[Bug 1233134] New: boot freeze with kernel-default=5.14.21-150500.55.86 and amdgpu
https://bugzilla.suse.com/show_bug.cgi?id=1233134 Bug ID: 1233134 Summary: boot freeze with kernel-default=5.14.21-150500.55.86 and amdgpu Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.5 Hardware: x86-64 OS: Other Status: NEW Severity: Critical Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: heiko.rommel@suse.com QA Contact: qa-bugs@suse.de Target Milestone: --- Found By: --- Blocker: --- After having installed version 5.14.21-150500.55.86 of the kernel release candidate for SLE 15 SP5 / openSUSE 15.5 on my desktop, the system hangs in early boot with no video signal. When booting with loglevel=7 and drm.debug=0x1e I see that there are apparently some errors in drm, but they are only displayed for a very short time (< 1 sec) and then the signal to the display is cut off. The GPU is a discrete AMD Radeon RX 7800 XT. What did work: a) booting with nomodeset b) creating an update directory in /lib/modules/ for the new kernel and putting there the amdgpu.ko.zst from the previous kernel, rebuilding the initrd and booting (see https://bugzilla.suse.com/show_bug.cgi?id=1215802#c11) This looks like an re-incarnation of https://bugzilla.suse.com/show_bug.cgi?id=1215802 reported 14 month ago, but maybe with different root problems. Currently, I am trying to get a legible video of the booting. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 Robert Frohl <rfrohl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |rfrohl@suse.com Priority|P5 - None |P1 - Urgent -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 Robert Frohl <rfrohl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|kernel-bugs@opensuse.org |kernel-bugs@suse.de -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 Marcus Meissner <meissner@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |meissner@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c2 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(heiko.rommel@suse | |.com) CC| |heiko.rommel@suse.com, | |tiwai@suse.com --- Comment #2 from Takashi Iwai <tiwai@suse.com> --- Is it a complete kernel hang-up, or is it just a graphics problem? i.e. you can't access remotely via ssh? Also, please check with the latest SLE15-SP5 kernel in OBS Kernel:SLE15-SP5 repo https://download.opensuse.org/repositories/Kernel:/SLE15-SP5/pool/ If the problem persists, we'd need to get the crash log. e.g. you can disable the drm kernel modules in initrd via dracut option, also blacklisting amdgpu. Then after the system boots up, load amdgpu module manually and get the kernel messages. At best, try to set up kdump and get the full dmesg output. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c3 --- Comment #3 from Heiko Rommel <heiko.rommel@suse.com> --- (In reply to Takashi Iwai from comment #2)
Is it a complete kernel hang-up, or is it just a graphics problem? i.e. you can't access remotely via ssh?
It is a complete hang-up. Can't access it remotely or switch consoles. Only Sysrq still work.
Also, please check with the latest SLE15-SP5 kernel in OBS Kernel:SLE15-SP5 repo https://download.opensuse.org/repositories/Kernel:/SLE15-SP5/pool/
If the problem persists, we'd need to get the crash log. e.g. you can disable the drm kernel modules in initrd via dracut option, also blacklisting amdgpu. Then after the system boots up, load amdgpu module manually and get the kernel messages. At best, try to set up kdump and get the full dmesg output.
Will do. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c4 --- Comment #4 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878468 --> https://bugzilla.suse.com/attachment.cgi?id=878468&action=edit screen capture with drm error messages -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c5 --- Comment #5 from Takashi Iwai <tiwai@suse.com> --- When no kdump is set up yet: can you see any relevant crash in /var/log/messages after rebooting with the manual amdgpu load? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c6 --- Comment #6 from Heiko Rommel <heiko.rommel@suse.com> --- (In reply to Takashi Iwai from comment #2)
Also, please check with the latest SLE15-SP5 kernel in OBS Kernel:SLE15-SP5 repo https://download.opensuse.org/repositories/Kernel:/SLE15-SP5/pool/
Same symptoms with that kernel (5.14.21-150500.365.g6cc088f-default). However, it doesn't seem to crash (ssh session stayed alive), hence no crash log was produced.
If the problem persists, we'd need to get the crash log. e.g. you can disable the drm kernel modules in initrd via dracut option, also blacklisting amdgpu. Then after the system boots up, load amdgpu module manually and get the kernel messages. At best, try to set up kdump and get the full dmesg output.
