[Bug 1229450] New: libbpf: failed to find '.BTF' ELF section in vmlinux
https://bugzilla.suse.com/show_bug.cgi?id=1229450 Bug ID: 1229450 Summary: libbpf: failed to find '.BTF' ELF section in vmlinux Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: jslaby@suse.com QA Contact: qa-bugs@suse.de Target Milestone: --- Found By: --- Blocker: --- Created attachment 876820 --> https://bugzilla.suse.com/attachment.cgi?id=876820&action=edit Devel:Kernel:master/kernel-source:kernel-vanilla/LEGACYX86/i586 build log The kernel builds result in random build failures while creating BTF. For example https://build.opensuse.org/package/live_build_log/Kernel:vanilla/kernel-sour...:
libbpf: failed to find '.BTF' ELF section in vmlinux FAILED: load BTF from vmlinux: No data available make[2]: *** [../scripts/Makefile.vmlinux:34: vmlinux] Error 255 make[2]: *** Deleting file 'vmlinux' make[1]: *** [/home/abuild/rpmbuild/BUILD/kernel-vanilla-6.11~rc3.338.gc3f2d783a459/linux-6.11-rc3-338-gc3f2d783a459/Makefile:1158: vmlinux] Error 2 make: *** [../Makefile:224: __sub-make] Error 2 error: Bad exit status from /var/tmp/rpm-tmp.olf5Nu (%build)
arm seems to fail reliably. But for example in ibs://Devel:Kernel:master/kernel-source:kernel-vanilla/LEGACYX86/i586, it looks like it is sort of random. kernel-debug and kernel-vanilla fails for i586, but -default and -pae are built currently. See the job history for kernel-vanilla in there (the failed boot log is attached):
time package reason code build time worker 2024-07-15 07:41:48 kernel-source:kernel-vanilla source change succeeded 47m 53s h01-ch5a:3 2024-07-15 23:56:48 kernel-source:kernel-vanilla source change succeeded 47m 57s h01-ch5b:5 2024-07-18 11:12:40 kernel-source:kernel-vanilla source change succeeded 48m 46s h01-ch5b:2 2024-07-26 20:01:29 kernel-source:kernel-vanilla source change succeeded 52m 40s h01-ch4b:2 2024-07-29 09:07:35 kernel-source:kernel-vanilla source change succeeded 52m 53s h01-ch4a:6 2024-08-03 11:38:55 kernel-source:kernel-vanilla source change failed 25m 16s h01-ch4b:8 2024-08-04 23:48:15 kernel-source:kernel-vanilla source change failed 25m 14s h01-ch4b:7 2024-08-06 16:37:35 kernel-source:kernel-vanilla source change succeeded 53m 25s h01-ch4b:4 2024-08-09 19:44:44 kernel-source:kernel-vanilla source change failed 26m 4s h01-ch5a:2 2024-08-11 22:48:56 kernel-source:kernel-vanilla source change failed 0m 38s h01-ch4b:6 2024-08-12 16:44:52 kernel-source:kernel-vanilla source change succeeded 54m 0s h01-ch5b:5 2024-08-15 21:49:11 kernel-source:kernel-vanilla source change failed 25m 25s h01-ch4b:1 2024-08-19 01:53:01 kernel-source:kernel-vanilla source change succeeded 50m 9s h01-ch4a:5 2024-08-19 11:33:50 kernel-source:kernel-vanilla source change succeeded 55m 9s h01-ch5b:1 2024-08-19 17:23:59 kernel-source:kernel-vanilla source change failed 25m 16s h01-ch5a:3 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|kernel-bugs@opensuse.org |shung-hsi.yu@suse.com CC| |mkoutny@suse.com, | |msuchanek@suse.com, | |tonyj@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c1 --- Comment #1 from Jiri Slaby <jslaby@suse.com> --- The most important part from the log:
btf_encoder__tag_kfuncs: Failed to get ELF section(62) data: out of memory. btf_encoder__encode: failed to tag kfuncs!
It's clear why this is random... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c2 --- Comment #2 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #1)
The most important part from the log:
btf_encoder__tag_kfuncs: Failed to get ELF section(62) data: out of memory.
BTW the machine is run with -m 40960. But given it happens either on full 32bit (armv7l builds) or 64bit kernel + 32bit userspace (i586), the encoder likely needs slightly more than 3G of space... It might be reproducible locally with ulimit -m $((3<<20)). Or with a cgroup (mkoutny might provide the right sequence of echos to cgroup fs). -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 Michal Kubeček <mkubecek@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mkubecek@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c3 --- Comment #3 from Jiri Slaby <jslaby@suse.com> --- Created attachment 876821 --> https://bugzilla.suse.com/attachment.cgi?id=876821&action=edit mappings of the crashed process The VM appears to be completely full on 32bit. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c4 --- Comment #4 from Jiri Slaby <jslaby@suse.com> --- Created attachment 876822 --> https://bugzilla.suse.com/attachment.cgi?id=876822&action=edit strace of mmaps pahole simply runs out of virtual memory. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c5 --- Comment #5 from Michal Suchanek <msuchanek@suse.com> --- Then disable BTF on 32bit and be done with it. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c6 --- Comment #6 from Jiri Slaby <jslaby@suse.com> --- (In reply to Michal Suchanek from comment #5)
Then disable BTF on 32bit and be done with it.
