SUSE-SU-2024:1644-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Tue May 14 16:32:29 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:1644-1  
Rating: important  
References:

  * bsc#1141539
  * bsc#1190576
  * bsc#1192145
  * bsc#1192837
  * bsc#1193629
  * bsc#1196869
  * bsc#1200313
  * bsc#1201308
  * bsc#1201489
  * bsc#1203906
  * bsc#1203935
  * bsc#1204614
  * bsc#1207361
  * bsc#1211592
  * bsc#1213573
  * bsc#1217339
  * bsc#1217408
  * bsc#1218562
  * bsc#1218917
  * bsc#1219104
  * bsc#1219126
  * bsc#1219141
  * bsc#1219169
  * bsc#1219170
  * bsc#1219264
  * bsc#1220342
  * bsc#1220569
  * bsc#1220761
  * bsc#1221042
  * bsc#1221044
  * bsc#1221080
  * bsc#1221084
  * bsc#1221088
  * bsc#1221299
  * bsc#1221612
  * bsc#1221617
  * bsc#1221645
  * bsc#1221825
  * bsc#1222294
  * bsc#1222307
  * bsc#1222357
  * bsc#1222368
  * bsc#1222379
  * bsc#1222385
  * bsc#1222424
  * bsc#1222430
  * bsc#1222435
  * bsc#1222482
  * bsc#1222559
  * bsc#1222585
  * bsc#1222613
  * bsc#1222615
  * bsc#1222618
  * bsc#1222624
  * bsc#1222666
  * bsc#1222669
  * bsc#1222671
  * bsc#1222703
  * bsc#1222704
  * bsc#1222709
  * bsc#1222710
  * bsc#1222721
  * bsc#1222726
  * bsc#1222773
  * bsc#1222776
  * bsc#1222785
  * bsc#1222787
  * bsc#1222790
  * bsc#1222791
  * bsc#1222792
  * bsc#1222793
  * bsc#1222796
  * bsc#1222812
  * bsc#1222824
  * bsc#1222829
  * bsc#1222832
  * bsc#1222836
  * bsc#1222838
  * bsc#1222866
  * bsc#1222867
  * bsc#1222869
  * bsc#1222870
  * bsc#1222876
  * bsc#1222878
  * bsc#1222879
  * bsc#1222881
  * bsc#1222883
  * bsc#1222888
  * bsc#1222894
  * bsc#1222901
  * bsc#1222968
  * bsc#1222976
  * bsc#1223012
  * bsc#1223014
  * bsc#1223016
  * bsc#1223024
  * bsc#1223033
  * bsc#1223034
  * bsc#1223035
  * bsc#1223036
  * bsc#1223037
  * bsc#1223041
  * bsc#1223042
  * bsc#1223051
  * bsc#1223052
  * bsc#1223056
  * bsc#1223057
  * bsc#1223058
  * bsc#1223060
  * bsc#1223061
  * bsc#1223065
  * bsc#1223066
  * bsc#1223076
  * bsc#1223078
  * bsc#1223111
  * bsc#1223115
  * bsc#1223118
  * bsc#1223119
  * bsc#1223140
  * bsc#1223187
  * bsc#1223189
  * bsc#1223190
  * bsc#1223191
  * bsc#1223196
  * bsc#1223197
  * bsc#1223198
  * bsc#1223207
  * bsc#1223275
  * bsc#1223323
  * bsc#1223360
  * bsc#1223369
  * bsc#1223380
  * bsc#1223432
  * bsc#1223473
  * bsc#1223474
  * bsc#1223475
  * bsc#1223477
  * bsc#1223478
  * bsc#1223479
  * bsc#1223481
  * bsc#1223482
  * bsc#1223484
  * bsc#1223487
  * bsc#1223490
  * bsc#1223496
  * bsc#1223498
  * bsc#1223499
  * bsc#1223501
  * bsc#1223502
  * bsc#1223503
  * bsc#1223505
  * bsc#1223509
  * bsc#1223511
  * bsc#1223512
  * bsc#1223513
  * bsc#1223516
  * bsc#1223517
  * bsc#1223518
  * bsc#1223519
  * bsc#1223520
  * bsc#1223522
  * bsc#1223523
  * bsc#1223525
  * bsc#1223536
  * bsc#1223539
  * bsc#1223574
  * bsc#1223595
  * bsc#1223598
  * bsc#1223628
  * bsc#1223634
  * bsc#1223640
  * bsc#1223643
  * bsc#1223644
  * bsc#1223645
  * bsc#1223646
  * bsc#1223648
  * bsc#1223655
  * bsc#1223657
  * bsc#1223660
  * bsc#1223661
  * bsc#1223663
  * bsc#1223664
  * bsc#1223668
  * bsc#1223670
  * bsc#1223679
  * bsc#1223686
  * bsc#1223693
  * bsc#1223705
  * bsc#1223714
  * bsc#1223735
  * bsc#1223738
  * bsc#1223745
  * bsc#1223784
  * bsc#1223785
  * bsc#1223790
  * bsc#1223816
  * bsc#1223821
  * bsc#1223822
  * bsc#1223823
  * bsc#1223824
  * bsc#1223827
  * bsc#1223834
  * bsc#1223858
  * bsc#1223875
  * bsc#1223876
  * bsc#1223877
  * bsc#1223878
  * bsc#1223879
  * bsc#1223894
  * bsc#1223921
  * bsc#1223922
  * bsc#1223923
  * bsc#1223924
  * bsc#1223929
  * bsc#1223931
  * bsc#1223932
  * bsc#1223934
  * bsc#1223941
  * bsc#1223948
  * bsc#1223949
  * bsc#1223950
  * bsc#1223951
  * bsc#1223952
  * bsc#1223953
  * bsc#1223956
  * bsc#1223957
  * bsc#1223960
  * bsc#1223962
  * bsc#1223963
  * bsc#1223964
  * bsc#1223996
  * jsc#PED-7167

  
Cross-References:

  * CVE-2021-47047
  * CVE-2021-47184
  * CVE-2021-47185
  * CVE-2021-47187
  * CVE-2021-47188
  * CVE-2021-47191
  * CVE-2021-47192
  * CVE-2021-47193
  * CVE-2021-47194
  * CVE-2021-47195
  * CVE-2021-47196
  * CVE-2021-47197
  * CVE-2021-47198
  * CVE-2021-47199
  * CVE-2021-47200
  * CVE-2021-47201
  * CVE-2021-47202
  * CVE-2021-47203
  * CVE-2021-47204
  * CVE-2021-47205
  * CVE-2021-47206
  * CVE-2021-47207
  * CVE-2021-47209
  * CVE-2021-47210
  * CVE-2021-47211
  * CVE-2021-47212
  * CVE-2021-47214
  * CVE-2021-47215
  * CVE-2021-47216
  * CVE-2021-47217
  * CVE-2021-47218
  * CVE-2021-47219
  * CVE-2022-48631
  * CVE-2022-48632
  * CVE-2022-48634
  * CVE-2022-48636
  * CVE-2022-48637
  * CVE-2022-48638
  * CVE-2022-48639
  * CVE-2022-48640
  * CVE-2022-48642
  * CVE-2022-48644
  * CVE-2022-48646
  * CVE-2022-48647
  * CVE-2022-48648
  * CVE-2022-48650
  * CVE-2022-48651
  * CVE-2022-48652
  * CVE-2022-48653
  * CVE-2022-48654
  * CVE-2022-48655
  * CVE-2022-48656
  * CVE-2022-48657
  * CVE-2022-48658
  * CVE-2022-48659
  * CVE-2022-48660
  * CVE-2022-48662
  * CVE-2022-48663
  * CVE-2022-48667
  * CVE-2022-48668
  * CVE-2022-48671
  * CVE-2022-48672
  * CVE-2022-48673
  * CVE-2022-48675
  * CVE-2022-48686
  * CVE-2022-48687
  * CVE-2022-48688
  * CVE-2022-48690
  * CVE-2022-48692
  * CVE-2022-48693
  * CVE-2022-48694
  * CVE-2022-48695
  * CVE-2022-48697
  * CVE-2022-48698
  * CVE-2022-48699
  * CVE-2022-48700
  * CVE-2022-48701
  * CVE-2022-48702
  * CVE-2022-48703
  * CVE-2022-48704
  * CVE-2023-2860
  * CVE-2023-52585
  * CVE-2023-52589
  * CVE-2023-52590
  * CVE-2023-52591
  * CVE-2023-52593
  * CVE-2023-52614
  * CVE-2023-52616
  * CVE-2023-52620
  * CVE-2023-52635
  * CVE-2023-52645
  * CVE-2023-52646
  * CVE-2023-52652
  * CVE-2023-6270
  * CVE-2024-0639
  * CVE-2024-0841
  * CVE-2024-2201
  * CVE-2024-22099
  * CVE-2024-23307
  * CVE-2024-23848
  * CVE-2024-23850
  * CVE-2024-26601
  * CVE-2024-26610
  * CVE-2024-26656
  * CVE-2024-26671
  * CVE-2024-26673
  * CVE-2024-26675
  * CVE-2024-26679
  * CVE-2024-26687
  * CVE-2024-26688
  * CVE-2024-26700
  * CVE-2024-26702
  * CVE-2024-26733
  * CVE-2024-26739
  * CVE-2024-26764
  * CVE-2024-26766
  * CVE-2024-26772
  * CVE-2024-26773
  * CVE-2024-26783
  * CVE-2024-26791
  * CVE-2024-26792
  * CVE-2024-26816
  * CVE-2024-26817
  * CVE-2024-26820
  * CVE-2024-26825
  * CVE-2024-26830
  * CVE-2024-26833
  * CVE-2024-26836
  * CVE-2024-26840
  * CVE-2024-26843
  * CVE-2024-26852
  * CVE-2024-26853
  * CVE-2024-26855
  * CVE-2024-26856
  * CVE-2024-26857
  * CVE-2024-26861
  * CVE-2024-26862
  * CVE-2024-26866
  * CVE-2024-26872
  * CVE-2024-26875
  * CVE-2024-26876
  * CVE-2024-26877
  * CVE-2024-26878
  * CVE-2024-26879
  * CVE-2024-26881
  * CVE-2024-26882
  * CVE-2024-26883
  * CVE-2024-26884
  * CVE-2024-26885
  * CVE-2024-26891
  * CVE-2024-26893
  * CVE-2024-26895
  * CVE-2024-26896
  * CVE-2024-26897
  * CVE-2024-26898
  * CVE-2024-26901
  * CVE-2024-26903
  * CVE-2024-26915
  * CVE-2024-26917
  * CVE-2024-26927
  * CVE-2024-26933
  * CVE-2024-26939
  * CVE-2024-26948
  * CVE-2024-26950
  * CVE-2024-26951
  * CVE-2024-26955
  * CVE-2024-26956
  * CVE-2024-26960
  * CVE-2024-26965
  * CVE-2024-26966
  * CVE-2024-26969
  * CVE-2024-26970
  * CVE-2024-26972
  * CVE-2024-26979
  * CVE-2024-26981
  * CVE-2024-26982
  * CVE-2024-26993
  * CVE-2024-27013
  * CVE-2024-27014
  * CVE-2024-27030
  * CVE-2024-27038
  * CVE-2024-27039
  * CVE-2024-27041
  * CVE-2024-27042
  * CVE-2024-27043
  * CVE-2024-27046
  * CVE-2024-27056
  * CVE-2024-27059
  * CVE-2024-27062
  * CVE-2024-27389

  
CVSS scores:

  * CVE-2021-47184 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47187 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47191 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47193 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47193 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47194 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47195 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47197 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47198 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47199 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47202 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47203 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47204 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47205 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47206 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47207 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47209 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47210 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47211 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47212 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47214 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47215 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47216 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-47217 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47219 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48631 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48632 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48634 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48636 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48637 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48638 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48639 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48640 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48642 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48644 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48646 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48647 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48648 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48650 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48651 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48652 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48653 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48654 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-48655 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48655 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48656 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48657 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48658 