I am going to attach log files and screen capture of that session in a moment. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c7 --- Comment #7 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878489 --> https://bugzilla.suse.com/attachment.cgi?id=878489&action=edit screen capture with drm messages from kernel 5.14.21-150500.365.g6cc088f-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c8 --- Comment #8 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878490 --> https://bugzilla.suse.com/attachment.cgi?id=878490&action=edit excerpt of /var/log/warn -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c9 --- Comment #9 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878491 --> https://bugzilla.suse.com/attachment.cgi?id=878491&action=edit excerpt of /var/log/messages -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c10 Heiko Rommel <heiko.rommel@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(heiko.rommel@suse | |.com) | --- Comment #10 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878492 --> https://bugzilla.suse.com/attachment.cgi?id=878492&action=edit excerpt of dmesg -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c11 --- Comment #11 from Takashi Iwai <tiwai@suse.com> --- Thanks. Indeed this doesn't crash but looks as if working... Could you give the same dmesg output from the working case for comparison, too? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c12 --- Comment #12 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878497 --> https://bugzilla.suse.com/attachment.cgi?id=878497&action=edit excerpt of dmesg for working 5.14.21-150500.55.83 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c15 --- Comment #15 from Takashi Iwai <tiwai@suse.com> --- (In reply to Heiko Rommel from comment #12)
Created attachment 878497 [details] excerpt of dmesg for working 5.14.21-150500.55.83
Could you give the dmesg output taken in the very same way like the previous one? That is, blacklisting it, and load it with drm.debug=0x1 option, but with the working admgpu. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c17 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(heiko.rommel@suse | |.com) --- Comment #17 from Takashi Iwai <tiwai@suse.com> --- I tried my test machine with AMD GPU and could see some related issue. Mine had no external display connected, and although the desktop appeared on the laptop display, the Linux console is gone. I see the same, the disappearance of console in your log, too. So I tracked further down the breakage and spotted out that it's the patch patches.suse/drm-amd-display-Check-null-pointers-before-using-the.patch for CVE-2024-49922 bsc#1232374 It's not clear exactly what happens there, but the addition of the first hunk there (the NULL check of dm_state) leads to the problem (at least on my system). And, this problem seems specific to SLE15-SP5; SLE15-SP6 and later are fine with the backport. That said, this looks like a generic AMDGPU regression on SLE15-SP5 kernel. I'm building two test SP5 test kernels in OBS home:tiwai:bsc1233134 and home:tiwai:bsc1233134-revert repos. The former is with the patch correction, and the latter is the drop of the whole patch. https://download.opensuse.org/repositories/home:/tiwai:/bsc1233134/pool/ https://download.opensuse.org/repositories/home:/tiwai:/bsc1233134-revert/po... Please give them a try later. If your bug is as same as mine, both of them should work. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dsterba@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c18 Chenzi Cao <chcao@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |chcao@suse.com --- Comment #18 from Chenzi Cao <chcao@suse.com> --- I reproduced the same issue with my laptop: Leap 15.5, AMD Ryzen 7 PRO 5850U: After installed kernel-default version 5.14.21-150500.55.86 on my openSUSE 15.5 desktop, the system hangs in early boot with no video signal.
I'm building two test SP5 test kernels in OBS home:tiwai:bsc1233134 and home:tiwai:bsc1233134-revert repos. The former is with the patch correction, and the latter is the drop of the whole patch.
https://download.opensuse.org/repositories/home:/tiwai:/bsc1233134/pool/
I tested this on my laptop: Steps: - download the kernel-default-5.14.21-150500.2.1.gc4d3cf0.x86_64.rpm - rpm -Uvh kernel-default-5.14.21-150500.2.1.gc4d3cf0.x86_64.rpm --force --nodeps - reboot then observed error: Loading Linux 5.14.21-150500.2.gc4d3cf0-default ... error: ../../grub-core/kern/efi/sb.c:183:bad shim signature. Loading initial ramdisk ... error: ../../grub-core/loader/i386/efi/linux.c:207:you need to load the kernel first. Then I turn the secure boot off from BIOS, and reboot, then it could boot. But after boot, my laotop can not connect to wifi, there's no wifi adapter. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c19 --- Comment #19 from Takashi Iwai <tiwai@suse.com> --- The WiFi problem must be a different issue. Please open another bugzilla entry. There, you can boot the standard update kernel (where the graphics is broken) with nomodeset boot option. This will disable the native graphics and use EFI framebuffer instead. You might be able to reach to the desktop and verify whether the WiFi works there, too. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c20 --- Comment #20 from Heiko Rommel <heiko.rommel@suse.com> --- (In reply to Takashi Iwai from comment #17)
I'm building two test SP5 test kernels in OBS home:tiwai:bsc1233134 and home:tiwai:bsc1233134-revert repos. The former is with the patch correction, and the latter is the drop of the whole patch.
https://download.opensuse.org/repositories/home:/tiwai:/bsc1233134/pool/
https://download.opensuse.org/repositories/home:/tiwai:/bsc1233134-revert/ pool/
Please give them a try later. If your bug is as same as mine, both of them should work.