Perhaps. Leaving up to BTF guys. FWIW, steps to reproduce locally: docker pull jirislaby/pahole_crash docker run -it jirislaby/pahole_crash It will run pahole in gdb. You can quit it, then there is vmlinux called "my" and my.cmd script to invoke pahole (under gdb). -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c7 --- Comment #7 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #6)
(In reply to Michal Suchanek from comment #5)
Then disable BTF on 32bit and be done with it.
Perhaps. Leaving up to BTF guys.
FWIW, steps to reproduce locally: docker pull jirislaby/pahole_crash docker run -it jirislaby/pahole_crash
Ah, it's not reproducible on my machine with 16 CPU cores. On a machine with 160 cores, it is. So it likely depends on the number of cores. pahole creates a lot of threads, I see. So maybe limit the number of threads/cores to use by pahole? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c8 --- Comment #8 from Michal Suchanek <msuchanek@suse.com> --- -j, --jobs=N Run N jobs in parallel. Defaults to number of online processors + 10% (like the 'ninja' build system) if no argument is specified. So with 160 CPUs you would get 176 threads. There is scripts/pahole-flags.sh in the kernel tree which determines the flags to pass to pahole, I think it's reasonable to patch that. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c9 --- Comment #9 from Jiri Slaby <jslaby@suse.com> --- FWIW: -j, --jobs[=NR_JOBS] run N jobs in parallel [default to number of online processors + 10%] But how many? The build logs show -smp 12 for i586 and 4 for arm and they still fail. 12 gives 13, 4 gives 4, 160 gives 176. If I use -j32 on my machine, it indeed fails. So I updated the docker image accordingly. Maybe we should just use -j1 (or no -j at all) on 32bit as with pahole < 122. See scripts/Makefile.btf: pahole-flags-$(call test-ge, $(pahole-ver), 122) += -j (Or disable btf on 32bit completely.) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c10 --- Comment #10 from Jiri Slaby <jslaby@suse.com> --- (In reply to Michal Suchanek from comment #8)
There is scripts/pahole-flags.sh in the kernel tree which determines the flags to pass to pahole, I think it's reasonable to patch that.
Maybe, only it is now in scripts/Makefile.btf since: commit 72d091846de935e0942a8a0f1fe24ff739d85d76 Author: Masahiro Yamada <masahiroy@kernel.org> Date: Thu Oct 19 00:19:48 2023 +0900 kbuild: avoid too many execution of scripts/pahole-flags.sh (6.7) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c11 --- Comment #11 from Michal Suchanek <msuchanek@suse.com> --- I am not sure how to detect running on 32bit, especially in the case that it's 32bit userspace on 64bit kernel. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c12 --- Comment #12 from Jiri Slaby <jslaby@suse.com> --- --- a/scripts/Makefile.btf +++ b/scripts/Makefile.btf @@ -12,7 +12,9 @@ endif pahole-flags-$(call test-ge, $(pahole-ver), 121) += --btf_gen_floats +ifeq ($(CONFIG_64BIT),y) pahole-flags-$(call test-ge, $(pahole-ver), 122) += -j +endif pahole-flags-$(call test-ge, $(pahole-ver), 125) += --skip_encoding_btf_inconsistent_proto --btf_gen_optimized will likely work. But we should likely detect architecture of pahole, not the target kernel. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c13 --- Comment #13 from Jiri Slaby <jslaby@suse.com> --- (In reply to Michal Suchanek from comment #11)
I am not sure how to detect running on 32bit, especially in the case that it's 32bit userspace on 64bit kernel.
Some kind of checking of ELF64 eq: readelf -h /usr/bin/pahole | sed -n 's/.*Class: *// p' -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c14 --- Comment #14 from Jiri Slaby <jslaby@suse.com> --- Created attachment 876826 --> https://bugzilla.suse.com/attachment.cgi?id=876826&action=edit potential fix (In reply to Jiri Slaby from comment #13)
Some kind of checking of ELF64 eq: readelf -h /usr/bin/pahole | sed -n 's/.*Class: *// p'
So something like this? Let me bring this upstream. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c15 --- Comment #15 from Shung-Hsi Yu <shung-hsi.yu@suse.com> --- Hmm I didn't know pahole use so much memory per thread (not that I'm familiar with it, yet). Please CC me in the upstream mail as well if possible. Thanks! -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c16 --- Comment #16 from Michal Suchanek <msuchanek@suse.com> --- (In reply to Jiri Slaby from comment #14)
Created attachment 876826 [details] potential fix
(In reply to Jiri Slaby from comment #13)
Some kind of checking of ELF64 eq: readelf -h /usr/bin/pahole | sed -n 's/.*Class: *// p'
So something like this? Let me bring this upstream.
readelf is provided by GNU binutils. What about LLVM builds? Also pahole is specified by PAHOLE variable, and it may include arguments because shell and stuff. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c17 --- Comment #17 from Shung-Hsi Yu <shung-hsi.yu@suse.com> --- (In reply to Michal Suchanek from comment #16) [...]
readelf is provided by GNU binutils. What about LLVM builds?