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48658 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48659 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48659 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48660 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48660 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48662 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48662 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48667 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-48668 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-48671 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48672 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-48673 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48675 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48686 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-48687 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48688 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48690 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48693 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48694 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48695 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48697 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-48698 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48699 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48700 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48701 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-48702 ( SUSE ):  5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48703 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-2860 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-2860 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52585 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52589 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52590 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-52591 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52593 ( SUSE ):  5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2023-52614 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52616 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52620 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52645 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52645 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52646 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52652 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-6270 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6270 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-0639 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-0639 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-0841 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-0841 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-2201 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-22099 ( SUSE ):  5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-22099 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-23307 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-23307 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-23848 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-23848 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-23850 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-23850 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26601 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26601 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26610 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-26656 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26671 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26673 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26675 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26679 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26687 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26688 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26700 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26702 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26764 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26766 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26820 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26825 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26833 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26836 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26840 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26852 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26856 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26861 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26862 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26866 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26872 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26875 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26876 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26877 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26879 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26881 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26882 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26882 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26883 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26883 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26885 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26885 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26891 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26897 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26898 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26898 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26901 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-26901 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26903 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26903 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26917 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26927 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26933 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26939 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26951 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26956 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26960 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26965 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26970 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26979 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26993 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27030 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2024-27038 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27039 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27041 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27042 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-27043 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27046 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27056 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27389 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.5
  * Public Cloud Module 15-SP5
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5

  
  
An update that solves 190 vulnerabilities, contains one feature and has 41
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
    (bsc#1223705).
  * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
  * CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists
    (bsc#1223822).
  * CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure
    (bsc#1223827).
  * CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
    (bsc#1223824).
  * CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in
    amdgpu_discovery_reg_base_init() (bsc#1223823).
  * CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in
    amdgpu_dm_fini() (bsc#1223714).
  * CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree()
    (bsc#1223821).
  * CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
  * CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts
    (bsc#1223790).
  * CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS
    (bsc#1223735).
  * CVE-2024-27013: Fixed tun limit printing rate when illegal packet received
    by tun device (bsc#1223745).
  * CVE-2024-26993: Fixed fs/sysfs reference leak in
    sysfs_break_active_protection() (bsc#1223693).
  * CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value
    of zero (bsc#1223634).
  * CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table
    arrays (bsc#1223644).
  * CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table
    arrays (bsc#1223645).
  * CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table
    arrays (bsc#1223646).
  * CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table
    arrays (bsc#1223648).
  * CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
    swapoff() (bsc#1223655).
  * CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead
    instead of empty list (bsc#1223660).
  * CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead
    of peer (bsc#1223661).
  * CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in
    dc_state_release (bsc#1223664).
  * CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race
    (bsc#1223679).
  * CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch
    (bsc#1223525).
  * CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).
  * CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent
    kernel-infoleak (bsc#1223198).
  * CVE-2024-26898: Fixed aoe potential use-after-free problem in
    aoecmd_cfg_pkts (bsc#1223016).
  * CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
  * CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC
    transport cleanup path (bsc#1223196).
  * CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
    (bsc#1223190).
  * CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
    (bsc#1223189).
  * CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
    (bsc#1223035).
  * CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in
    ip_tunnel_rcv() (bsc#1223034).
  * CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08
    devices (bsc#1223041).
  * CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps
    (bsc#1223066).
