug.cgi?id=1224525
  * https://bugzilla.suse.com/show_bug.cgi?id=1224566
  * https://bugzilla.suse.com/show_bug.cgi?id=1224580
  * https://bugzilla.suse.com/show_bug.cgi?id=1224592
  * https://bugzilla.suse.com/show_bug.cgi?id=1224601
  * https://bugzilla.suse.com/show_bug.cgi?id=1224607
  * https://bugzilla.suse.com/show_bug.cgi?id=1224621
  * https://bugzilla.suse.com/show_bug.cgi?id=1224644
  * https://bugzilla.suse.com/show_bug.cgi?id=1224645
  * https://bugzilla.suse.com/show_bug.cgi?id=1224648
  * https://bugzilla.suse.com/show_bug.cgi?id=1224650
  * https://bugzilla.suse.com/show_bug.cgi?id=1224663
  * https://bugzilla.suse.com/show_bug.cgi?id=1224671
  * https://bugzilla.suse.com/show_bug.cgi?id=1224676
  * https://bugzilla.suse.com/show_bug.cgi?id=1224680
  * https://bugzilla.suse.com/show_bug.cgi?id=1224682
  * https://bugzilla.suse.com/show_bug.cgi?id=1224725
  * https://bugzilla.suse.com/show_bug.cgi?id=1224728
  * https://bugzilla.suse.com/show_bug.cgi?id=1224733
  * https://bugzilla.suse.com/show_bug.cgi?id=1224738
  * https://bugzilla.suse.com/show_bug.cgi?id=1224747
  * https://bugzilla.suse.com/show_bug.cgi?id=1224749
  * https://bugzilla.suse.com/show_bug.cgi?id=1224759
  * https://bugzilla.suse.com/show_bug.cgi?id=1224803
  * https://bugzilla.suse.com/show_bug.cgi?id=1224827
  * https://bugzilla.suse.com/show_bug.cgi?id=1224830
  * https://bugzilla.suse.com/show_bug.cgi?id=1224831
  * https://bugzilla.suse.com/show_bug.cgi?id=1224834
  * https://bugzilla.suse.com/show_bug.cgi?id=1224838
  * https://bugzilla.suse.com/show_bug.cgi?id=1224841
  * https://bugzilla.suse.com/show_bug.cgi?id=1224844
  * https://bugzilla.suse.com/show_bug.cgi?id=1224846
  * https://bugzilla.suse.com/show_bug.cgi?id=1224847
  * https://bugzilla.suse.com/show_bug.cgi?id=1224849
  * https://bugzilla.suse.com/show_bug.cgi?id=1224854
  * https://bugzilla.suse.com/show_bug.cgi?id=1224859
  * https://bugzilla.suse.com/show_bug.cgi?id=1224867
  * https://bugzilla.suse.com/show_bug.cgi?id=1224880
  * https://bugzilla.suse.com/show_bug.cgi?id=1224882
  * https://bugzilla.suse.com/show_bug.cgi?id=1224888
  * https://bugzilla.suse.com/show_bug.cgi?id=1224889
  * https://bugzilla.suse.com/show_bug.cgi?id=1224892
  * https://bugzilla.suse.com/show_bug.cgi?id=1224893
  * https://bugzilla.suse.com/show_bug.cgi?id=1224899
  * https://bugzilla.suse.com/show_bug.cgi?id=1224904
  * https://bugzilla.suse.com/show_bug.cgi?id=1224907
  * https://bugzilla.suse.com/show_bug.cgi?id=1224916
  * https://bugzilla.suse.com/show_bug.cgi?id=1224917
  * https://bugzilla.suse.com/show_bug.cgi?id=1224922
  * https://bugzilla.suse.com/show_bug.cgi?id=1224926
  * https://bugzilla.suse.com/show_bug.cgi?id=1224930
  * https://bugzilla.suse.com/show_bug.cgi?id=1224931
  * https://bugzilla.suse.com/show_bug.cgi?id=1224942
  * https://bugzilla.suse.com/show_bug.cgi?id=1224954
  * https://bugzilla.suse.com/show_bug.cgi?id=1224956
  * https://bugzilla.suse.com/show_bug.cgi?id=1224957
  * https://bugzilla.suse.com/show_bug.cgi?id=1224959
  * https://bugzilla.suse.com/show_bug.cgi?id=1224960
  * https://bugzilla.suse.com/show_bug.cgi?id=1224961
  * https://bugzilla.suse.com/show_bug.cgi?id=1224963
  * https://bugzilla.suse.com/show_bug.cgi?id=1224966
  * https://bugzilla.suse.com/show_bug.cgi?id=1224968
  * https://bugzilla.suse.com/show_bug.cgi?id=1224981
  * https://bugzilla.suse.com/show_bug.cgi?id=1224982
  * https://bugzilla.suse.com/show_bug.cgi?id=1224983
  * https://bugzilla.suse.com/show_bug.cgi?id=1224987
  * https://bugzilla.suse.com/show_bug.cgi?id=1224990
  * https://bugzilla.suse.com/show_bug.cgi?id=1224996
  * https://bugzilla.suse.com/show_bug.cgi?id=1225008
  * https://bugzilla.suse.com/show_bug.cgi?id=1225009
  * https://bugzilla.suse.com/show_bug.cgi?id=1225010
  * https://bugzilla.suse.com/show_bug.cgi?id=1225022