Also pahole is specified by PAHOLE variable, and it may include arguments because shell and stuff.
Would it be better to have pahole to cap the thread count depending on virtual memory available irregardless to architecture? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c18 --- Comment #18 from Jiri Slaby <jslaby@suse.com> --- (In reply to Michal Suchanek from comment #16)
readelf is provided by GNU binutils. What about LLVM builds?
Also pahole is specified by PAHOLE variable, and it may include arguments because shell and stuff.
Yes, it's broken in many ways. Sent to upstream for discussion as an RFC: https://lore.kernel.org/all/20240820085950.200358-1-jirislaby@kernel.org/ (In reply to Shung-Hsi Yu from comment #17)
Would it be better to have pahole to cap the thread count depending on virtual memory available irregardless to architecture?
Maybe set it to 1 when sizeof(long) == 4? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 Sangeetha Thackarajan <sangeetha.thackarajan@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sangeetha.thackarajan@suse. | |com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c19 --- Comment #19 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #14)
Created attachment 876826 [details] potential fix
FWIW that seems to work (in our workflow only) -- just to confirm -j1 does the right thing: https://build.suse.de/project/monitor/home:jirislaby:pahole -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c20 --- Comment #20 from Jiri Slaby <jslaby@suse.com> --- Created attachment 876861 --> https://bugzilla.suse.com/attachment.cgi?id=876861&action=edit valgrind --tool=massif output Run on 64bit: pahole -j32 -> 4.102 GB pahole -j16 -> 3.895 GB pahole -j1 -> 3.706 GB On 32bit: pahole -j32 -> 2.870 GB (crash) pahole -j16 -> 2.810 GB pahole -j1 -> 2.444 GB The first one reached the limit. The other two are not really much better... The top eater:
99.74% (3,966,953,649B) (heap allocation functions) malloc/new/new[], --alloc-fns, etc. ->87.57% (3,482,844,356B) 0x49B7EB4: _obstack_newchunk (obstack.c:261) | ->83.08% (3,304,324,608B) 0x488BF53: UnknownInlinedFun (dwarves.c:40) | | ->83.08% (3,304,324,608B) 0x488BF53: cu__zalloc (dwarves.c:50) | | ->24.01% (954,816,480B) 0x489B4AB: UnknownInlinedFun (dwarf_loader.c:462) | | | ->24.01% (954,816,480B) 0x489B4AB: UnknownInlinedFun (dwarf_loader.c:477) | | | ->24.01% (954,816,480B) 0x489B4AB: UnknownInlinedFun (dwarf_loader.c:959) | | | ->24.01% (954,816,480B) 0x489B4AB: die__process_class (dwarf_loader.c:1815) | | | ->22.53% (896,148,576B) 0x489A129: UnknownInlinedFun (dwarf_loader.c:1492) | | | | ->22.53% (896,148,576B) 0x489A129: __die__process_tag (dwarf_loader.c:2203) | | | | ->22.53% (896,079,488B) 0x489C250: die__process_unit (dwarf_loader.c:2243) | | | | | ->22.53% (896,079,488B) 0x489C364: die__process (dwarf_loader.c:2858) | | | | | ->22.53% (896,079,488B) 0x489CE5C: UnknownInlinedFun (dwarf_loader.c:2873) | | | | | ->22.53% (896,079,488B) 0x489CE5C: UnknownInlinedFun (dwarf_loader.c:3243) | | | | | ->22.53% (896,079,488B) 0x489CE5C: UnknownInlinedFun (dwarf_loader.c:3259) | | | | | ->22.53% (896,079,488B) 0x489CE5C: UnknownInlinedFun (dwarf_loader.c:3388) | | | | | ->22.53% (896,079,488B) 0x489CE5C: UnknownInlinedFun (dwarf_loader.c:3402) | | | | | ->22.53% (896,079,488B) 0x489CE5C: UnknownInlinedFun (dwarf_loader.c:3537) | | | | | ->22.53% (896,079,488B) 0x489CE5C: cus__process_dwflmod (dwarf_loader.c:3581) | | | | | ->22.53% (896,079,488B) 0x4B66130: dwfl_getmodules (in /usr/lib64/libdw-0.191.so) | | | | | ->22.53% (896,079,488B) 0x489D73F: UnknownInlinedFun (dwarf_loader.c:3647) | | | | | ->22.53% (896,079,488B) 0x489D73F: dwarf__load_file.lto_priv.0 (dwarf_loader.c:3684) | | | | | ->22.53% (896,079,488B) 0x488928E: cus__load_file (dwarves.c:2134) | | | | | ->22.53% (896,079,488B) 0x488DD67: cus__load_files (dwarves.c:2637) | | | | | ->22.53% (896,079,488B) 0x10CB07: main (pahole.c:3805) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c21 --- Comment #21 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #20)
| | | ->24.01% (954,816,480B) 0x489B4AB: UnknownInlinedFun (dwarf_loader.c:959)