I can confirm that both of these kernels (5.14.21-150500.2.gc4d3cf0-default resp. 5.14.21-150500.1.g77359d7-default) work for me. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c21 Heiko Rommel <heiko.rommel@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(heiko.rommel@suse | |.com) | --- Comment #21 from Heiko Rommel <heiko.rommel@suse.com> --- Created attachment 878591 --> https://bugzilla.suse.com/attachment.cgi?id=878591&action=edit dmesg with working 5.14.21-150500.55.83 and manually loading amdgpu This is how the output has been created: * have "blacklist amdgpu" in /etc/modprobe.d/local-dontload.conf * rebuild the initrd with "dracut --omit-drivers amdgpu --kver 5.14.21-150500.55.83-default -f" * boot kernel 5.14.21-150500.55.83-default with options "loglevel=7 drm.debug=0x1e" * after successful boot, verify that the driver amdgpu was NOT loaded automatically * run "modprobe -v amdgpu" * capture the entire output of dmesg -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c22 --- Comment #22 from Marcus Meissner <meissner@suse.com> --- Takashi, are we ready to resubmit? is the fix in GIT? (we still wait for the ctdb regression) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c23 --- Comment #23 from Takashi Iwai <tiwai@suse.com> --- (In reply to Marcus Meissner from comment #22)
Takashi, are we ready to resubmit?
is the fix in GIT?
(we still wait for the ctdb regression)
Yes, SLE15-SP5 git branch already contains the fix in the commit c4d3cf0182411909271051e21c883e565dd8714b. This can be cherry-picked, too. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c27 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #27 from Takashi Iwai <tiwai@suse.com> --- As November update was skipped and the fix is already included in the December update, I close the bug for now. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c30 --- Comment #30 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4315-1: An update that solves 230 vulnerabilities and has 33 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244315-1 Category: security (important) Bug References: 1082555, 1194869, 1218644, 1220382, 1221309, 1221333, 1222364, 1222590, 1223202, 1223656, 1223848, 1223919, 1223942, 1224518, 1224526, 1224574, 1225725, 1225730, 1225742, 1225764, 1225812, 1226560, 1226592, 1226631, 1226748, 1226872, 1227853, 1228410, 1228430, 1228486, 1228650, 1228857, 1229312, 1229429, 1229585, 1229752, 1229808, 1230055, 1230220, 1230231, 1230270, 1230558, 1230827, 1230918, 1231083, 1231089, 1231098, 1231101, 1231108, 1231111, 1231132, 1231135, 1231138, 1231169, 1231178, 1231180, 1231181, 1231187, 1231202, 1231434, 1231441, 1231452, 1231465, 1231474, 1231481, 1231537, 1231541, 1231646, 1231849, 1231856, 1231858, 1231859, 1231864, 1231904, 1231916, 1231920, 1231923, 1231930, 1231931, 1231947, 1231952, 1231953, 1231959, 1231978, 1232013, 1232015, 1232016, 1232017, 1232027, 1232028, 1232047, 1232048, 1232050, 1232056, 1232076, 1232080, 1232094, 1232096, 1232098, 1232111, 1232126, 1232134, 1232135, 1232141, 1232142, 1232147, 1232152, 1232159, 1232162, 1232165, 1232180, 1232185, 1232187, 1232189, 1232195, 1232198, 1232201, 1232218, 1232224, 1232232, 1232254, 1232255, 1232264, 1232272, 1232279, 1232287, 1232293, 1232312, 1232317, 1232318, 1232333, 1232334, 1232335, 1232339, 1232349, 1232357, 1232359, 1232362, 1232364, 1232370, 1232371, 1232378, 1232385, 1232387, 1232394, 1232413, 1232416, 1232436, 1232483, 1232500, 1232503, 1232504, 1232507, 1232520, 1232552, 1232757, 1232819, 1232860, 1232870, 1232873, 1232877, 1232878, 1232881, 1232884, 1232885, 1232887, 1232888, 1232890, 1232892, 1232896, 1232897, 1232905, 1232907, 1232919, 1232926, 1232928, 1232935, 1233035, 1233049, 1233051, 1233056, 1233057, 1233061, 1233063, 1233065, 1233067, 1233070, 1233073, 1233074, 1233100, 1233103, 1233104, 1233105, 1233106, 1233107, 1233108, 1233110, 1233111, 1233113, 1233114, 1233117, 1233123, 1233125, 1233129, 1233130, 1233134, 1233135, 1233150, 1233189, 1233191, 1233197, 1233205, 1233206, 1233209, 1233210, 1233211, 1233212, 1233214, 1233216, 1233238, 1233241, 1233253, 1233255, 1233293, 1233350, 1233452, 1233453, 1233454, 1233456, 1233457, 1233458, 1233460, 1233462, 1233463, 1233468, 1233471, 1233476, 1233478, 1233479, 1233481, 1233484, 1233487, 1233490, 1233491, 1233528, 1233548, 1233552, 1233553, 1233554, 1233555, 1233557, 1233560, 1233561, 1233570, 1233577, 1233580, 1233977, 1234012, 1234025, 1234085, 1234093, 1234098, 1234108 CVE References: CVE-2021-47594, CVE-2022-48674, CVE-2022-48979, CVE-2022-48982, CVE-2022-48983, CVE-2022-48989, CVE-2022-48990, CVE-2023-52915, CVE-2023-52917, CVE-2023-52918, CVE-2023-52921, CVE-2023-52922, CVE-2024-26782, CVE-2024-26906, CVE-2024-26953, CVE-2024-35888, CVE-2024-35937, CVE-2024-35980, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36953, CVE-2024-36954, CVE-2024-38577, CVE-2024-38589, CVE-2024-38615, CVE-2024-40997, CVE-2024-41016, CVE-2024-41023, CVE-2024-41049, CVE-2024-42131, CVE-2024-43817, CVE-2024-43897, CVE-2024-44932, CVE-2024-44964, CVE-2024-44995, CVE-2024-46681, CVE-2024-46800, CVE-2024-46802, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46810, CVE-2024-46812, CVE-2024-46819, CVE-2024-46821, CVE-2024-46835, CVE-2024-46842, CVE-2024-46853, CVE-2024-46859, CVE-2024-46864, CVE-2024-46871, CVE-2024-47663, CVE-2024-47665, CVE-2024-47667, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47679, CVE-2024-47682, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47709, CVE-2024-47712, CVE-2024-47713, CVE-2024-47718, CVE-2024-47723, CVE-2024-47728, CVE-2024-47735, CVE-2024-47737, CVE-2024-47742, CVE-2024-47745, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49855, CVE-2024-49861, CVE-2024-49863, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49875, CVE-2024-49877, CVE-2024-49879, CVE-2024-49884, CVE-2024-49891, CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49907, CVE-2024-49908, CVE-2024-49921, CVE-2024-49924, CVE-2024-49925, CVE-2024-49934, CVE-2024-49935, CVE-2024-49938, CVE-2024-49945, CVE-2024-49947, CVE-2024-49950, CVE-2024-49957, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49968, CVE-2024-49981, CVE-2024-49983, CVE-2024-49985, CVE-2024-49989, CVE-2024-50003, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50013, CVE-2024-50017, CVE-2024-50025, CVE-2024-50026, CVE-2024-50031, CVE-2024-50044, CVE-2024-50062, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50077, CVE-2024-50078, CVE-2024-50082, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50138, CVE-2024-50141, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50160, CVE-2024-50167, CVE-2024-50171, CVE-2024-50179, CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50215, CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50249, CVE-2024-50255, CVE-2024-50259, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53052, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53104, CVE-2024-53110 Maintenance Incident: [SUSE:Maintenance:36787](https://smelt.suse.de/incident/36787/) Sources used: SUSE Real Time Module 15-SP5 (src): kernel-source-rt-5.14.21-150500.13.79.1, kernel-syms-rt-5.14.21-150500.13.79.1 openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.79.1, kernel-source-rt-5.14.21-150500.13.79.1, kernel-livepatch-SLE15-SP5-RT_Update_23-1-150500.11.3.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-source-rt-5.14.21-150500.13.79.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_23-1-150500.11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c31 --- Comment #31 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4364-1: An update that solves 439 vulnerabilities, contains nine features and has 68 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244364-1 Category: security (important) Bug References: 1054914, 1065729, 1082555, 1194869, 1204171, 1205796, 1206188, 1206344, 1209290, 1210449, 1210627, 1213034, 1216813, 1218562, 1218644, 1220382, 1221309, 1221333, 1222364, 1222590, 1223202, 1223384, 1223524, 1223656, 1223824, 1223848, 1223919, 1223942, 1224518, 1224526, 1224574, 1225189, 1225336, 1225611, 1225725, 1225730, 1225742, 1225762, 1225764, 1225812, 1226498, 1226560, 1226592, 1226631, 1226748, 1226797, 1226872, 1227437, 1227853, 1227885, 1228119, 1228269, 1228410, 1228430, 1228486, 1228650, 1228709, 1228743, 1228747, 1228857, 1229005, 1229019, 1229312, 1229429, 1229450, 1229454, 1229456, 1229556, 1229585, 1229752, 1229769, 1229808, 1229837, 1229891, 1230055, 1230179, 1230220, 1230231, 1230270, 1230289, 1230405, 1230414, 1230429, 1230456, 1230550, 1230558, 1230600, 1230620, 1230715, 1230722, 1230763, 1230773, 1230774, 1230801, 1230827, 1230903, 1230918, 1231016, 1231072, 1231073, 1231083, 1231084, 1231085, 1231087, 1231089, 1231094, 1231096, 1231098, 1231101, 1231105, 1231108, 1231111, 1231114, 1231115, 1231132, 1231135, 1231138, 1231148, 1231169, 1231178, 1231179, 1231180, 1231181, 1231187, 1231191, 1231193, 1231195, 1231197, 1231200, 1231202, 1231203, 1231277, 1231293, 1231327, 1231344, 1231375, 1231383, 1231434, 1231439, 1231441, 1231442, 1231452, 1231465, 1231474, 1231481, 1231496, 1231502, 1231537, 1231539, 1231540, 1231541, 1231578, 1231646, 1231673, 1231849, 