  * CVE-2024-26878: Fixed quota for potential NULL pointer dereference
    (bsc#1223060).
  * CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe
    (bsc#1223119).
  * CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant
    spi_controller_put call (bsc#1223024).
  * CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
    (bsc#1223111).
  * CVE-2024-26861: Fixed wireguard/receive annotate data-race around
    receiving_counter.counter (bsc#1223076).
  * CVE-2024-26857: Fixed geneve to make sure to pull inner header in
    geneve_rx() (bsc#1223058).
  * CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry
    (bsc#1223052).
  * CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in
    ice_bridge_setlink() (bsc#1223051).
  * CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT
    (bsc#1223061).
  * CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
    ip6_route_mpath_notify() (bsc#1223057).
  * CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
  * CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for
    workstations (bsc#1222968).
  * CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
    administratively set MAC (bsc#1223012).
  * CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid
    integer overflow (bsc#1222812).
  * CVE-2024-26816: Fixed relocations in .notes section when building with
    CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
  * CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names
    (bsc#1222793).
  * CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a
    wrong zone index (bsc#1222615).
  * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
    ext4_mb_try_best_found() (bsc#1222618).
  * CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group
    in ext4_mb_find_by_goal() (bsc#1222613).
  * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
    (bsc#1222726).
  * CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
    aio_kiocb conversion (bsc#1222721).
  * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
  * CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference for RV
    (bsc#1222870).
  * CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
    (bsc#1222435).
  * CVE-2024-26679: Fixed inet read sk->sk_family once in inet_recv_error()
    (bsc#1222385).
  * CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
  * CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization
    (bsc#1222368).
  * CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
  * CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
  * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
  * CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
    (bsc#1220342).
  * CVE-2024-23850: Fixed double free of anonymous device after snapshot
    creation failure (bsc#1219126).
  * CVE-2024-23848: Fixed media/cec for possible use-after-free in
    cec_queue_msg_fh (bsc#1219104).
  * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
    and ARM md, raid, raid5 modules (bsc#1219169).
  * CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
    (bsc#1219170).
  * CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
  * CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
    function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
  * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
    found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
  * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
    (bsc#1218562).
  * CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device()
    (bsc#1223686).
  * CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
    (bsc#1223033).
  * CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop]
    (bsc#1222294).
  * CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous
    sets never used from userspace (bsc#1221825).
  * CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
    mpi_ec_init (bsc#1221612).
  * CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show
    (bsc#1221617).
  * CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in
    wfx_set_mfp_ap() (bsc#1221042).
  * CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
    directory renaming (bsc#1221044).
  * CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
    renaming (bsc#1221088).
  * CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
  * CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in
    amdgpu_ras_query_error_status_helper() (bsc#1221080).
  * CVE-2022-48662: Fixed a general protection fault (GPF) in
    i915_perf_open_ioctl (bsc#1223505).
  * CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails
    (bsc#1223498).
  * CVE-2022-48658: Fixed mm/slub to avoid a problem in
    flush_cpu_slab()/__free_slab() task context (bsc#1223496).
  * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
    skb->mac_header (bsc#1223513).
  * CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at
    nf_tables_addchain() (bsc#1223478).
  * CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in
    bond_rr_gen_slave_id (bsc#1223499).
  * CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries
    == 0 and eh_depth > 0 (bsc#1223475).
  * CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in
    hugetlb_mcopy_atomic_pte() (bsc#1222710).
  * CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-
    audio (bsc#1222869).
  * CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus
    (bsc#1222790).
  * CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng
    (bsc#1222888).
  * CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
    (bsc#1222878)
  * CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within
    drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
  * CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
    (bsc#1222832).
  * CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer
    (bsc#1222669).
  * CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync
    (bsc#1222666).

The following non-security bugs were fixed:

  * ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block
    counter (stable-fixes).
  * ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
    (stable-fixes).
  * ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
  * ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
  * ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
  * ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
    fixes).
  * ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
    fixes).
  * ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
    fixes).
  * ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
  * ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
  * ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
  * ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
  * ASoC: meson: axg-card: make links nonatomic (git-fixes).
  * ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
  * ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
  * ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
  * ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
  * ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
  * Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
  * Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
  * Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
  * Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
    fixes).
  * Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
  * Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
  * Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
  * Bluetooth: add quirk for broken address properties (git-fixes).
  * Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
    fixes).
  * Bluetooth: btintel: Fixe build regression (git-fixes).
  * Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
    fixes).
  * Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
  * Bluetooth: hci_event: set the conn encrypted before conn establishes
    (stable-fixes).
  * Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
  * Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
  * Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
  * HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
    (git-fixes).
  * HID: logitech-dj: allow mice to use all types of reports (git-fixes).
  * HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
  * Input: allocate keycode for Display refresh rate toggle (stable-fixes).
  * Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails
    (stable-fixes).
  * NFC: trf7970a: disable all regulators on removal (git-fixes).
  * PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
    ltc#205888).
  * RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
  * Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
  * Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default"
    (stable-fixes).
  * Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
  * Revert "ice: Fix ice VF reset during iavf initialization (jsc#PED-376)."
    (bsc#1223275)
  * Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
  * Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
  * USB: UAS: return ENODEV when submit urbs fail with device not attached
    (stable-fixes).
  * USB: core: Add hub_get() and hub_put() routines (git-fixes).
  * USB: core: Fix access violation during port device removal (git-fixes).
  * USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
  * USB: serial: add device ID for VeriFone adapter (stable-fixes).
  * USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
  * USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
    fixes).
  * USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
    fixes).
  * USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
  * USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
  * USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
  * USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
    fixes).
  * USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
  * USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
  * USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
  * nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).
  * s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
  * nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
  * s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops
    (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
  * ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
  * ahci: asm1064: correct count of reported ports (stable-fixes).
  * arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
  * arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
    fixes)
  * arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
    fixes)
  * arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
  * arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
    fixes)
  * arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
  * arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
  * arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
  * ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
  * batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
  * clk: Get runtime PM before walking tree during disable_unused (git-fixes).
  * clk: Initialize struct clk_core kref earlier (stable-fixes).
  * clk: Mark 'all_lists' as const (stable-fixes).
  * clk: Print an info line before disabling unused clocks (stable-fixes).
  * clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
  * clk: remove extra empty line (stable-fixes).
  * comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
  * dma: xilinx_dpdma: Fix locking (git-fixes).
  * dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
  * dmaengine: owl: fix register access functions (git-fixes).
  * dmaengine: tegra186: Fix residual calculation (git-fixes).
  * docs: Document the FAN_FS_ERROR event (stable-fixes).
  * drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
  * drm/amd/display: Do not recursively call manual trigger programming (stable-
    fixes).
  * drm/amd/display: Fix nanosec stat overflow (stable-fixes).
  * drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
  * drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
  * drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
  * drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
  * drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
  * drm/amdgpu: always force full reset for SOC21 (stable-fixes).
  * drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
  * drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
  * drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
  * drm/amdgpu: validate the parameters of bo mapping operations more clearly
    (git-fixes).
  * drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
  * drm/ast: Fix soft lockup (git-fixes).
  * drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
    fixes).
  * drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
    fixes).
  * drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
  * drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
  * drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
  * drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
  * drm/panel: ili9341: Respect deferred probe (git-fixes).
  * drm/panel: ili9341: Use predefined error codes (git-fixes).
  * drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
  * drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
  * drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
  * drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
  * drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
  * drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
  * drm: nv04: Fix out of bounds access (git-fixes).
  * drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
  * drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-
    fixes).
  * dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
  * fbdev: fix incorrect address computation in deferred IO (git-fixes).
  * fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
  * fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
    fixes).
  * fuse: do not unhash root (bsc#1223951).