So given this struct class_member is the largest consumer, running pahole on pahole. The below results in 4.102 GB -> 3.585 GB savings. --- a/dwarves.h +++ b/dwarves.h @@ -487,14 +487,14 @@ int cu__for_all_tags(struct cu *cu, */ struct tag { struct list_head node; + const char *attribute; + void *priv; type_id_t type; uint16_t tag; + uint16_t recursivity_level; bool visited; bool top_level; bool has_btf_type_tag; - uint16_t recursivity_level; - const char *attribute; - void *priv; }; // To use with things like type->type_enum == perf_event_type+perf_user_event_type @@ -1086,17 +1086,17 @@ static inline int function__inlined(const struct function *func) struct class_member { struct tag tag; const char *name; + uint64_t const_value; uint32_t bit_offset; uint32_t bit_size; uint32_t byte_offset; int hole; size_t byte_size; + uint32_t alignment; int8_t bitfield_offset; uint8_t bitfield_size; uint8_t bit_hole; uint8_t bitfield_end:1; - uint64_t const_value; - uint32_t alignment; uint8_t visited:1; uint8_t is_static:1; uint8_t has_bit_offset:1; -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c22 --- Comment #22 from Jiri Slaby <jslaby@suse.com> --- (In reply to Michal Suchanek from comment #5)
Then disable BTF on 32bit and be done with it.
This bug doesn't look optimistic wrt to a proper fix in the near future. So let's really disable BTF on 32bit archs (armv6hl, armv7hl, i386) for now: commit c02f88f4934e94c23c37449407ef90166dbdcdec (HEAD -> master, origin/users/jslaby/master/for-next) Author: Jiri Slaby <jslaby@suse.cz> Date: Fri Aug 30 08:51:34 2024 +0200 Update config files. Disable BTF on 32bit architectures (bsc#1229450) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c23 --- Comment #23 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #21)
(In reply to Jiri Slaby from comment #20)
| | | ->24.01% (954,816,480B) 0x489B4AB: UnknownInlinedFun (dwarf_loader.c:959)
So given this struct class_member is the largest consumer, running pahole on pahole. The below results in 4.102 GB -> 3.585 GB savings.
FTR, the upstream is going to release a new pahole (dwarves 1.28) with many structures and allocations compaction. This however does not help in -j$CPUS case on 32bit. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c41 --- Comment #41 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3986-1: An update that solves 268 vulnerabilities, contains three features and has 60 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243986-1 Category: security (important) Bug References: 1065729, 1194869, 1217845, 1218562, 1219596, 1219803, 1220382, 1223384, 1223700, 1223824, 1223848, 1224088, 1224574, 1225611, 1226003, 1226498, 1226623, 1226631, 1226797, 1226848, 1228119, 1228244, 1228269, 1228410, 1228454, 1228537, 1228620, 1228743, 1228747, 1228857, 1229019, 1229429, 1229450, 1229585, 1229677, 1229769, 1229808, 1229891, 1230055, 1230132, 1230179, 1230220, 1230289, 1230295, 1230339, 1230341, 1230375, 1230414, 1230429, 1230456, 1230501, 1230527, 1230550, 1230600, 1230620, 1230710, 1230762, 1230763, 1230773, 1230774, 1230801, 1230831, 1230914, 1230918, 1231016, 1231035, 1231072, 1231073, 1231075, 1231081, 1231082, 1231083, 1231084, 1231085, 1231087, 1231089, 1231092, 1231093, 1231094, 1231096, 1231098, 1231100, 1231101, 1231102, 1231105, 1231108, 1231111, 1231114, 1231115, 1231116, 1231117, 1231131, 1231132, 1231135, 1231136, 1231138, 1231148, 1231169, 1231170, 1231171, 1231178, 1231179, 1231183, 1231187, 1231191, 1231193, 1231195, 1231197, 1231200, 1231202, 1231203, 1231276, 1231293, 1231384, 1231434, 1231435, 1231436, 1231439, 1231440, 1231441, 1231442, 1231452, 1231474, 1231481, 1231496, 1231502, 1231537, 1231539, 1231540, 1231541, 1231617, 1231634, 1231635, 1231636, 1231637, 1231638, 1231639, 1231640, 1231673, 1231828, 1231849, 1231855, 1231856, 1231857, 1231858, 1231859, 1231860, 1231861, 1231864, 1231865, 1231868, 1231869, 1231871, 1231872, 1231901, 1231902, 1231903, 1231904, 1231906, 1231907, 1231908, 1231914, 1231916, 1231924, 1231926, 1231931, 1231935, 1231942, 1231944, 1231947, 1231950, 1231951, 1231953, 1231954, 1231955, 1231956, 1231957, 1231965, 1231967, 1231968, 1231987, 1231988, 1231989, 1231990, 1231998, 1232000, 1232003, 1232009, 1232013, 1232015, 1232016, 1232017, 1232018, 1232033, 1232034, 1232036, 1232043, 1232047, 1232048, 1232049, 1232050, 1232056, 1232075, 1232076, 1232080, 1232083, 1232084, 1232085, 1232089, 1232090, 1232093, 1232094, 1232097, 1232098, 1232105, 1232109, 1232111, 1232114, 1232116, 1232117, 1232124, 1232126, 1232127, 1232129, 1232130, 1232131, 1232132, 1232134, 1232135, 1232140, 1232141, 1232142, 1232145, 1232147, 1232148, 1232151, 1232152, 1232154, 1232155, 1232156, 1232159, 1232160, 1232162, 1232164, 1232174, 