SUSE-SU-2024:2183-1: important: Security update for the Linux Kernel
SLE-UPDATES
null at suse.de
Mon Jun 24 20:31:47 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2183-1
Rating: important
References:
* bsc#1065729
* bsc#1151927
* bsc#1154353
* bsc#1156395
* bsc#1174585
* bsc#1176869
* bsc#1184631
* bsc#1185589
* bsc#1185902
* bsc#1188616
* bsc#1188772
* bsc#1189883
* bsc#1190795
* bsc#1191452
* bsc#1192107
* bsc#1194288
* bsc#1196956
* bsc#1200619
* bsc#1208813
* bsc#1209657
* bsc#1210335
* bsc#1210629
* bsc#1215356
* bsc#1215420
* bsc#1216702
* bsc#1217169
* bsc#1220137
* bsc#1220144
* bsc#1220754
* bsc#1220877
* bsc#1220960
* bsc#1221044
* bsc#1221829
* bsc#1222251
* bsc#1222619
* bsc#1223084
* bsc#1223384
* bsc#1223390
* bsc#1223934
* bsc#1224099
* bsc#1224174
* bsc#1224438
* bsc#1224482
* bsc#1224511
* bsc#1224592
* bsc#1224831
* bsc#1224832
* bsc#1224834
* bsc#1224841
* bsc#1224843
* bsc#1224846
* bsc#1224849
* bsc#1224854
* bsc#1224859
* bsc#1224882
* bsc#1224888
* bsc#1224889
* bsc#1224891
* bsc#1224892
* bsc#1224893
* bsc#1224904
* bsc#1224907
* bsc#1224909
* bsc#1224916
* bsc#1224917
* bsc#1224922
* bsc#1224923
* bsc#1224924
* bsc#1224928
* bsc#1224953
* bsc#1224954
* bsc#1224961
* bsc#1224963
* bsc#1224965
* bsc#1224966
* bsc#1224968
* bsc#1224981
* bsc#1224982
* bsc#1224984
* bsc#1224987
* bsc#1224990
* bsc#1224993
* bsc#1224996
* bsc#1224997
* bsc#1225026
* bsc#1225030
* bsc#1225058
* bsc#1225060
* bsc#1225084
* bsc#1225091
* bsc#1225112
* bsc#1225113
* bsc#1225140
* bsc#1225143
* bsc#1225164
* bsc#1225177
* bsc#1225181
* bsc#1225192
* bsc#1225193
* bsc#1225201
* bsc#1225206
* bsc#1225207
* bsc#1225208
* bsc#1225214
* bsc#1225223
* bsc#1225224
* bsc#1225232
* bsc#1225238
* bsc#1225244
* bsc#1225251
* bsc#1225256
* bsc#1225261
* bsc#1225262
* bsc#1225263
* bsc#1225301
* bsc#1225303
* bsc#1225318
* bsc#1225321
* bsc#1225326
* bsc#1225327
* bsc#1225328
* bsc#1225336
* bsc#1225341
* bsc#1225346
* bsc#1225351
* bsc#1225354
* bsc#1225355
* bsc#1225360
* bsc#1225366
* bsc#1225367
* bsc#1225384
* bsc#1225390
* bsc#1225393
* bsc#1225400
* bsc#1225404
* bsc#1225411
* bsc#1225427
* bsc#1225437
* bsc#1225448
* bsc#1225453
* bsc#1225455
* bsc#1225499
* bsc#1225500
* bsc#1225534
Cross-References:
* CVE-2021-3743
* CVE-2021-39698
* CVE-2021-43056
* CVE-2021-47104
* CVE-2021-47220
* CVE-2021-47229
* CVE-2021-47231
* CVE-2021-47236
* CVE-2021-47239
* CVE-2021-47240
* CVE-2021-47246
* CVE-2021-47252
* CVE-2021-47254
* CVE-2021-47255
* CVE-2021-47259
* CVE-2021-47260
* CVE-2021-47261
* CVE-2021-47267
* CVE-2021-47269
* CVE-2021-47270
* CVE-2021-47274
* CVE-2021-47275
* CVE-2021-47276
* CVE-2021-47280
* CVE-2021-47284
* CVE-2021-47285
* CVE-2021-47288
* CVE-2021-47289
* CVE-2021-47296
* CVE-2021-47301
* CVE-2021-47302
* CVE-2021-47305
* CVE-2021-47307
* CVE-2021-47308
* CVE-2021-47314
* CVE-2021-47315
* CVE-2021-47320
* CVE-2021-47321
* CVE-2021-47323
* CVE-2021-47324
* CVE-2021-47330
* CVE-2021-47332
* CVE-2021-47333
* CVE-2021-47334
* CVE-2021-47338
* CVE-2021-47341
* CVE-2021-47344
* CVE-2021-47347
* CVE-2021-47350
* CVE-2021-47354
* CVE-2021-47356
* CVE-2021-47369
* CVE-2021-47375
* CVE-2021-47378
* CVE-2021-47381
* CVE-2021-47382
* CVE-2021-47383
* CVE-2021-47388
* CVE-2021-47391
* CVE-2021-47393
* CVE-2021-47395
* CVE-2021-47396
* CVE-2021-47399
* CVE-2021-47402
* CVE-2021-47404
* CVE-2021-47405
* CVE-2021-47416
* CVE-2021-47423
* CVE-2021-47424
* CVE-2021-47425
* CVE-2021-47431
* CVE-2021-47434
* CVE-2021-47436
* CVE-2021-47441
* CVE-2021-47442
* CVE-2021-47443
* CVE-2021-47445
* CVE-2021-47456
* CVE-2021-47460
* CVE-2021-47464
* CVE-2021-47465
* CVE-2021-47468