  * fuse: fix root lookup with nonzero generation (bsc#1223950).
  * hwmon: (amc6821) add of_match table (stable-fixes).
  * i2c: pxa: hide unused icr_bits[] variable (git-fixes).
  * i2c: smbus: fix NULL function pointer dereference (git-fixes).
  * i40e: Fix VF MAC filter removal (git-fixes).
  * idma64: Do not try to serve interrupts when device is powered off (git-
    fixes).
  * iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
  * iio:imu: adis16475: Fix sync mode setting (git-fixes).
  * init/main.c: Fix potential static_command_line memory overflow (git-fixes).
  * ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
  * irqchip/gic-v3-its: Prevent double free on error (git-fixes).
  * kprobes: Fix possible use-after-free issue on kprobe registration (git-
    fixes).
  * livepatch: Fix missing newline character in klp_resolve_symbols()
    (bsc#1223539).
  * media: cec: core: remove length check of Timer Status (stable-fixes).
  * media: sta2x11: fix irq handler cast (stable-fixes).
  * mei: me: add arrow lake point H DID (stable-fixes).
  * mei: me: add arrow lake point S DID (stable-fixes).
  * mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
  * mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
  * mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
  * mtd: diskonchip: work around ubsan link failure (stable-fixes).
  * net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
  * net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
  * net: fix skb leak in __skb_tstamp_tx() (git-fixes).
  * net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
  * net: mld: fix reference count leak in mld_{query | report}_work() (git-
    fixes).
  * net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
  * net: usb: ax88179_178a: avoid writing the mac address before first reading
    (git-fixes).
  * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
  * net: vlan: fix underflow for the real_dev refcnt (git-fixes).
  * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
    (bsc#1223360).
  * netfilter: br_netfilter: Drop dst references before setting (git-fixes).
  * netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-
    fixes).
  * netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
    fixes).
  * nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
    bsc#1217408).
  * nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
  * nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
  * nouveau: fix function cast warning (git-fixes).
  * nouveau: fix instmem race condition around ptr stores (git-fixes).
  * phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
  * pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
    (stable-fixes).
  * platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-
    fixes).
  * platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi
    Vi8 tablet (stable-fixes).
  * powerpc/kasan: Do not instrument non-maskable or raw interrupts
    (bsc#1223191).
  * powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369
    ltc#205888).
  * powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
  * powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
    ltc#205739 bsc#1223191).
  * powerpc: Refactor verification of MSR_RI (bsc#1223191).
  * printk: Add this_cpu_in_panic() (bsc#1223574).
  * printk: Adjust mapping for 32bit seq macros (bsc#1223574).
  * printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
  * printk: Disable passing console lock owner completely during panic()
    (bsc#1223574).
  * printk: Drop console_sem during panic (bsc#1223574).
  * printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
    (bsc#1223574).
  * printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
  * printk: Wait for all reserved records with pr_flush() (bsc#1223574).
  * printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
  * printk: ringbuffer: Clarify special lpos values (bsc#1223574).
  * printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
  * printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
    (bsc#1223574).
  * printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
  * printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
  * pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
  * ring-buffer: Only update pages_touched when a new page is touched (git-
    fixes).
  * ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent
    environment (git-fixes).
  * s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
  * s390/decompressor: fix misaligned symbol build error (git-fixes
    bsc#1223785).
  * s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
  * s390/mm: Fix storage key clearing for guest huge pages (git-fixes
    bsc#1223878).
  * s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
  * s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
  * s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
    bsc#1223876).
  * s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
  * s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
    bsc#1223595).
  * serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
  * serial: core: Provide port lock wrappers (stable-fixes).
  * serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
  * serial: mxs-auart: add spinlock around changing cts state (git-fixes).
  * slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
  * speakup: Avoid crash on very long word (git-fixes).
  * speakup: Fix 8bit characters from direct synth (git-fixes).
  * spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
    (git-fixes).
  * tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
  * thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
  * thunderbolt: Fix wake configurations after device unplug (stable-fixes).
  * tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
    fixes).
  * tracing: Show size of requested perf buffer (git-fixes).
  * usb: Disable USB3 LPM at shutdown (stable-fixes).
  * usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
    device (git-fixes).
  * usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
  * usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
  * usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
  * usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
    fixes).
  * usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
    error (stable-fixes).
  * usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
  * usb: ohci: Prevent missed ohci interrupts (git-fixes).
  * usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
    (stable-fixes).
  * usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
  * usb: typec: tcpm: Check for port partner validity before consuming it (git-
    fixes).
  * usb: typec: tcpm: unregister existing source caps before re-registration
    (bsc#1220569).
  * usb: typec: ucsi: Ack unsupported commands (stable-fixes).
  * usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
  * usb: typec: ucsi: Fix connector check on init (git-fixes).
  * usb: udc: remove warning when queue disabled ep (stable-fixes).
  * virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
  * wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
  * wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
    fixes).
  * wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
  * wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
    fixes).
  * wifi: nl80211: do not free NULL coalescing rule (git-fixes).
  * x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
  * x86/bugs: Fix BHI documentation (git-fixes).
  * x86/bugs: Fix BHI handling of RRSBA (git-fixes).
  * x86/bugs: Fix BHI retpoline check (git-fixes).
  * x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
  * x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-
    fixes).
  * x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
    fixes).
  * x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
    (jsc#PED-7167 git-fixes).
  * x86/sev: Skip ROM range scans and validation for SEV-SNP guests
    (jsc#PED-7167 git-fixes).