1232180, 1232182, 1232183, 1232185, 1232187, 1232189, 1232192, 1232195, 1232196, 1232200, 1232208, 1232217, 1232218, 1232220, 1232221, 1232222, 1232232, 1232250, 1232251, 1232253, 1232254, 1232255, 1232256, 1232260, 1232262, 1232263, 1232275, 1232279, 1232282, 1232285, 1232287, 1232295, 1232309, 1232310, 1232312, 1232313, 1232314, 1232315, 1232316, 1232317, 1232329, 1232332, 1232333, 1232334, 1232335, 1232339, 1232340, 1232342, 1232345, 1232349, 1232359, 1232362, 1232369, 1232370, 1232378, 1232381, 1232383, 1232392, 1232394, 1232395, 1232417, 1232418, 1232424, 1232427, 1232432, 1232435, 1232503, 1232504, 1232505, 1232506, 1232507, 1232511, 1232519, 1232520, 1232529, 1232552, 1232623, 1232626, 1232627, 1232628, 1232629, 1232757, 1232768 CVE References: CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-6270, CVE-2024-26758, CVE-2024-26761, CVE-2024-26767, CVE-2024-26943, CVE-2024-27026, CVE-2024-27043, CVE-2024-35980, CVE-2024-36244, CVE-2024-38576, CVE-2024-38577, CVE-2024-38599, CVE-2024-41016, CVE-2024-41031, CVE-2024-41047, CVE-2024-41082, CVE-2024-42145, CVE-2024-44932, CVE-2024-44958, CVE-2024-44964, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46721, CVE-2024-46754, CVE-2024-46766, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46797, CVE-2024-46802, CVE-2024-46803, CVE-2024-46804, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46825, CVE-2024-46826, CVE-2024-46827, CVE-2024-46828, CVE-2024-46830, CVE-2024-46831, CVE-2024-46834, CVE-2024-46835, CVE-2024-46836, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46843, CVE-2024-46846, CVE-2024-46848, CVE-2024-46849, CVE-2024-46851, CVE-2024-46852, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46864, CVE-2024-46870, CVE-2024-46871, CVE-2024-47658, CVE-2024-47660, CVE-2024-47661, CVE-2024-47662, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47681, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687, CVE-2024-47688, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47702, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47741, CVE-2024-47742, CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751, CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49853, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49863, CVE-2024-49864, CVE-2024-49867, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874, CVE-2024-49875, CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49882, CVE-2024-49886, CVE-2024-49888, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49896, CVE-2024-49898, CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49931, CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49969, CVE-2024-49972, CVE-2024-49973, CVE-2024-49974, CVE-2024-49981, CVE-2024-49982, CVE-2024-49985, CVE-2024-49986, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50007, CVE-2024-50008, CVE-2024-50013, CVE-2024-50017, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50025, CVE-2024-50027, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50060, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50064, CVE-2024-50069, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078 Jira References: PED-10559, PED-10978, PED-9901 Maintenance Incident: [SUSE:Maintenance:36389](https://smelt.suse.de/incident/36389/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-rt-6.4.0-150600.10.17.1, kernel-source-rt-6.4.0-150600.10.17.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6-RT_Update_5-1-150600.1.3.1 SUSE Real Time Module 15-SP6 (src): kernel-syms-rt-6.4.0-150600.10.17.1, kernel-source-rt-6.4.0-150600.10.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c42 --- Comment #42 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3986-1: An update that solves 268 vulnerabilities, contains three features and has 60 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243986-1 Category: security (important) Bug References: 1065729, 1194869, 1217845, 1218562, 1219596, 1219803, 1220382, 1223384, 1223700, 1223824, 1223848, 1224088, 1224574, 1225611, 1226003, 1226498, 1226623, 1226631, 1226797, 1226848, 1228119, 1228244, 1228269, 1228410, 1228454, 1228537, 1228620, 1228743, 1228747, 1228857, 1229019, 1229429, 1229450, 1229585, 1229677, 1229769, 1229808, 1229891, 1230055, 1230132, 1230179, 1230220, 1230289, 1230295, 1230339, 1230341, 1230375, 1230414, 1230429, 1230456, 1230501, 1230527, 1230550, 1230600, 1230620, 1230710, 1230762, 1230763, 1230773, 1230774, 1230801, 1230831, 