1231856, 1231857, 1231858, 1231859, 1231861, 1231864, 1231872, 1231883, 1231885, 1231887, 1231888, 1231889, 1231890, 1231892, 1231893, 1231895, 1231896, 1231897, 1231902, 1231903, 1231904, 1231907, 1231914, 1231916, 1231920, 1231923, 1231929, 1231930, 1231931, 1231935, 1231936, 1231937, 1231938, 1231939, 1231940, 1231941, 1231942, 1231944, 1231947, 1231950, 1231952, 1231953, 1231954, 1231958, 1231959, 1231960, 1231961, 1231962, 1231965, 1231967, 1231968, 1231972, 1231973, 1231976, 1231978, 1231979, 1231987, 1231988, 1231990, 1231991, 1231992, 1231995, 1231996, 1231997, 1231998, 1232001, 1232004, 1232005, 1232006, 1232007, 1232013, 1232015, 1232016, 1232017, 1232025, 1232026, 1232027, 1232028, 1232033, 1232034, 1232035, 1232036, 1232037, 1232038, 1232039, 1232043, 1232047, 1232048, 1232049, 1232050, 1232056, 1232067, 1232069, 1232070, 1232071, 1232075, 1232076, 1232080, 1232083, 1232084, 1232085, 1232089, 1232094, 1232096, 1232097, 1232098, 1232104, 1232105, 1232108, 1232111, 1232114, 1232116, 1232119, 1232120, 1232123, 1232124, 1232126, 1232133, 1232134, 1232135, 1232136, 1232140, 1232141, 1232142, 1232145, 1232147, 1232149, 1232150, 1232151, 1232152, 1232154, 1232155, 1232159, 1232160, 1232162, 1232163, 1232164, 1232165, 1232170, 1232172, 1232174, 1232175, 1232180, 1232185, 1232187, 1232189, 1232191, 1232195, 1232196, 1232198, 1232199, 1232200, 1232201, 1232217, 1232218, 1232220, 1232221, 1232224, 1232229, 1232232, 1232233, 1232237, 1232251, 1232253, 1232254, 1232255, 1232259, 1232260, 1232262, 1232263, 1232264, 1232272, 1232279, 1232282, 1232285, 1232286, 1232287, 1232293, 1232304, 1232305, 1232307, 1232309, 1232310, 1232312, 1232313, 1232314, 1232316, 1232317, 1232318, 1232329, 1232332, 1232333, 1232334, 1232335, 1232337, 1232339, 1232342, 1232345, 1232349, 1232352, 1232354, 1232355, 1232357, 1232358, 1232359, 1232361, 1232362, 1232364, 1232366, 1232367, 1232368, 1232369, 1232370, 1232371, 1232374, 1232378, 1232381, 1232383, 1232385, 1232387, 1232392, 1232394, 1232395, 1232413, 1232416, 1232418, 1232424, 1232432, 1232435, 1232436, 1232442, 1232446, 1232483, 1232500, 1232501, 1232503, 1232504, 1232507, 1232519, 1232520, 1232552, 1232630, 1232631, 1232632, 1232757, 1232819, 1232860, 1232870, 1232873, 1232877, 1232878, 1232881, 1232884, 1232885, 1232887, 1232888, 1232890, 1232892, 1232896, 1232897, 1232905, 1232907, 1232919, 1232926, 1232928, 1232935, 1233035, 1233049, 1233051, 1233056, 1233057, 1233061, 1233063, 1233065, 1233067, 1233070, 1233073, 1233074, 1233100, 1233103, 1233104, 1233105, 1233106, 1233107, 1233108, 1233110, 1233111, 1233113, 1233114, 1233117, 1233123, 1233125, 1233129, 1233130, 1233134, 1233135, 1233150, 1233189, 1233191, 1233197, 1233205, 1233206, 1233209, 1233210, 1233211, 1233212, 1233214, 1233216, 1233238, 1233241, 1233253, 1233255, 1233293, 1233350, 1233452, 1233453, 1233454, 1233456, 1233457, 1233458, 1233460, 1233462, 1233463, 1233468, 1233471, 1233476, 1233478, 1233479, 1233481, 1233484, 1233487, 1233490, 1233491, 1233528, 1233548, 1233552, 1233553, 1233554, 1233555, 1233557, 1233560, 1233561, 1233570, 1233577, 1233580, 1233977, 1234012, 1234025, 1234085, 1234093, 1234098, 1234108 CVE References: CVE-2021-47416, CVE-2021-47534, CVE-2021-47594, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48674, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948, CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955, CVE-2022-48956, CVE-2022-48957, CVE-2022-48958, CVE-2022-48959, CVE-2022-48960, CVE-2022-48961, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48968, CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48979, CVE-2022-48980, CVE-2022-48981, CVE-2022-48982, CVE-2022-48983, CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48989, CVE-2022-48990, CVE-2022-48991, CVE-2022-48992, CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007, CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015, CVE-2022-49016, CVE-2022-49017, CVE-2022-49019, CVE-2022-49020, CVE-2022-49021, CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52915, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-52921, CVE-2023-52922, CVE-2023-6270, CVE-2024-26782, CVE-2024-26906, CVE-2024-26953, CVE-2024-27043, CVE-2024-35888, CVE-2024-35937, CVE-2024-35980, CVE-2024-36244, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36953, CVE-2024-36954, CVE-2024-36957, CVE-2024-38577, CVE-2024-38589, CVE-2024-38615, CVE-2024-39476, CVE-2024-40965, CVE-2024-40997, CVE-2024-41016, CVE-2024-41023, CVE-2024-41049, CVE-2024-42131, CVE-2024-42145, CVE-2024-42226, CVE-2024-42253, CVE-2024-43817, CVE-2024-43