  * xfrm6: fix inet6_dev refcount underflow problem (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.5  
    zypper in -t patch openSUSE-SLE-15.5-2024-1644=1 SUSE-2024-1644=1

  * Public Cloud Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1644=1

## Package List:

  * openSUSE Leap 15.5 (aarch64 x86_64)
    * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.51.1
    * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1
    * reiserfs-kmp-azure-5.14.21-150500.33.51.1
    * kernel-azure-extra-debuginfo-5.14.21-150500.33.51.1
    * kernel-azure-debuginfo-5.14.21-150500.33.51.1
    * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1
    * dlm-kmp-azure-5.14.21-150500.33.51.1
    * kernel-azure-debugsource-5.14.21-150500.33.51.1
    * kselftests-kmp-azure-5.14.21-150500.33.51.1
    * kernel-azure-devel-5.14.21-150500.33.51.1
    * dlm-kmp-azure-debuginfo-5.14.21-150500.33.51.1
    * kernel-azure-livepatch-devel-5.14.21-150500.33.51.1
    * cluster-md-kmp-azure-5.14.21-150500.33.51.1
    * kernel-azure-extra-5.14.21-150500.33.51.1
    * kernel-azure-optional-debuginfo-5.14.21-150500.33.51.1
    * kernel-azure-optional-5.14.21-150500.33.51.1
    * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.51.1
    * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.51.1
    * ocfs2-kmp-azure-5.14.21-150500.33.51.1
    * kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1
    * kernel-syms-azure-5.14.21-150500.33.51.1
    * gfs2-kmp-azure-5.14.21-150500.33.51.1
  * openSUSE Leap 15.5 (aarch64 nosrc x86_64)
    * kernel-azure-5.14.21-150500.33.51.1
  * openSUSE Leap 15.5 (x86_64)
    * kernel-azure-vdso-debuginfo-5.14.21-150500.33.51.1
    * kernel-azure-vdso-5.14.21-150500.33.51.1
  * openSUSE Leap 15.5 (noarch)
    * kernel-source-azure-5.14.21-150500.33.51.1
    * kernel-devel-azure-5.14.21-150500.33.51.1
  * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
    * kernel-azure-5.14.21-150500.33.51.1
  * Public Cloud Module 15-SP5 (aarch64 x86_64)
    * kernel-azure-devel-5.14.21-150500.33.51.1
    * kernel-azure-debugsource-5.14.21-150500.33.51.1
    * kernel-azure-debuginfo-5.14.21-150500.33.51.1
    * kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1
    * kernel-syms-azure-5.14.21-150500.33.51.1
  * Public Cloud Module 15-SP5 (noarch)
    * kernel-source-azure-5.14.21-150500.33.51.1
    * kernel-devel-azure-5.14.21-150500.33.51.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-47047.html
  * https://www.suse.com/security/cve/CVE-2021-47184.html
  * https://www.suse.com/security/cve/CVE-2021-47185.html
  * https://www.suse.com/security/cve/CVE-2021-47187.html
  * https://www.suse.com/security/cve/CVE-2021-47188.html
  * https://www.suse.com/security/cve/CVE-2021-47191.html
  * https://www.suse.com/security/cve/CVE-2021-47192.html
  * https://www.suse.com/security/cve/CVE-2021-47193.html
  * https://www.suse.com/security/cve/CVE-2021-47194.html
  * https://www.suse.com/security/cve/CVE-2021-47195.html
  * https://www.suse.com/security/cve/CVE-2021-47196.html
  * https://www.suse.com/security/cve/CVE-2021-47197.html
  * https://www.suse.com/security/cve/CVE-2021-47198.html
  * https://www.suse.com/security/cve/CVE-2021-47199.html
  * https://www.suse.com/security/cve/CVE-2021-47200.html
  * https://www.suse.com/security/cve/CVE-2021-47201.html
  * https://www.suse.com/security/cve/CVE-2021-47202.html
  * https://www.suse.com/security/cve/CVE-2021-47203.html
  * https://www.suse.com/security/cve/CVE-2021-47204.html
  * https://www.suse.com/security/cve/CVE-2021-47205.html
  * https://www.suse.com/security/cve/CVE-2021-47206.html
  * https://www.suse.com/security/cve/CVE-2021-47207.html
  * https://www.suse.com/security/cve/CVE-2021-47209.html
  * https://www.suse.com/security/cve/CVE-2021-47210.html
  * https://www.suse.com/security/cve/CVE-2021-47211.html
  * https://www.suse.com/security/cve/CVE-2021-47212.html
  * https://www.suse.com/security/cve/CVE-2021-47214.html
  * https://www.suse.com/security/cve/CVE-2021-47215.html
  * https://www.suse.com/security/cve/CVE-2021-47216.html
  * https://www.suse.com/security/cve/CVE-2021-47217.html
  * https://www.suse.com/security/cve/CVE-2021-47218.html
  * https://www.suse.com/security/cve/CVE-2021-47219.html
  * https://www.suse.com/security/cve/CVE-2022-48631.html
  * https://www.suse.com/security/cve/CVE-2022-48632.html
  * https://www.suse.com/security/cve/CVE-2022-48634.html
  * https://www.suse.com/security/cve/CVE-2022-48636.html
  * https://www.suse.com/security/cve/CVE-2022-48637.html
  * https://www.suse.com/security/cve/CVE-2022-48638.html
  * https://www.suse.com/security/cve/CVE-2022-48639.html
  * https://www.suse.com/security/cve/CVE-2022-48640.html
  * https://www.suse.com/security/cve/CVE-2022-48642.html
  * https://www.suse.com/security/cve/CVE-2022-48644.html
  * https://www.suse.com/security/cve/CVE-2022-48646.html
  * https://www.suse.com/security/cve/CVE-2022-48647.html
  * https://www.suse.com/security/cve/CVE-2022-48648.html
  * https://www.suse.com/security/cve/CVE-2022-48650.html
  * https://www.suse.com/security/cve/CVE-2022-48651.html
  * https://www.suse.com/security/cve/CVE-2022-48652.html
  * https://www.suse.com/security/cve/CVE-2022-48653.html
  * https://www.suse.com/security/cve/CVE-2022-48654.html
  * https://www.suse.com/security/cve/CVE-2022-48655.html
  * https://www.suse.com/security/cve/CVE-2022-48656.html
  * https://www.suse.com/security/cve/CVE-2022-48657.html
  * https://www.suse.com/security/cve/CVE-2022-48658.html
  * https://www.suse.com/security/cve/CVE-2022-48659.html
  * https://www.suse.com/security/cve/CVE-2022-48660.html
  * https://www.suse.com/security/cve/CVE-2022-48662.html
  * https://www.suse.com/security/cve/CVE-2022-48663.html
  * https://www.suse.com/security/cve/CVE-2022-48667.html
  * https://www.suse.com/security/cve/CVE-2022-48668.html
  * https://www.suse.com/security/cve/CVE-2022-48671.html
  * https://www.suse.com/security/cve/CVE-2022-48672.html
  * https://www.suse.com/security/cve/CVE-2022-48673.html
  * https://www.suse.com/security/cve/CVE-2022-48675.html
  * https://www.suse.com/security/cve/CVE-2022-48686.html
  * https://www.suse.com/security/cve/CVE-2022-48687.html
  * https://www.suse.com/security/cve/CVE-2022-48688.html
  * https://www.suse.com/security/cve/CVE-2022-48690.html
  * https://www.suse.com/security/cve/CVE-2022-48692.html
  * https://www.suse.com/security/cve/CVE-2022-48693.html
  * https://www.suse.com/security/cve/CVE-2022-48694.html