  * https://bugzilla.suse.com/show_bug.cgi?id=1225026
  * https://bugzilla.suse.com/show_bug.cgi?id=1225030
  * https://bugzilla.suse.com/show_bug.cgi?id=1225054
  * https://bugzilla.suse.com/show_bug.cgi?id=1225058
  * https://bugzilla.suse.com/show_bug.cgi?id=1225059
  * https://bugzilla.suse.com/show_bug.cgi?id=1225060
  * https://bugzilla.suse.com/show_bug.cgi?id=1225062
  * https://bugzilla.suse.com/show_bug.cgi?id=1225082
  * https://bugzilla.suse.com/show_bug.cgi?id=1225084
  * https://bugzilla.suse.com/show_bug.cgi?id=1225086
  * https://bugzilla.suse.com/show_bug.cgi?id=1225092
  * https://bugzilla.suse.com/show_bug.cgi?id=1225096
  * https://bugzilla.suse.com/show_bug.cgi?id=1225112
  * https://bugzilla.suse.com/show_bug.cgi?id=1225124
  * https://bugzilla.suse.com/show_bug.cgi?id=1225128
  * https://bugzilla.suse.com/show_bug.cgi?id=1225132
  * https://bugzilla.suse.com/show_bug.cgi?id=1225141
  * https://bugzilla.suse.com/show_bug.cgi?id=1225143
  * https://bugzilla.suse.com/show_bug.cgi?id=1225144
  * https://bugzilla.suse.com/show_bug.cgi?id=1225151
  * https://bugzilla.suse.com/show_bug.cgi?id=1225153
  * https://bugzilla.suse.com/show_bug.cgi?id=1225155
  * https://bugzilla.suse.com/show_bug.cgi?id=1225157
  * https://bugzilla.suse.com/show_bug.cgi?id=1225164
  * https://bugzilla.suse.com/show_bug.cgi?id=1225177
  * https://bugzilla.suse.com/show_bug.cgi?id=1225189
  * https://bugzilla.suse.com/show_bug.cgi?id=1225192
  * https://bugzilla.suse.com/show_bug.cgi?id=1225193
  * https://bugzilla.suse.com/show_bug.cgi?id=1225198
  * https://bugzilla.suse.com/show_bug.cgi?id=1225201
  * https://bugzilla.suse.com/show_bug.cgi?id=1225207
  * https://bugzilla.suse.com/show_bug.cgi?id=1225208
  * https://bugzilla.suse.com/show_bug.cgi?id=1225222
  * https://bugzilla.suse.com/show_bug.cgi?id=1225230
  * https://bugzilla.suse.com/show_bug.cgi?id=1225242
  * https://bugzilla.suse.com/show_bug.cgi?id=1225244
  * https://bugzilla.suse.com/show_bug.cgi?id=1225247
  * https://bugzilla.suse.com/show_bug.cgi?id=1225251
  * https://bugzilla.suse.com/show_bug.cgi?id=1225252
  * https://bugzilla.suse.com/show_bug.cgi?id=1225256
  * https://bugzilla.suse.com/show_bug.cgi?id=1225303
  * https://bugzilla.suse.com/show_bug.cgi?id=1225318
  * https://bugzilla.suse.com/show_bug.cgi?id=1225322
  * https://bugzilla.suse.com/show_bug.cgi?id=1225329
  * https://bugzilla.suse.com/show_bug.cgi?id=1225330
  * https://bugzilla.suse.com/show_bug.cgi?id=1225336
  * https://bugzilla.suse.com/show_bug.cgi?id=1225347
  * https://bugzilla.suse.com/show_bug.cgi?id=1225351
  * https://bugzilla.suse.com/show_bug.cgi?id=1225354
  * https://bugzilla.suse.com/show_bug.cgi?id=1225355
  * https://bugzilla.suse.com/show_bug.cgi?id=1225360
  * https://bugzilla.suse.com/show_bug.cgi?id=1225366
  * https://bugzilla.suse.com/show_bug.cgi?id=1225367
  * https://bugzilla.suse.com/show_bug.cgi?id=1225384
  * https://bugzilla.suse.com/show_bug.cgi?id=1225390
  * https://bugzilla.suse.com/show_bug.cgi?id=1225404
  * https://bugzilla.suse.com/show_bug.cgi?id=1225409
  * https://bugzilla.suse.com/show_bug.cgi?id=1225411
  * https://bugzilla.suse.com/show_bug.cgi?id=1225438
  * https://bugzilla.suse.com/show_bug.cgi?id=1225453
  * https://bugzilla.suse.com/show_bug.cgi?id=1225479
  * https://bugzilla.suse.com/show_bug.cgi?id=1225482
  * https://bugzilla.suse.com/show_bug.cgi?id=1225506
  * https://bugzilla.suse.com/show_bug.cgi?id=1225549
  * https://bugzilla.suse.com/show_bug.cgi?id=1225560
  * https://bugzilla.suse.com/show_bug.cgi?id=1225572
  * https://bugzilla.suse.com/show_bug.cgi?id=1225640
  * https://bugzilla.suse.com/show_bug.cgi?id=1225708
  * https://bugzilla.suse.com/show_bug.cgi?id=1225764

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240611/197e2441/attachment.htm>


More information about the sle-updates mailing list