897, CVE-2024-44931, CVE-2024-44932, CVE-2024-44947, CVE-2024-44958, CVE-2024-44964, CVE-2024-44995, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46681, CVE-2024-46716, CVE-2024-46719, CVE-2024-46754, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46800, CVE-2024-46802, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46826, CVE-2024-46828, CVE-2024-46834, CVE-2024-46835, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46848, CVE-2024-46849, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46864, CVE-2024-46871, CVE-2024-47660, CVE-2024-47661, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47718, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47742, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49863, CVE-2024-49866, CVE-2024-49867, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49875, CVE-2024-49877, CVE-2024-49879, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49899, CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921, CVE-2024-49922, CVE-2024-49923, CVE-2024-49924, CVE-2024-49925, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49936, CVE-2024-49938, CVE-2024-49939, CVE-2024-49945, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49968, CVE-2024-49969, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49981, CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49989, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50003, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50013, CVE-2024-50014, CVE-2024-50017, CVE-2024-50019, CVE-2024-50024, CVE-2024-50025, CVE-2024-50026, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50041, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50077, CVE-2024-50078, CVE-2024-50081, CVE-2024-50082, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50138, CVE-2024-50141, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50160, CVE-2024-50167, CVE-2024-50171, CVE-2024-50179, CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50215, CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50249, CVE-2024-50255, CVE-2024-50259, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53052, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53104, CVE-2024-53110 Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-2849 Maintenance Incident: [SUSE:Maintenance:36349](https://smelt.suse.de/incident/36349/) Sources used: SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4, kernel-source-5.14.21-150500.55.88.1 Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.88.1, kernel-syms-5.14.21-150500.55.88.1, kernel-obs-build-5.14.21-150500.55.88.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_21-1-150500.11.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c32 --- Comment #32 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4376-1: An update that solves 230 vulnerabilities, contains 10 features and has 33 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1 Category: security (important) Bug References: 1082555, 1194869, 1218644, 1220382, 1221309, 1221333, 1222364, 1222590, 1223202, 1223656, 1223848, 1223919, 1223942, 1224518, 1224526, 1224574, 1225725, 1225730, 1225742, 1225764, 1225812, 1226560, 1226592, 1226631, 1226748, 1226872, 1227853, 1228410, 1228430, 1228486, 1228650, 1228857, 1229312, 1229429, 1229585, 1229752, 1229808, 1230055, 1230220, 1230231, 1230270, 1230558, 1230827, 1230918, 1231083, 1231089, 1231098, 1231101, 1231108, 1231111, 1231132, 1231135, 1231138, 1231169, 1231178, 1231180, 1231181, 1231187, 1231202, 1231434, 1231441, 1231452, 1231465, 1231474, 1231481, 1231537, 1231541, 1231646, 1231849, 1231856, 1231858, 1231859, 1231864, 1231904, 1231916, 1231920, 1231923, 1231930, 1231931, 1231947, 1231952, 1231953, 1231959, 1231978, 1232013, 1232015, 1232016, 1232017, 1232027, 1232028, 1232047, 1232048, 1232050, 1232056, 1232076, 1232080, 1232094, 1232096, 1232098, 1232111, 1232126, 1232134, 1232135, 1232141, 1232142, 1232147, 1232152, 1232159, 1232162, 1232165, 1232180, 1232185, 1232187, 1232189, 1232195, 1232198, 1232201, 1232218, 1232224, 1232232, 1232254, 1232255, 1232264, 1232272, 1232279, 1232287, 1232293, 1232312, 1232317, 1232318, 1232333, 1232334, 1232335, 1232339, 1232349, 1232357, 1232359, 1232362, 1232364, 1232370, 1232371, 1232378, 1232385, 1232387, 1232394, 1232413, 1232416, 1232436, 1232483, 1232500, 1232503, 1232504, 1232507, 1232520, 1232552, 1232757, 1232819, 1232860, 1232870, 1232873, 1232877, 1232878, 1232881, 1232884, 1232885, 1232887, 1232888, 1232890, 1232892, 1232896, 1232897, 1232905, 1232907, 1232919, 1232926, 1232928, 1232935, 1233035, 1233049, 1233051, 