  * https://www.suse.com/security/cve/CVE-2022-48695.html
  * https://www.suse.com/security/cve/CVE-2022-48697.html
  * https://www.suse.com/security/cve/CVE-2022-48698.html
  * https://www.suse.com/security/cve/CVE-2022-48699.html
  * https://www.suse.com/security/cve/CVE-2022-48700.html
  * https://www.suse.com/security/cve/CVE-2022-48701.html
  * https://www.suse.com/security/cve/CVE-2022-48702.html
  * https://www.suse.com/security/cve/CVE-2022-48703.html
  * https://www.suse.com/security/cve/CVE-2022-48704.html
  * https://www.suse.com/security/cve/CVE-2023-2860.html
  * https://www.suse.com/security/cve/CVE-2023-52585.html
  * https://www.suse.com/security/cve/CVE-2023-52589.html
  * https://www.suse.com/security/cve/CVE-2023-52590.html
  * https://www.suse.com/security/cve/CVE-2023-52591.html
  * https://www.suse.com/security/cve/CVE-2023-52593.html
  * https://www.suse.com/security/cve/CVE-2023-52614.html
  * https://www.suse.com/security/cve/CVE-2023-52616.html
  * https://www.suse.com/security/cve/CVE-2023-52620.html
  * https://www.suse.com/security/cve/CVE-2023-52635.html
  * https://www.suse.com/security/cve/CVE-2023-52645.html
  * https://www.suse.com/security/cve/CVE-2023-52646.html
  * https://www.suse.com/security/cve/CVE-2023-52652.html
  * https://www.suse.com/security/cve/CVE-2023-6270.html
  * https://www.suse.com/security/cve/CVE-2024-0639.html
  * https://www.suse.com/security/cve/CVE-2024-0841.html
  * https://www.suse.com/security/cve/CVE-2024-2201.html
  * https://www.suse.com/security/cve/CVE-2024-22099.html
  * https://www.suse.com/security/cve/CVE-2024-23307.html
  * https://www.suse.com/security/cve/CVE-2024-23848.html
  * https://www.suse.com/security/cve/CVE-2024-23850.html
  * https://www.suse.com/security/cve/CVE-2024-26601.html
  * https://www.suse.com/security/cve/CVE-2024-26610.html
  * https://www.suse.com/security/cve/CVE-2024-26656.html
  * https://www.suse.com/security/cve/CVE-2024-26671.html
  * https://www.suse.com/security/cve/CVE-2024-26673.html
  * https://www.suse.com/security/cve/CVE-2024-26675.html
  * https://www.suse.com/security/cve/CVE-2024-26679.html
  * https://www.suse.com/security/cve/CVE-2024-26687.html
  * https://www.suse.com/security/cve/CVE-2024-26688.html
  * https://www.suse.com/security/cve/CVE-2024-26700.html
  * https://www.suse.com/security/cve/CVE-2024-26702.html
  * https://www.suse.com/security/cve/CVE-2024-26733.html
  * https://www.suse.com/security/cve/CVE-2024-26739.html
  * https://www.suse.com/security/cve/CVE-2024-26764.html
  * https://www.suse.com/security/cve/CVE-2024-26766.html
  * https://www.suse.com/security/cve/CVE-2024-26772.html
  * https://www.suse.com/security/cve/CVE-2024-26773.html
  * https://www.suse.com/security/cve/CVE-2024-26783.html
  * https://www.suse.com/security/cve/CVE-2024-26791.html
  * https://www.suse.com/security/cve/CVE-2024-26792.html
  * https://www.suse.com/security/cve/CVE-2024-26816.html
  * https://www.suse.com/security/cve/CVE-2024-26817.html
  * https://www.suse.com/security/cve/CVE-2024-26820.html
  * https://www.suse.com/security/cve/CVE-2024-26825.html
  * https://www.suse.com/security/cve/CVE-2024-26830.html
  * https://www.suse.com/security/cve/CVE-2024-26833.html
  * https://www.suse.com/security/cve/CVE-2024-26836.html
  * https://www.suse.com/security/cve/CVE-2024-26840.html
  * https://www.suse.com/security/cve/CVE-2024-26843.html
  * https://www.suse.com/security/cve/CVE-2024-26852.html
  * https://www.suse.com/security/cve/CVE-2024-26853.html
  * https://www.suse.com/security/cve/CVE-2024-26855.html
  * https://www.suse.com/security/cve/CVE-2024-26856.html
  * https://www.suse.com/security/cve/CVE-2024-26857.html
  * https://www.suse.com/security/cve/CVE-2024-26861.html
  * https://www.suse.com/security/cve/CVE-2024-26862.html
  * https://www.suse.com/security/cve/CVE-2024-26866.html
  * https://www.suse.com/security/cve/CVE-2024-26872.html
  * https://www.suse.com/security/cve/CVE-2024-26875.html
  * https://www.suse.com/security/cve/CVE-2024-26876.html
  * https://www.suse.com/security/cve/CVE-2024-26877.html
  * https://www.suse.com/security/cve/CVE-2024-26878.html
  * https://www.suse.com/security/cve/CVE-2024-26879.html
  * https://www.suse.com/security/cve/CVE-2024-26881.html
  * https://www.suse.com/security/cve/CVE-2024-26882.html
  * https://www.suse.com/security/cve/CVE-2024-26883.html
  * https://www.suse.com/security/cve/CVE-2024-26884.html
  * https://www.suse.com/security/cve/CVE-2024-26885.html
  * https://www.suse.com/security/cve/CVE-2024-26891.html
  * https://www.suse.com/security/cve/CVE-2024-26893.html
  * https://www.suse.com/security/cve/CVE-2024-26895.html
  * https://www.suse.com/security/cve/CVE-2024-26896.html
  * https://www.suse.com/security/cve/CVE-2024-26897.html
  * https://www.suse.com/security/cve/CVE-2024-26898.html
  * https://www.suse.com/security/cve/CVE-2024-26901.html
  * https://www.suse.com/security/cve/CVE-2024-26903.html
  * https://www.suse.com/security/cve/CVE-2024-26915.html
  * https://www.suse.com/security/cve/CVE-2024-26917.html
  * https://www.suse.com/security/cve/CVE-2024-26927.html
  * https://www.suse.com/security/cve/CVE-2024-26933.html
  * https://www.suse.com/security/cve/CVE-2024-26939.html
  * https://www.suse.com/security/cve/CVE-2024-26948.html
  * https://www.suse.com/security/cve/CVE-2024-26950.html
  * https://www.suse.com/security/cve/CVE-2024-26951.html
  * https://www.suse.com/security/cve/CVE-2024-26955.html
  * https://www.suse.com/security/cve/CVE-2024-26956.html
  * https://www.suse.com/security/cve/CVE-2024-26960.html
  * https://www.suse.com/security/cve/CVE-2024-26965.html
  * https://www.suse.com/security/cve/CVE-2024-26966.html
  * https://www.suse.com/security/cve/CVE-2024-26969.html
  * https://www.suse.com/security/cve/CVE-2024-26970.html
  * https://www.suse.com/security/cve/CVE-2024-26972.html
  * https://www.suse.com/security/cve/CVE-2024-26979.html
  * https://www.suse.com/security/cve/CVE-2024-26981.html
  * https://www.suse.com/security/cve/CVE-2024-26982.html
  * https://www.suse.com/security/cve/CVE-2024-26993.html
  * https://www.suse.com/security/cve/CVE-2024-27013.html
  * https://www.suse.com/security/cve/CVE-2024-27014.html
  * https://www.suse.com/security/cve/CVE-2024-27030.html
  * https://www.suse.com/security/cve/CVE-2024-27038.html
  * https://www.suse.com/security/cve/CVE-2024-27039.html
  * https://www.suse.com/security/cve/CVE-2024-27041.html