* CVE-2021-47473
* CVE-2021-47482
* CVE-2021-47483
* CVE-2021-47485
* CVE-2021-47495
* CVE-2021-47496
* CVE-2021-47497
* CVE-2021-47500
* CVE-2021-47505
* CVE-2021-47506
* CVE-2021-47511
* CVE-2021-47516
* CVE-2021-47522
* CVE-2021-47527
* CVE-2021-47538
* CVE-2021-47541
* CVE-2021-47542
* CVE-2021-47562
* CVE-2021-47563
* CVE-2021-47565
* CVE-2022-20132
* CVE-2022-48673
* CVE-2023-0160
* CVE-2023-1829
* CVE-2023-2176
* CVE-2023-424
* CVE-2023-4244
* CVE-2023-47233
* CVE-2023-52433
* CVE-2023-52581
* CVE-2023-52591
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52686
* CVE-2023-52840
* CVE-2023-52871
* CVE-2023-52880
* CVE-2023-6531
* CVE-2024-26581
* CVE-2024-26643
* CVE-2024-26828
* CVE-2024-26925
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-27413
* CVE-2024-35811
* CVE-2024-35895
* CVE-2024-35914
CVSS scores:
* CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Availability Extension 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Manager Proxy 4.1
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Server 4.1
An update that solves 131 vulnerabilities and has 13 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
(bsc#1225355).
* CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
* CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
(bsc#1225208).
* CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1224174).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
could be exploited to achieve local privilege escalation (bsc#1215420).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210335).
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225201).
* CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
* CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
* CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
* CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
* CVE-2023-52840: Fix use after free in rmi_unregister_function()
(bsc#1224928).
* CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
* CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
* CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
* CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
The following non-security bugs were fixed:
* NFC: nxp: add NXP1002 (bsc#1185589).
* PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
* af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
* af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
* af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
(bsc#1223384).
* btrfs: do not start relocation until in progress drops are done
(bsc#1222251).
* md: Replace snprintf with scnprintf (git-fixes).
* netfilter: nf_tables: GC transaction race with abort path (git-fixes).
* netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
* netfilter: nf_tables: defer gc run if previous batch is still pending (git-
fixes).
* netfilter: nf_tables: fix GC transaction races with netns and netlink event
exit path (git-fixes).
* netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
* netfilter: nf_tables: fix memleak when more than 255 elements expired (git-
fixes).
* netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
* netfilter: nf_tables: mark set as dead when unbinding anonymous set with
timeout (git-fixes).
* netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-
fixes).
* netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
(git-fixes).
* netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
* netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
* netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-
fixes).
* netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match
(git-fixes).
* netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
* netfilter: nft_set_rbtree: Do not account for expired elements on insertion
(git-fixes).
* netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on
insertion (git-fixes).
* netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap
detection (git-fixes).
* netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start()
(git-fixes).
* netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
(git-fixes).
* netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named
sets (git-fixes).
* netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
* netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
* netfilter: nft_set_rbtree: overlap detection with element re-addition after
deletion (git-fixes).
* netfilter: nft_set_rbtree: skip elements in transaction from garbage
collection (git-fixes).
* netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
* netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
(git-fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* x86/pkeys: Revert a5eff7259790 ("x86/pkeys: Add PKRU value to init_fpstate")
(bsc#1215356).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2183=1
* SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-2183=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2183=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2183=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2183=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (nosrc)
* kernel-default-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP2_Update_49-debugsource-1-150200.5.3.1
* kernel-default-livepatch-5.3.18-150200.24.194.1
* kernel-default-livepatch-devel-5.3.18-150200.24.194.1
* kernel-default-debuginfo-5.3.18-150200.24.194.1
* kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
* kernel-default-debugsource-5.3.18-150200.24.194.1
* kernel-livepatch-5_3_18-150200_24_194-default-debuginfo-1-150200.5.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-debuginfo-5.3.18-150200.24.194.1
* cluster-md-kmp-default-debuginfo-5.3.18-150200.24.194.1
* dlm-kmp-default-debuginfo-5.3.18-150200.24.194.1
* gfs2-kmp-default-5.3.18-150200.24.194.1
* cluster-md-kmp-default-5.3.18-150200.24.194.1
* ocfs2-kmp-default-debuginfo-5.3.18-150200.24.194.1
* dlm-kmp-default-5.3.18-150200.24.194.1
* kernel-default-debuginfo-5.3.18-150200.24.194.1
* ocfs2-kmp-default-5.3.18-150200.24.194.1
* kernel-default-debugsource-5.3.18-150200.24.194.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc)
* kernel-default-5.3.18-150200.24.194.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
nosrc x86_64)
* kernel-preempt-5.3.18-150200.24.194.1
* kernel-default-5.3.18-150200.24.194.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1
* kernel-preempt-debuginfo-5.3.18-150200.24.194.1
* kernel-preempt-devel-5.3.18-150200.24.194.1
* kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1
* kernel-obs-build-5.3.18-150200.24.194.1
* kernel-default-debuginfo-5.3.18-150200.24.194.1
* kernel-default-devel-debuginfo-5.3.18-150200.24.194.1
* kernel-default-devel-5.3.18-150200.24.194.1
* kernel-preempt-debugsource-5.3.18-150200.24.194.1
* kernel-default-debugsource-5.3.18-150200.24.194.1
* kernel-syms-5.3.18-150200.24.194.1
* kernel-obs-build-debugsource-5.3.18-150200.24.194.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* kernel-source-5.3.18-150200.24.194.1
* kernel-devel-5.3.18-150200.24.194.1
* kernel-macros-5.3.18-150200.24.194.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch
nosrc)
* kernel-docs-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1
* kernel-obs-build-5.3.18-150200.24.194.1