1230914, 1230918, 1231016, 1231035, 1231072, 1231073, 1231075, 1231081, 1231082, 1231083, 1231084, 1231085, 1231087, 1231089, 1231092, 1231093, 1231094, 1231096, 1231098, 1231100, 1231101, 1231102, 1231105, 1231108, 1231111, 1231114, 1231115, 1231116, 1231117, 1231131, 1231132, 1231135, 1231136, 1231138, 1231148, 1231169, 1231170, 1231171, 1231178, 1231179, 1231183, 1231187, 1231191, 1231193, 1231195, 1231197, 1231200, 1231202, 1231203, 1231276, 1231293, 1231384, 1231434, 1231435, 1231436, 1231439, 1231440, 1231441, 1231442, 1231452, 1231474, 1231481, 1231496, 1231502, 1231537, 1231539, 1231540, 1231541, 1231617, 1231634, 1231635, 1231636, 1231637, 1231638, 1231639, 1231640, 1231673, 1231828, 1231849, 1231855, 1231856, 1231857, 1231858, 1231859, 1231860, 1231861, 1231864, 1231865, 1231868, 1231869, 1231871, 1231872, 1231901, 1231902, 1231903, 1231904, 1231906, 1231907, 1231908, 1231914, 1231916, 1231924, 1231926, 1231931, 1231935, 1231942, 1231944, 1231947, 1231950, 1231951, 1231953, 1231954, 1231955, 1231956, 1231957, 1231965, 1231967, 1231968, 1231987, 1231988, 1231989, 1231990, 1231998, 1232000, 1232003, 1232009, 1232013, 1232015, 1232016, 1232017, 1232018, 1232033, 1232034, 1232036, 1232043, 1232047, 1232048, 1232049, 1232050, 1232056, 1232075, 1232076, 1232080, 1232083, 1232084, 1232085, 1232089, 1232090, 1232093, 1232094, 1232097, 1232098, 1232105, 1232109, 1232111, 1232114, 1232116, 1232117, 1232124, 1232126, 1232127, 1232129, 1232130, 1232131, 1232132, 1232134, 1232135, 1232140, 1232141, 1232142, 1232145, 1232147, 1232148, 1232151, 1232152, 1232154, 1232155, 1232156, 1232159, 1232160, 1232162, 1232164, 1232174, 1232180, 1232182, 1232183, 1232185, 1232187, 1232189, 1232192, 1232195, 1232196, 1232200, 1232208, 1232217, 1232218, 1232220, 1232221, 1232222, 1232232, 1232250, 1232251, 1232253, 1232254, 1232255, 1232256, 1232260, 1232262, 1232263, 1232275, 1232279, 1232282, 1232285, 1232287, 1232295, 1232309, 1232310, 1232312, 1232313, 1232314, 1232315, 1232316, 1232317, 1232329, 1232332, 1232333, 1232334, 1232335, 1232339, 1232340, 1232342, 1232345, 1232349, 1232359, 1232362, 1232369, 1232370, 1232378, 1232381, 1232383, 1232392, 1232394, 1232395, 1232417, 1232418, 1232424, 1232427, 1232432, 1232435, 1232503, 1232504, 1232505, 1232506, 1232507, 1232511, 1232519, 1232520, 1232529, 1232552, 1232623, 1232626, 1232627, 1232628, 1232629, 1232757, 1232768 CVE References: CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-6270, CVE-2024-26758, CVE-2024-26761, CVE-2024-26767, CVE-2024-26943, CVE-2024-27026, CVE-2024-27043, CVE-2024-35980, CVE-2024-36244, CVE-2024-38576, CVE-2024-38577, CVE-2024-38599, CVE-2024-41016, CVE-2024-41031, CVE-2024-41047, CVE-2024-41082, CVE-2024-42145, CVE-2024-44932, CVE-2024-44958, CVE-2024-44964, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46721, CVE-2024-46754, CVE-2024-46766, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46797, CVE-2024-46802, CVE-2024-46803, CVE-2024-46804, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46825, CVE-2024-46826, CVE-2024-46827, CVE-2024-46828, CVE-2024-46830, CVE-2024-46831, CVE-2024-46834, CVE-2024-46835, CVE-2024-46836, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46843, CVE-2024-46846, CVE-2024-46848, CVE-2024-46849, CVE-2024-46851, CVE-2024-46852, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46864, CVE-2024-46870, CVE-2024-46871, CVE-2024-47658, CVE-2024-47660, CVE-2024-47661, CVE-2024-47662, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47681, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687, CVE-2024-47688, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47702, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47741, CVE-2024-47742, CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751, CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49853, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49863, CVE-2024-49864, CVE-2024-49867, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874, CVE-2024-49875, CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49882, CVE-2024-49886, CVE-2024-49888, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49896, CVE-2024-49898, CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49931, CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49969, CVE-2024-49972, CVE-2024-49973, CVE-2024-49974, CVE-2024-49981, CVE-2024-49982, CVE-2024-49985, CVE-2024-49986, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50007, CVE-2024-50008, CVE-2024-50013, CVE-2024-50017, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50025, CVE-2024-50027, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50060, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50064, CVE-2024-50069, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078 Jira References: PED-10559, PED-10978, PED-9901 Maintenance Incident: [SUSE:Maintenance:36389](https://smelt.suse.de/incident/36389/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-rt-6.4.0-150600.10.17.1, kernel-source-rt-6.4.0-150600.10.17.