  * https://www.suse.com/security/cve/CVE-2024-27042.html
  * https://www.suse.com/security/cve/CVE-2024-27043.html
  * https://www.suse.com/security/cve/CVE-2024-27046.html
  * https://www.suse.com/security/cve/CVE-2024-27056.html
  * https://www.suse.com/security/cve/CVE-2024-27059.html
  * https://www.suse.com/security/cve/CVE-2024-27062.html
  * https://www.suse.com/security/cve/CVE-2024-27389.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1141539
  * https://bugzilla.suse.com/show_bug.cgi?id=1190576
  * https://bugzilla.suse.com/show_bug.cgi?id=1192145
  * https://bugzilla.suse.com/show_bug.cgi?id=1192837
  * https://bugzilla.suse.com/show_bug.cgi?id=1193629
  * https://bugzilla.suse.com/show_bug.cgi?id=1196869
  * https://bugzilla.suse.com/show_bug.cgi?id=1200313
  * https://bugzilla.suse.com/show_bug.cgi?id=1201308
  * https://bugzilla.suse.com/show_bug.cgi?id=1201489
  * https://bugzilla.suse.com/show_bug.cgi?id=1203906
  * https://bugzilla.suse.com/show_bug.cgi?id=1203935
  * https://bugzilla.suse.com/show_bug.cgi?id=1204614
  * https://bugzilla.suse.com/show_bug.cgi?id=1207361
  * https://bugzilla.suse.com/show_bug.cgi?id=1211592
  * https://bugzilla.suse.com/show_bug.cgi?id=1213573
  * https://bugzilla.suse.com/show_bug.cgi?id=1217339
  * https://bugzilla.suse.com/show_bug.cgi?id=1217408
  * https://bugzilla.suse.com/show_bug.cgi?id=1218562
  * https://bugzilla.suse.com/show_bug.cgi?id=1218917
  * https://bugzilla.suse.com/show_bug.cgi?id=1219104
  * https://bugzilla.suse.com/show_bug.cgi?id=1219126
  * https://bugzilla.suse.com/show_bug.cgi?id=1219141
  * https://bugzilla.suse.com/show_bug.cgi?id=1219169
  * https://bugzilla.suse.com/show_bug.cgi?id=1219170
  * https://bugzilla.suse.com/show_bug.cgi?id=1219264
  * https://bugzilla.suse.com/show_bug.cgi?id=1220342
  * https://bugzilla.suse.com/show_bug.cgi?id=1220569
  * https://bugzilla.suse.com/show_bug.cgi?id=1220761
  * https://bugzilla.suse.com/show_bug.cgi?id=1221042
  * https://bugzilla.suse.com/show_bug.cgi?id=1221044
  * https://bugzilla.suse.com/show_bug.cgi?id=1221080
  * https://bugzilla.suse.com/show_bug.cgi?id=1221084
  * https://bugzilla.suse.com/show_bug.cgi?id=1221088
  * https://bugzilla.suse.com/show_bug.cgi?id=1221299
  * https://bugzilla.suse.com/show_bug.cgi?id=1221612
  * https://bugzilla.suse.com/show_bug.cgi?id=1221617
  * https://bugzilla.suse.com/show_bug.cgi?id=1221645
  * https://bugzilla.suse.com/show_bug.cgi?id=1221825
  * https://bugzilla.suse.com/show_bug.cgi?id=1222294
  * https://bugzilla.suse.com/show_bug.cgi?id=1222307
  * https://bugzilla.suse.com/show_bug.cgi?id=1222357
  * https://bugzilla.suse.com/show_bug.cgi?id=1222368
  * https://bugzilla.suse.com/show_bug.cgi?id=1222379
  * https://bugzilla.suse.com/show_bug.cgi?id=1222385
  * https://bugzilla.suse.com/show_bug.cgi?id=1222424
  * https://bugzilla.suse.com/show_bug.cgi?id=1222430
  * https://bugzilla.suse.com/show_bug.cgi?id=1222435
  * https://bugzilla.suse.com/show_bug.cgi?id=1222482
  * https://bugzilla.suse.com/show_bug.cgi?id=1222559
  * https://bugzilla.suse.com/show_bug.cgi?id=1222585
  * https://bugzilla.suse.com/show_bug.cgi?id=1222613
  * https://bugzilla.suse.com/show_bug.cgi?id=1222615
  * https://bugzilla.suse.com/show_bug.cgi?id=1222618
  * https://bugzilla.suse.com/show_bug.cgi?id=1222624
  * https://bugzilla.suse.com/show_bug.cgi?id=1222666
  * https://bugzilla.suse.com/show_bug.cgi?id=1222669
  * https://bugzilla.suse.com/show_bug.cgi?id=1222671
  * https://bugzilla.suse.com/show_bug.cgi?id=1222703
  * https://bugzilla.suse.com/show_bug.cgi?id=1222704
  * https://bugzilla.suse.com/show_bug.cgi?id=1222709
  * https://bugzilla.suse.com/show_bug.cgi?id=1222710
  * https://bugzilla.suse.com/show_bug.cgi?id=1222721
  * https://bugzilla.suse.com/show_bug.cgi?id=1222726
  * https://bugzilla.suse.com/show_bug.cgi?id=1222773
  * https://bugzilla.suse.com/show_bug.cgi?id=1222776
  * https://bugzilla.suse.com/show_bug.cgi?id=1222785
  * https://bugzilla.suse.com/show_bug.cgi?id=1222787
  * https://bugzilla.suse.com/show_bug.cgi?id=1222790
  * https://bugzilla.suse.com/show_bug.cgi?id=1222791
  * https://bugzilla.suse.com/show_bug.cgi?id=1222792
  * https://bugzilla.suse.com/show_bug.cgi?id=1222793
  * https://bugzilla.suse.com/show_bug.cgi?id=1222796
  * https://bugzilla.suse.com/show_bug.cgi?id=1222812
  * https://bugzilla.suse.com/show_bug.cgi?id=1222824
  * https://bugzilla.suse.com/show_bug.cgi?id=1222829
  * https://bugzilla.suse.com/show_bug.cgi?id=1222832
  * https://bugzilla.suse.com/show_bug.cgi?id=1222836
  * https://bugzilla.suse.com/show_bug.cgi?id=1222838
  * https://bugzilla.suse.com/show_bug.cgi?id=1222866
  * https://bugzilla.suse.com/show_bug.cgi?id=1222867
  * https://bugzilla.suse.com/show_bug.cgi?id=1222869
  * https://bugzilla.suse.com/show_bug.cgi?id=1222870
  * https://bugzilla.suse.com/show_bug.cgi?id=1222876
  * https://bugzilla.suse.com/show_bug.cgi?id=1222878
  * https://bugzilla.suse.com/show_bug.cgi?id=1222879
  * https://bugzilla.suse.com/show_bug.cgi?id=1222881
  * https://bugzilla.suse.com/show_bug.cgi?id=1222883
  * https://bugzilla.suse.com/show_bug.cgi?id=1222888
  * https://bugzilla.suse.com/show_bug.cgi?id=1222894
  * https://bugzilla.suse.com/show_bug.cgi?id=1222901
  * https://bugzilla.suse.com/show_bug.cgi?id=1222968
  * https://bugzilla.suse.com/show_bug.cgi?id=1222976
  * https://bugzilla.suse.com/show_bug.cgi?id=1223012
  * https://bugzilla.suse.com/show_bug.cgi?id=1223014
  * https://bugzilla.suse.com/show_bug.cgi?id=1223016
  * https://bugzilla.suse.com/show_bug.cgi?id=1223024
  * https://bugzilla.suse.com/show_bug.cgi?id=1223033
  * https://bugzilla.suse.com/show_bug.cgi?id=1223034
  * https://bugzilla.suse.com/show_bug.cgi?id=1223035
  * https://bugzilla.suse.com/show_bug.cgi?id=1223036
  * https://bugzilla.suse.com/show_bug.cgi?id=1223037
  * https://bugzilla.suse.com/show_bug.cgi?id=1223041
  * https://bugzilla.suse.com/show_bug.cgi?id=1223042
  * https://bugzilla.suse.com/show_bug.cgi?id=1223051
  * https://bugzilla.suse.com/show_bug.cgi?id=1223052
  * https://bugzilla.suse.com/show_bug.cgi?id=1223056
  * https://bugzilla.suse.com/show_bug.cgi?id=1223057
  * https://bugzilla.suse.com/show_bug.cgi?id=1223058
  * https://bugzilla.suse.com/show_bug.cgi?id=1223060
  * https://bugzilla.suse.com/show_bug.cgi?id=1223061
  * https://bugzilla.suse.com/show_bug.cgi?id=1223065
  * https://bugzilla.suse.com/show_bug.cgi?id=1223066
  * https://bugzilla.suse.com/show_bug.cgi?id=1223076
  * https://bugzilla.suse.com/show_bug.cgi?id=1223078