* reiserfs-kmp-default-debuginfo-5.3.18-150200.24.194.1
* reiserfs-kmp-default-5.3.18-150200.24.194.1
* kernel-default-debuginfo-5.3.18-150200.24.194.1
* kernel-default-devel-debuginfo-5.3.18-150200.24.194.1
* kernel-default-devel-5.3.18-150200.24.194.1
* kernel-default-debugsource-5.3.18-150200.24.194.1
* kernel-syms-5.3.18-150200.24.194.1
* kernel-obs-build-debugsource-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* kernel-source-5.3.18-150200.24.194.1
* kernel-devel-5.3.18-150200.24.194.1
* kernel-macros-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc)
* kernel-docs-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
* kernel-preempt-debugsource-5.3.18-150200.24.194.1
* kernel-preempt-devel-5.3.18-150200.24.194.1
* kernel-preempt-debuginfo-5.3.18-150200.24.194.1
* kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1
* kernel-obs-build-5.3.18-150200.24.194.1
* reiserfs-kmp-default-debuginfo-5.3.18-150200.24.194.1
* reiserfs-kmp-default-5.3.18-150200.24.194.1
* kernel-default-debuginfo-5.3.18-150200.24.194.1
* kernel-default-devel-debuginfo-5.3.18-150200.24.194.1
* kernel-default-devel-5.3.18-150200.24.194.1
* kernel-default-debugsource-5.3.18-150200.24.194.1
* kernel-syms-5.3.18-150200.24.194.1
* kernel-obs-build-debugsource-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* kernel-source-5.3.18-150200.24.194.1
* kernel-devel-5.3.18-150200.24.194.1
* kernel-macros-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc)
* kernel-docs-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64)
* kernel-preempt-5.3.18-150200.24.194.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* kernel-preempt-debugsource-5.3.18-150200.24.194.1
* kernel-preempt-devel-5.3.18-150200.24.194.1
* kernel-preempt-debuginfo-5.3.18-150200.24.194.1
* kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1
## References:
* https://www.suse.com/security/cve/CVE-2021-3743.html
* https://www.suse.com/security/cve/CVE-2021-39698.html
* https://www.suse.com/security/cve/CVE-2021-43056.html
* https://www.suse.com/security/cve/CVE-2021-47104.html
* https://www.suse.com/security/cve/CVE-2021-47220.html
* https://www.suse.com/security/cve/CVE-2021-47229.html
* https://www.suse.com/security/cve/CVE-2021-47231.html
* https://www.suse.com/security/cve/CVE-2021-47236.html
* https://www.suse.com/security/cve/CVE-2021-47239.html
* https://www.suse.com/security/cve/CVE-2021-47240.html
* https://www.suse.com/security/cve/CVE-2021-47246.html
* https://www.suse.com/security/cve/CVE-2021-47252.html
* https://www.suse.com/security/cve/CVE-2021-47254.html
* https://www.suse.com/security/cve/CVE-2021-47255.html
* https://www.suse.com/security/cve/CVE-2021-47259.html
* https://www.suse.com/security/cve/CVE-2021-47260.html
* https://www.suse.com/security/cve/CVE-2021-47261.html
* https://www.suse.com/security/cve/CVE-2021-47267.html
* https://www.suse.com/security/cve/CVE-2021-47269.html
* https://www.suse.com/security/cve/CVE-2021-47270.html
* https://www.suse.com/security/cve/CVE-2021-47274.html
* https://www.suse.com/security/cve/CVE-2021-47275.html
* https://www.suse.com/security/cve/CVE-2021-47276.html
* https://www.suse.com/security/cve/CVE-2021-47280.html
* https://www.suse.com/security/cve/CVE-2021-47284.html
* https://www.suse.com/security/cve/CVE-2021-47285.html
* https://www.suse.com/security/cve/CVE-2021-47288.html
* https://www.suse.com/security/cve/CVE-2021-47289.html
* https://www.suse.com/security/cve/CVE-2021-47296.html
* https://www.suse.com/security/cve/CVE-2021-47301.html
* https://www.suse.com/security/cve/CVE-2021-47302.html
* https://www.suse.com/security/cve/CVE-2021-47305.html
* https://www.suse.com/security/cve/CVE-2021-47307.html