1233056, 1233057, 1233061, 1233063, 1233065, 1233067, 1233070, 1233073, 1233074, 1233100, 1233103, 1233104, 1233105, 1233106, 1233107, 1233108, 1233110, 1233111, 1233113, 1233114, 1233117, 1233123, 1233125, 1233129, 1233130, 1233134, 1233135, 1233150, 1233189, 1233191, 1233197, 1233205, 1233206, 1233209, 1233210, 1233211, 1233212, 1233214, 1233216, 1233238, 1233241, 1233253, 1233255, 1233293, 1233350, 1233452, 1233453, 1233454, 1233456, 1233457, 1233458, 1233460, 1233462, 1233463, 1233468, 1233471, 1233476, 1233478, 1233479, 1233481, 1233484, 1233487, 1233490, 1233491, 1233528, 1233548, 1233552, 1233553, 1233554, 1233555, 1233557, 1233560, 1233561, 1233570, 1233577, 1233580, 1233977, 1234012, 1234025, 1234085, 1234093, 1234098, 1234108 CVE References: CVE-2021-47594, CVE-2022-48674, CVE-2022-48979, CVE-2022-48982, CVE-2022-48983, CVE-2022-48989, CVE-2022-48990, CVE-2023-52915, CVE-2023-52917, CVE-2023-52918, CVE-2023-52921, CVE-2023-52922, CVE-2024-26782, CVE-2024-26906, CVE-2024-26953, CVE-2024-35888, CVE-2024-35937, CVE-2024-35980, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36953, CVE-2024-36954, CVE-2024-38577, CVE-2024-38589, CVE-2024-38615, CVE-2024-40997, CVE-2024-41016, CVE-2024-41023, CVE-2024-41049, CVE-2024-42131, CVE-2024-43817, CVE-2024-43897, CVE-2024-44932, CVE-2024-44964, CVE-2024-44995, CVE-2024-46681, CVE-2024-46800, CVE-2024-46802, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46810, CVE-2024-46812, CVE-2024-46819, CVE-2024-46821, CVE-2024-46835, CVE-2024-46842, CVE-2024-46853, CVE-2024-46859, CVE-2024-46864, CVE-2024-46871, CVE-2024-47663, CVE-2024-47665, CVE-2024-47667, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47679, CVE-2024-47682, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47709, CVE-2024-47712, CVE-2024-47713, CVE-2024-47718, CVE-2024-47723, CVE-2024-47728, CVE-2024-47735, CVE-2024-47737, CVE-2024-47742, CVE-2024-47745, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49855, CVE-2024-49861, CVE-2024-49863, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49875, CVE-2024-49877, CVE-2024-49879, CVE-2024-49884, CVE-2024-49891, CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49907, CVE-2024-49908, CVE-2024-49921, CVE-2024-49924, CVE-2024-49925, CVE-2024-49934, CVE-2024-49935, CVE-2024-49938, CVE-2024-49945, CVE-2024-49947, CVE-2024-49950, CVE-2024-49957, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49968, CVE-2024-49981, CVE-2024-49983, CVE-2024-49985, CVE-2024-49989, CVE-2024-50003, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50013, CVE-2024-50017, CVE-2024-50025, CVE-2024-50026, CVE-2024-50031, CVE-2024-50044, CVE-2024-50062, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50077, CVE-2024-50078, CVE-2024-50082, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50138, CVE-2024-50141, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50160, CVE-2024-50167, CVE-2024-50171, CVE-2024-50179, CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50215, CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50249, CVE-2024-50255, CVE-2024-50259, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53052, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53104, CVE-2024-53110 Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-2849, SES-1880 Maintenance Incident: [SUSE:Maintenance:36744](https://smelt.suse.de/incident/36744/) Sources used: openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.75.1, kernel-source-azure-5.14.21-150500.33.75.1 Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.75.1, kernel-source-azure-5.14.21-150500.33.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1233134 https://bugzilla.suse.com/show_bug.cgi?id=1233134#c33 --- Comment #33 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4376-1: An update that solves 230 vulnerabilities, contains 10 features and has 33 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1 Category: security (important) Bug References: 1082555, 1194869, 1218644, 1220382, 1221309, 1221333, 1222364, 1222590, 1223202, 1223656, 1223848, 1223919, 1223942, 1224518, 1224526, 1224574, 1225725, 1225730, 1225742, 1225764, 1225812, 1226560, 1226592, 1226631, 1226748, 1226872, 1227853, 1228410, 1228430, 1228486, 1228650, 1228857, 1229312, 1229429, 1229585, 1229752, 1229808, 1230055, 1230220, 1230231, 1230270, 1230558, 1230827, 1230918, 1231083, 1231089, 1231098, 1231101, 1231108, 1231111, 1231132, 1231135, 1231138, 1231169, 1231178, 1231180, 1231181, 1231187, 1231202, 1231434, 1231441, 1231452, 1231465, 1231474, 1231481, 1231537, 1231541, 1231646, 1231849, 1231856, 1231858, 