  * https://bugzilla.suse.com/show_bug.cgi?id=1223111
  * https://bugzilla.suse.com/show_bug.cgi?id=1223115
  * https://bugzilla.suse.com/show_bug.cgi?id=1223118
  * https://bugzilla.suse.com/show_bug.cgi?id=1223119
  * https://bugzilla.suse.com/show_bug.cgi?id=1223140
  * https://bugzilla.suse.com/show_bug.cgi?id=1223187
  * https://bugzilla.suse.com/show_bug.cgi?id=1223189
  * https://bugzilla.suse.com/show_bug.cgi?id=1223190
  * https://bugzilla.suse.com/show_bug.cgi?id=1223191
  * https://bugzilla.suse.com/show_bug.cgi?id=1223196
  * https://bugzilla.suse.com/show_bug.cgi?id=1223197
  * https://bugzilla.suse.com/show_bug.cgi?id=1223198
  * https://bugzilla.suse.com/show_bug.cgi?id=1223207
  * https://bugzilla.suse.com/show_bug.cgi?id=1223275
  * https://bugzilla.suse.com/show_bug.cgi?id=1223323
  * https://bugzilla.suse.com/show_bug.cgi?id=1223360
  * https://bugzilla.suse.com/show_bug.cgi?id=1223369
  * https://bugzilla.suse.com/show_bug.cgi?id=1223380
  * https://bugzilla.suse.com/show_bug.cgi?id=1223432
  * https://bugzilla.suse.com/show_bug.cgi?id=1223473
  * https://bugzilla.suse.com/show_bug.cgi?id=1223474
  * https://bugzilla.suse.com/show_bug.cgi?id=1223475
  * https://bugzilla.suse.com/show_bug.cgi?id=1223477
  * https://bugzilla.suse.com/show_bug.cgi?id=1223478
  * https://bugzilla.suse.com/show_bug.cgi?id=1223479
  * https://bugzilla.suse.com/show_bug.cgi?id=1223481
  * https://bugzilla.suse.com/show_bug.cgi?id=1223482
  * https://bugzilla.suse.com/show_bug.cgi?id=1223484
  * https://bugzilla.suse.com/show_bug.cgi?id=1223487
  * https://bugzilla.suse.com/show_bug.cgi?id=1223490
  * https://bugzilla.suse.com/show_bug.cgi?id=1223496
  * https://bugzilla.suse.com/show_bug.cgi?id=1223498
  * https://bugzilla.suse.com/show_bug.cgi?id=1223499
  * https://bugzilla.suse.com/show_bug.cgi?id=1223501
  * https://bugzilla.suse.com/show_bug.cgi?id=1223502
  * https://bugzilla.suse.com/show_bug.cgi?id=1223503
  * https://bugzilla.suse.com/show_bug.cgi?id=1223505
  * https://bugzilla.suse.com/show_bug.cgi?id=1223509
  * https://bugzilla.suse.com/show_bug.cgi?id=1223511
  * https://bugzilla.suse.com/show_bug.cgi?id=1223512
  * https://bugzilla.suse.com/show_bug.cgi?id=1223513
  * https://bugzilla.suse.com/show_bug.cgi?id=1223516
  * https://bugzilla.suse.com/show_bug.cgi?id=1223517
  * https://bugzilla.suse.com/show_bug.cgi?id=1223518
  * https://bugzilla.suse.com/show_bug.cgi?id=1223519
  * https://bugzilla.suse.com/show_bug.cgi?id=1223520
  * https://bugzilla.suse.com/show_bug.cgi?id=1223522
  * https://bugzilla.suse.com/show_bug.cgi?id=1223523
  * https://bugzilla.suse.com/show_bug.cgi?id=1223525
  * https://bugzilla.suse.com/show_bug.cgi?id=1223536
  * https://bugzilla.suse.com/show_bug.cgi?id=1223539
  * https://bugzilla.suse.com/show_bug.cgi?id=1223574
  * https://bugzilla.suse.com/show_bug.cgi?id=1223595
  * https://bugzilla.suse.com/show_bug.cgi?id=1223598
  * https://bugzilla.suse.com/show_bug.cgi?id=1223628
  * https://bugzilla.suse.com/show_bug.cgi?id=1223634
  * https://bugzilla.suse.com/show_bug.cgi?id=1223640
  * https://bugzilla.suse.com/show_bug.cgi?id=1223643
  * https://bugzilla.suse.com/show_bug.cgi?id=1223644
  * https://bugzilla.suse.com/show_bug.cgi?id=1223645
  * https://bugzilla.suse.com/show_bug.cgi?id=1223646
  * https://bugzilla.suse.com/show_bug.cgi?id=1223648
  * https://bugzilla.suse.com/show_bug.cgi?id=1223655
  * https://bugzilla.suse.com/show_bug.cgi?id=1223657
  * https://bugzilla.suse.com/show_bug.cgi?id=1223660
  * https://bugzilla.suse.com/show_bug.cgi?id=1223661
  * https://bugzilla.suse.com/show_bug.cgi?id=1223663
  * https://bugzilla.suse.com/show_bug.cgi?id=1223664
  * https://bugzilla.suse.com/show_bug.cgi?id=1223668
  * https://bugzilla.suse.com/show_bug.cgi?id=1223670
  * https://bugzilla.suse.com/show_bug.cgi?id=1223679
  * https://bugzilla.suse.com/show_bug.cgi?id=1223686
  * https://bugzilla.suse.com/show_bug.cgi?id=1223693
  * https://bugzilla.suse.com/show_bug.cgi?id=1223705
  * https://bugzilla.suse.com/show_bug.cgi?id=1223714
  * https://bugzilla.suse.com/show_bug.cgi?id=1223735
  * https://bugzilla.suse.com/show_bug.cgi?id=1223738
  * https://bugzilla.suse.com/show_bug.cgi?id=1223745
  * https://bugzilla.suse.com/show_bug.cgi?id=1223784
  * https://bugzilla.suse.com/show_bug.cgi?id=1223785
  * https://bugzilla.suse.com/show_bug.cgi?id=1223790
  * https://bugzilla.suse.com/show_bug.cgi?id=1223816
  * https://bugzilla.suse.com/show_bug.cgi?id=1223821
  * https://bugzilla.suse.com/show_bug.cgi?id=1223822
  * https://bugzilla.suse.com/show_bug.cgi?id=1223823
  * https://bugzilla.suse.com/show_bug.cgi?id=1223824
  * https://bugzilla.suse.com/show_bug.cgi?id=1223827
  * https://bugzilla.suse.com/show_bug.cgi?id=1223834
  * https://bugzilla.suse.com/show_bug.cgi?id=1223858
  * https://bugzilla.suse.com/show_bug.cgi?id=1223875
  * https://bugzilla.suse.com/show_bug.cgi?id=1223876
  * https://bugzilla.suse.com/show_bug.cgi?id=1223877
  * https://bugzilla.suse.com/show_bug.cgi?id=1223878
  * https://bugzilla.suse.com/show_bug.cgi?id=1223879
  * https://bugzilla.suse.com/show_bug.cgi?id=1223894
  * https://bugzilla.suse.com/show_bug.cgi?id=1223921
  * https://bugzilla.suse.com/show_bug.cgi?id=1223922
  * https://bugzilla.suse.com/show_bug.cgi?id=1223923
  * https://bugzilla.suse.com/show_bug.cgi?id=1223924
  * https://bugzilla.suse.com/show_bug.cgi?id=1223929
  * https://bugzilla.suse.com/show_bug.cgi?id=1223931
  * https://bugzilla.suse.com/show_bug.cgi?id=1223932
  * https://bugzilla.suse.com/show_bug.cgi?id=1223934
  * https://bugzilla.suse.com/show_bug.cgi?id=1223941
  * https://bugzilla.suse.com/show_bug.cgi?id=1223948
  * https://bugzilla.suse.com/show_bug.cgi?id=1223949
  * https://bugzilla.suse.com/show_bug.cgi?id=1223950
  * https://bugzilla.suse.com/show_bug.cgi?id=1223951
  * https://bugzilla.suse.com/show_bug.cgi?id=1223952
  * https://bugzilla.suse.com/show_bug.cgi?id=1223953
  * https://bugzilla.suse.com/show_bug.cgi?id=1223956
  * https://bugzilla.suse.com/show_bug.cgi?id=1223957
  * https://bugzilla.suse.com/show_bug.cgi?id=1223960
  * https://bugzilla.suse.com/show_bug.cgi?id=1223962
  * https://bugzilla.suse.com/show_bug.cgi?id=1223963
  * https://bugzilla.suse.com/show_bug.cgi?id=1223964
  * https://bugzilla.suse.com/show_bug.cgi?id=1223996
  * https://jira.suse.com/browse/PED-7167

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240514/4ffabfd3/attachment.htm>


More information about the sle-updates mailing list