* https://www.suse.com/security/cve/CVE-2021-47308.html
* https://www.suse.com/security/cve/CVE-2021-47314.html
* https://www.suse.com/security/cve/CVE-2021-47315.html
* https://www.suse.com/security/cve/CVE-2021-47320.html
* https://www.suse.com/security/cve/CVE-2021-47321.html
* https://www.suse.com/security/cve/CVE-2021-47323.html
* https://www.suse.com/security/cve/CVE-2021-47324.html
* https://www.suse.com/security/cve/CVE-2021-47330.html
* https://www.suse.com/security/cve/CVE-2021-47332.html
* https://www.suse.com/security/cve/CVE-2021-47333.html
* https://www.suse.com/security/cve/CVE-2021-47334.html
* https://www.suse.com/security/cve/CVE-2021-47338.html
* https://www.suse.com/security/cve/CVE-2021-47341.html
* https://www.suse.com/security/cve/CVE-2021-47344.html
* https://www.suse.com/security/cve/CVE-2021-47347.html
* https://www.suse.com/security/cve/CVE-2021-47350.html
* https://www.suse.com/security/cve/CVE-2021-47354.html
* https://www.suse.com/security/cve/CVE-2021-47356.html
* https://www.suse.com/security/cve/CVE-2021-47369.html
* https://www.suse.com/security/cve/CVE-2021-47375.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47381.html
* https://www.suse.com/security/cve/CVE-2021-47382.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47388.html
* https://www.suse.com/security/cve/CVE-2021-47391.html
* https://www.suse.com/security/cve/CVE-2021-47393.html
* https://www.suse.com/security/cve/CVE-2021-47395.html
* https://www.suse.com/security/cve/CVE-2021-47396.html
* https://www.suse.com/security/cve/CVE-2021-47399.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47404.html
* https://www.suse.com/security/cve/CVE-2021-47405.html
* https://www.suse.com/security/cve/CVE-2021-47416.html
* https://www.suse.com/security/cve/CVE-2021-47423.html
* https://www.suse.com/security/cve/CVE-2021-47424.html
* https://www.suse.com/security/cve/CVE-2021-47425.html
* https://www.suse.com/security/cve/CVE-2021-47431.html
* https://www.suse.com/security/cve/CVE-2021-47434.html
* https://www.suse.com/security/cve/CVE-2021-47436.html
* https://www.suse.com/security/cve/CVE-2021-47441.html
* https://www.suse.com/security/cve/CVE-2021-47442.html
* https://www.suse.com/security/cve/CVE-2021-47443.html
* https://www.suse.com/security/cve/CVE-2021-47445.html
* https://www.suse.com/security/cve/CVE-2021-47456.html
* https://www.suse.com/security/cve/CVE-2021-47460.html
* https://www.suse.com/security/cve/CVE-2021-47464.html
* https://www.suse.com/security/cve/CVE-2021-47465.html
* https://www.suse.com/security/cve/CVE-2021-47468.html
* https://www.suse.com/security/cve/CVE-2021-47473.html
* https://www.suse.com/security/cve/CVE-2021-47482.html
* https://www.suse.com/security/cve/CVE-2021-47483.html
* https://www.suse.com/security/cve/CVE-2021-47485.html
* https://www.suse.com/security/cve/CVE-2021-47495.html
* https://www.suse.com/security/cve/CVE-2021-47496.html
* https://www.suse.com/security/cve/CVE-2021-47497.html
* https://www.suse.com/security/cve/CVE-2021-47500.html
* https://www.suse.com/security/cve/CVE-2021-47505.html
* https://www.suse.com/security/cve/CVE-2021-47506.html
* https://www.suse.com/security/cve/CVE-2021-47511.html
* https://www.suse.com/security/cve/CVE-2021-47516.html
* https://www.suse.com/security/cve/CVE-2021-47522.html
* https://www.suse.com/security/cve/CVE-2021-47527.html
* https://www.suse.com/security/cve/CVE-2021-47538.html
* https://www.suse.com/security/cve/CVE-2021-47541.html
* https://www.suse.com/security/cve/CVE-2021-47542.html
* https://www.suse.com/security/cve/CVE-2021-47562.html
* https://www.suse.com/security/cve/CVE-2021-47563.html