1231859, 1231864, 1231904, 1231916, 1231920, 1231923, 1231930, 1231931, 1231947, 1231952, 1231953, 1231959, 1231978, 1232013, 1232015, 1232016, 1232017, 1232027, 1232028, 1232047, 1232048, 1232050, 1232056, 1232076, 1232080, 1232094, 1232096, 1232098, 1232111, 1232126, 1232134, 1232135, 1232141, 1232142, 1232147, 1232152, 1232159, 1232162, 1232165, 1232180, 1232185, 1232187, 1232189, 1232195, 1232198, 1232201, 1232218, 1232224, 1232232, 1232254, 1232255, 1232264, 1232272, 1232279, 1232287, 1232293, 1232312, 1232317, 1232318, 1232333, 1232334, 1232335, 1232339, 1232349, 1232357, 1232359, 1232362, 1232364, 1232370, 1232371, 1232378, 1232385, 1232387, 1232394, 1232413, 1232416, 1232436, 1232483, 1232500, 1232503, 1232504, 1232507, 1232520, 1232552, 1232757, 1232819, 1232860, 1232870, 1232873, 1232877, 1232878, 1232881, 1232884, 1232885, 1232887, 1232888, 1232890, 1232892, 1232896, 1232897, 1232905, 1232907, 1232919, 1232926, 1232928, 1232935, 1233035, 1233049, 1233051, 1233056, 1233057, 1233061, 1233063, 1233065, 1233067, 1233070, 1233073, 1233074, 1233100, 1233103, 1233104, 1233105, 1233106, 1233107, 1233108, 1233110, 1233111, 1233113, 1233114, 1233117, 1233123, 1233125, 1233129, 1233130, 1233134, 1233135, 1233150, 1233189, 1233191, 1233197, 1233205, 1233206, 1233209, 1233210, 1233211, 1233212, 1233214, 1233216, 1233238, 1233241, 1233253, 1233255, 1233293, 1233350, 1233452, 1233453, 1233454, 1233456, 1233457, 1233458, 1233460, 1233462, 1233463, 1233468, 1233471, 1233476, 1233478, 1233479, 1233481, 1233484, 1233487, 1233490, 1233491, 1233528, 1233548, 1233552, 1233553, 1233554, 1233555, 1233557, 1233560, 1233561, 1233570, 1233577, 1233580, 1233977, 1234012, 1234025, 1234085, 1234093, 1234098, 1234108 CVE References: CVE-2021-47594, CVE-2022-48674, CVE-2022-48979, CVE-2022-48982, CVE-2022-48983, CVE-2022-48989, CVE-2022-48990, CVE-2023-52915, CVE-2023-52917, CVE-2023-52918, CVE-2023-52921, CVE-2023-52922, CVE-2024-26782, CVE-2024-26906, CVE-2024-26953, CVE-2024-35888, CVE-2024-35937, CVE-2024-35980, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36953, CVE-2024-36954, CVE-2024-38577, CVE-2024-38589, CVE-2024-38615, CVE-2024-40997, CVE-2024-41016, CVE-2024-41023, CVE-2024-41049, CVE-2024-42131, CVE-2024-43817, CVE-2024-43897, CVE-2024-44932, CVE-2024-44964, CVE-2024-44995, CVE-2024-46681, CVE-2024-46800, CVE-2024-46802, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46810, CVE-2024-46812, CVE-2024-46819, CVE-2024-46821, CVE-2024-46835, CVE-2024-46842, CVE-2024-46853, CVE-2024-46859, CVE-2024-46864, CVE-2024-46871, CVE-2024-47663, CVE-2024-47665, CVE-2024-47667, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47679, CVE-2024-47682, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47709, CVE-2024-47712, CVE-2024-47713, CVE-2024-47718, CVE-2024-47723, CVE-2024-47728, CVE-2024-47735, CVE-2024-47737, CVE-2024-47742, CVE-2024-47745, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49855, CVE-2024-49861, CVE-2024-49863, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49875, CVE-2024-49877, CVE-2024-49879, CVE-2024-49884, CVE-2024-49891, CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49907, CVE-2024-49908, CVE-2024-49921, CVE-2024-49924, CVE-2024-49925, CVE-2024-49934, CVE-2024-49935, CVE-2024-49938, CVE-2024-49945, CVE-2024-49947, CVE-2024-49950, CVE-2024-49957, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49968, CVE-2024-49981, CVE-2024-49983, CVE-2024-49985, CVE-2024-49989, CVE-2024-50003, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50013, CVE-2024-50017, CVE-2024-50025, CVE-2024-50026, CVE-2024-50031, CVE-2024-50044, CVE-2024-50062, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50077, CVE-2024-50078, CVE-2024-50082, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50138, CVE-2024-50141, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50160, CVE-2024-50167, CVE-2024-50171, CVE-2024-50179, CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50215, CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50249, CVE-2024-50255, CVE-2024-50259, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53052, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53104, CVE-2024-53110 Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-2849, SES-1880 Maintenance Incident: [SUSE:Maintenance:36744](https://smelt.suse.de/incident/36744/) Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.75.1, kernel-syms-azure-5.14.21-150500.33.75.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.75.1, kernel-syms-azure-5.14.21-150500.33.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com