* https://www.suse.com/security/cve/CVE-2021-47565.html
* https://www.suse.com/security/cve/CVE-2022-20132.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-424.html
* https://www.suse.com/security/cve/CVE-2023-4244.html
* https://www.suse.com/security/cve/CVE-2023-47233.html
* https://www.suse.com/security/cve/CVE-2023-52433.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52840.html
* https://www.suse.com/security/cve/CVE-2023-52871.html
* https://www.suse.com/security/cve/CVE-2023-52880.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2024-26581.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1151927
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1156395
* https://bugzilla.suse.com/show_bug.cgi?id=1174585
* https://bugzilla.suse.com/show_bug.cgi?id=1176869
* https://bugzilla.suse.com/show_bug.cgi?id=1184631
* https://bugzilla.suse.com/show_bug.cgi?id=1185589
* https://bugzilla.suse.com/show_bug.cgi?id=1185902
* https://bugzilla.suse.com/show_bug.cgi?id=1188616
* https://bugzilla.suse.com/show_bug.cgi?id=1188772
* https://bugzilla.suse.com/show_bug.cgi?id=1189883
* https://bugzilla.suse.com/show_bug.cgi?id=1190795
* https://bugzilla.suse.com/show_bug.cgi?id=1191452
* https://bugzilla.suse.com/show_bug.cgi?id=1192107
* https://bugzilla.suse.com/show_bug.cgi?id=1194288
* https://bugzilla.suse.com/show_bug.cgi?id=1196956
* https://bugzilla.suse.com/show_bug.cgi?id=1200619
* https://bugzilla.suse.com/show_bug.cgi?id=1208813
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1210335
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1215356
* https://bugzilla.suse.com/show_bug.cgi?id=1215420
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1220137
* https://bugzilla.suse.com/show_bug.cgi?id=1220144
* https://bugzilla.suse.com/show_bug.cgi?id=1220754
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220960
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1222251
* https://bugzilla.suse.com/show_bug.cgi?id=1222619
* https://bugzilla.suse.com/show_bug.cgi?id=1223084
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224831
* https://bugzilla.suse.com/show_bug.cgi?id=1224832
* https://bugzilla.suse.com/show_bug.cgi?id=1224834
* https://bugzilla.suse.com/show_bug.cgi?id=1224841
* https://bugzilla.suse.com/show_bug.cgi?id=1224843
* https://bugzilla.suse.com/show_bug.cgi?id=1224846
* https://bugzilla.suse.com/show_bug.cgi?id=1224849
* https://bugzilla.suse.com/show_bug.cgi?id=1224854
* https://bugzilla.suse.com/show_bug.cgi?id=1224859
* https://bugzilla.suse.com/show_bug.cgi?id=1224882
* https://bugzilla.suse.com/show_bug.cgi?id=1224888
* https://bugzilla.suse.com/show_bug.cgi?id=1224889
* https://bugzilla.suse.com/show_bug.cgi?id=1224891
* https://bugzilla.suse.com/show_bug.cgi?id=1224892
* https://bugzilla.suse.com/show_bug.cgi?id=1224893
* https://bugzilla.suse.com/show_bug.cgi?id=1224904
* https://bugzilla.suse.com/show_bug.cgi?id=1224907
* https://bugzilla.suse.com/show_bug.cgi?id=1224909
* https://bugzilla.suse.com/show_bug.cgi?id=1224916
* https://bugzilla.suse.com/show_bug.cgi?id=1224917
* https://bugzilla.suse.com/show_bug.cgi?id=1224922
* https://bugzilla.suse.com/show_bug.cgi?id=1224923
* https://bugzilla.suse.com/show_bug.cgi?id=1224924
* https://bugzilla.suse.com/show_bug.cgi?id=1224928
* https://bugzilla.suse.com/show_bug.cgi?id=1224953
* https://bugzilla.suse.com/show_bug.cgi?id=1224954
* https://bugzilla.suse.com/show_bug.cgi?id=1224961
* https://bugzilla.suse.com/show_bug.cgi?id=1224963
* https://bugzilla.suse.com/show_bug.cgi?id=1224965
* https://bugzilla.suse.com/show_bug.cgi?id=1224966
* https://bugzilla.suse.com/show_bug.cgi?id=1224968
* https://bugzilla.suse.com/show_bug.cgi?id=1224981
* https://bugzilla.suse.com/show_bug.cgi?id=1224982
* https://bugzilla.suse.com/show_bug.cgi?id=1224984
* https://bugzilla.suse.com/show_bug.cgi?id=1224987
* https://bugzilla.suse.com/show_bug.cgi?id=1224990
* https://bugzilla.suse.com/show_bug.cgi?id=1224993
* https://bugzilla.suse.com/show_bug.cgi?id=1224996
* https://bugzilla.suse.com/show_bug.cgi?id=1224997
* https://bugzilla.suse.com/show_bug.cgi?id=1225026
* https://bugzilla.suse.com/show_bug.cgi?id=1225030
* https://bugzilla.suse.com/show_bug.cgi?id=1225058
* https://bugzilla.suse.com/show_bug.cgi?id=1225060
* https://bugzilla.suse.com/show_bug.cgi?id=1225084
* https://bugzilla.suse.com/show_bug.cgi?id=1225091
* https://bugzilla.suse.com/show_bug.cgi?id=1225112
* https://bugzilla.suse.com/show_bug.cgi?id=1225113
* https://bugzilla.suse.com/show_bug.cgi?id=1225140
* https://bugzilla.suse.com/show_bug.cgi?id=1225143
* https://bugzilla.suse.com/show_bug.cgi?id=1225164
* https://bugzilla.suse.com/show_bug.cgi?id=1225177
* https://bugzilla.suse.com/show_bug.cgi?id=1225181
* https://bugzilla.suse.com/show_bug.cgi?id=1225192
* https://bugzilla.suse.com/show_bug.cgi?id=1225193
* https://bugzilla.suse.com/show_bug.cgi?id=1225201
* https://bugzilla.suse.com/show_bug.cgi?id=1225206
* https://bugzilla.suse.com/show_bug.cgi?id=1225207
* https://bugzilla.suse.com/show_bug.cgi?id=1225208
* https://bugzilla.suse.com/show_bug.cgi?id=1225214
* https://bugzilla.suse.com/show_bug.cgi?id=1225223
* https://bugzilla.suse.com/show_bug.cgi?id=1225224
* https://bugzilla.suse.com/show_bug.cgi?id=1225232
* https://bugzilla.suse.com/show_bug.cgi?id=1225238
* https://bugzilla.suse.com/show_bug.cgi?id=1225244
* https://bugzilla.suse.com/show_bug.cgi?id=1225251
* https://bugzilla.suse.com/show_bug.cgi?id=1225256
* https://bugzilla.suse.com/show_bug.cgi?id=1225261
* https://bugzilla.suse.com/show_bug.cgi?id=1225262
* https://bugzilla.suse.com/show_bug.cgi?id=1225263
* https://bugzilla.suse.com/show_bug.cgi?id=1225301
* https://bugzilla.suse.com/show_bug.cgi?id=1225303
* https://bugzilla.suse.com/show_bug.cgi?id=1225318
* https://bugzilla.suse.com/show_bug.cgi?id=1225321
* https://bugzilla.suse.com/show_bug.cgi?id=1225326
* https://bugzilla.suse.com/show_bug.cgi?id=1225327
* https://bugzilla.suse.com/show_bug.cgi?id=1225328
* https://bugzilla.suse.com/show_bug.cgi?id=1225336
* https://bugzilla.suse.com/show_bug.cgi?id=1225341
* https://bugzilla.suse.com/show_bug.cgi?id=1225346
* https://bugzilla.suse.com/show_bug.cgi?id=1225351
* https://bugzilla.suse.com/show_bug.cgi?id=1225354
* https://bugzilla.suse.com/show_bug.cgi?id=1225355
* https://bugzilla.suse.com/show_bug.cgi?id=1225360
* https://bugzilla.suse.com/show_bug.cgi?id=1225366
* https://bugzilla.suse.com/show_bug.cgi?id=1225367
* https://bugzilla.suse.com/show_bug.cgi?id=1225384
* https://bugzilla.suse.com/show_bug.cgi?id=1225390
* https://bugzilla.suse.com/show_bug.cgi?id=1225393
* https://bugzilla.suse.com/show_bug.cgi?id=1225400
* https://bugzilla.suse.com/show_bug.cgi?id=1225404
* https://bugzilla.suse.com/show_bug.cgi?id=1225411
* https://bugzilla.suse.com/show_bug.cgi?id=1225427
* https://bugzilla.suse.com/show_bug.cgi?id=1225437
* https://bugzilla.suse.com/show_bug.cgi?id=1225448
* https://bugzilla.suse.com/show_bug.cgi?id=1225453
* https://bugzilla.suse.com/show_bug.cgi?id=1225455
* https://bugzilla.suse.com/show_bug.cgi?id=1225499
* https://bugzilla.suse.com/show_bug.cgi?id=1225500
* https://bugzilla.suse.com/show_bug.cgi?id=1225534
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240624/3d76d26e/attachment.htm>
More information about the sle-updates
mailing list