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6-RT_Update_5-1-150600.1.3.1 SUSE Real Time Module 15-SP6 (src): kernel-syms-rt-6.4.0-150600.10.17.1, kernel-source-rt-6.4.0-150600.10.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c43 --- Comment #43 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3985-1: An update that solves 211 vulnerabilities and has 41 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243985-1 Category: security (important) Bug References: 1054914, 1065729, 1194869, 1204171, 1205796, 1206188, 1206344, 1209290, 1210449, 1210627, 1213034, 1216813, 1218562, 1223384, 1223524, 1223824, 1225189, 1225336, 1225611, 1225762, 1226498, 1226631, 1226797, 1227437, 1227885, 1228119, 1228269, 1228709, 1228743, 1228747, 1229005, 1229019, 1229450, 1229454, 1229456, 1229556, 1229769, 1229837, 1229891, 1230055, 1230179, 1230289, 1230405, 1230414, 1230429, 1230456, 1230550, 1230600, 1230620, 1230715, 1230722, 1230763, 1230773, 1230774, 1230801, 1230903, 1230918, 1231016, 1231072, 1231073, 1231084, 1231085, 1231087, 1231094, 1231096, 1231105, 1231114, 1231115, 1231148, 1231179, 1231191, 1231193, 1231195, 1231197, 1231200, 1231203, 1231277, 1231293, 1231327, 1231344, 1231375, 1231383, 1231439, 1231442, 1231496, 1231502, 1231539, 1231540, 1231578, 1231673, 1231857, 1231861, 1231872, 1231883, 1231885, 1231887, 1231888, 1231889, 1231890, 1231892, 1231893, 1231895, 1231896, 1231897, 1231902, 1231903, 1231907, 1231914, 1231929, 1231935, 1231936, 1231937, 1231938, 1231939, 1231940, 1231941, 1231942, 1231944, 1231950, 1231954, 1231958, 1231960, 1231961, 1231962, 1231965, 1231967, 1231968, 1231972, 1231973, 1231976, 1231979, 1231987, 1231988, 1231990, 1231991, 1231992, 1231995, 1231996, 1231997, 1231998, 1232001, 1232004, 1232005, 1232006, 1232007, 1232025, 1232026, 1232033, 1232034, 1232035, 1232036, 1232037, 1232038, 1232039, 1232043, 1232049, 1232067, 1232069, 1232070, 1232071, 1232075, 1232083, 1232084, 1232085, 1232089, 1232097, 1232104, 1232105, 1232108, 1232114, 1232116, 1232119, 1232120, 1232123, 1232124, 1232133, 1232135, 1232136, 1232140, 1232145, 1232149, 1232150, 1232151, 1232154, 1232155, 1232160, 1232163, 1232164, 1232170, 1232172, 1232174, 1232175, 1232191, 1232196, 1232199, 1232200, 1232201, 1232217, 1232220, 1232221, 1232229, 1232233, 1232237, 1232251, 1232253, 1232259, 1232260, 1232262, 1232263, 1232282, 1232285, 1232286, 1232304, 1232305, 1232307, 1232309, 1232310, 1232313, 1232314, 1232316, 1232329, 1232332, 1232335, 1232337, 1232342, 1232345, 1232352, 1232354, 1232355, 1232358, 1232361, 1232366, 1232367, 1232368, 1232369, 1232374, 1232381, 1232383, 1232392, 1232395, 1232418, 1232424, 1232432, 1232435, 1232442, 1232446, 1232501, 1232519, 1232630, 1232631, 1232632, 1232757 CVE References: CVE-2021-47416, CVE-2021-47534, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948, CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955, CVE-2022-48956, CVE-2022-48957, CVE-2022-48958, CVE-2022-48959, CVE-2022-48960, CVE-2022-48961, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48968, CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48980, CVE-2022-48981, CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007, CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015, CVE-2022-49016, CVE-2022-49017, CVE-2022-49019, CVE-2022-49020, CVE-2022-49021, CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-36244, CVE-2024-36957, CVE-2024-39476, CVE-2024-40965, CVE-2024-42145, CVE-2024-42226, CVE-2024-42253, CVE-2024-44931, CVE-2024-44947, CVE-2024-44958, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46716, CVE-2024-46719, CVE-2024-46754, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46809, CVE-2024-46811, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46826, CVE-2024-46828, CVE-2024-46834, CVE-2024-46840, CVE-2024-46841, CVE-2024-46848, CVE-2024-46849, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-47660, CVE-2024-47661, CVE-2024-47664, CVE-2024-47668, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710, CVE-2024-47720, CVE-2024-47727, CVE-2024-47730, CVE-2024-47738, CVE-2024-47739, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-49858, CVE-2024-49860, CVE-2024-49866, CVE-2024-49867, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49886, CVE-2024-49890, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49899, CVE-2024-49901, CVE-2024-49906, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49922, CVE-2024-49923, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49936, CVE-2024-49939, CVE-2024-49946, CVE-2024-49949, CVE-2024-49954, CVE-2024-49955, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49967, CVE-2024-49969, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49982, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50014, CVE-2024-50019, CVE-2024-50024, CVE-2024-50028, CVE-2024-50033, CVE-2024-50035, CVE-2024-50041, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50061, CVE-2024-50063, CVE-2024-50081 Maintenance Incident: [SUSE:Maintenance:36388](https://smelt.suse.de/incident/36388/) Sources used: SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.76.1, kernel-source-rt-5.14.21-150500.13.76.1 openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.76.1, kernel-livepatch-SLE15-SP5-RT_Update_22-1-150500.11.3.1, kernel-source-rt-5.14.21-150500.13.76.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-source-rt-5.14.21-150500.13.76.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_22-1-150500.11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c44 --- Comment #44 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3984-1: An update that solves 282 vulnerabilities, contains four features and has 59 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243984-1 Category: security (important) Bug References: 1065729, 1194869, 1217845, 1218562, 1219596, 1219803, 1220382, 1223384, 1223700, 1223824, 1223848, 1224088, 1224574, 1225611, 1226003, 1226498, 1226623, 1226631, 1226797, 1226848, 1228119, 1228244, 1228269, 1228410, 1228454, 1228537, 1228620, 1228743, 1228747, 1228857, 1229019, 1229429, 1229450, 1229585, 1229677, 1229769, 1229808, 1229891, 1230055, 1230132, 1230179, 1230220, 1230289, 1230295, 1230339, 1230341, 1230375, 1230414, 1230429, 1230456, 1230501, 1230527, 1230550, 1230600, 1230620, 1230710, 1230762, 1230763, 1230773, 1230774, 1230801, 1230831, 1230914, 1230918, 1231016, 1231035, 1231072, 1231073, 1231075, 1231081, 1231082, 1231083, 1231084, 1231085, 1231087, 1231089, 1231092, 1231093, 1231094, 1231096, 1231098, 1231100, 1231101, 1231102, 1231105, 1231108, 1231111, 1231114, 1231115, 1231116, 1231117, 1231131, 1231132, 1231135, 1231136, 1231138, 1231148, 1231169, 1231170, 1231171, 1231178, 1231179, 1231183, 1231187, 1231191, 1231193, 1231195, 1231197, 1231200, 1231202, 1231203, 1231276, 1231293, 1231384, 1231434, 1231435, 1231436, 1231439, 1231440, 1231441, 1231442, 1231452, 1231474, 1231481, 1231496, 1231502, 1231537, 1231539, 1231540, 1231541, 1231617, 1231634, 1231635, 1231636, 1231637, 1231638, 1231639, 1231640, 1231673, 1231828, 1231849, 1231855, 1231856, 1231857, 1231858, 1231859, 1231860, 1231861, 1231864, 1231865, 1231868, 1231869, 1231871, 1231872, 1231901, 1231902, 1231903, 1231904, 1231906, 1231907, 1231908, 1231914, 1231916, 1231924, 1231926, 1231931, 1231935, 1231942, 1231944, 1231947, 1231950, 1231951, 1231953, 1231954, 1231955, 1231956, 1231957, 1231965, 1231967, 1231968, 1231987, 1231988, 1231989, 1231990, 1231998, 1232000, 1232003, 1232009, 1232013, 1232015, 1232016, 1232017, 1232018, 1232033, 1232034, 1232036, 1232043, 1232047, 1232048, 1232049, 1232050, 1232056, 1232075, 1232076, 1232079, 1232080, 1232083, 1232084, 1232085, 1232089, 1232093, 1232094, 1232097, 1232098, 1232105, 1232109, 1232111, 1232114, 1232116, 1232117, 1232124, 1232126, 1232127, 1232129, 1232130, 1232131, 1232132, 1232134, 1232135, 1232140, 1232141, 1232142, 1232145, 1232147, 1232148, 1232149, 1232151, 1232152, 1232154, 1232155, 1232156, 1232159, 1232160, 1232162, 1232164, 1232174, 1232180, 1232182, 1232183, 1232185, 1232187, 1232189, 1232192, 1232195, 1232196, 1232199, 1232200, 1232201, 1232208, 1232217, 1232218, 1232220, 1232221, 1232222, 1232232, 1232250, 1232251, 1232253, 1232254, 1232255, 1232256, 1232259, 1232260, 1232262, 1232263, 1232275, 1232279, 1232282, 1232285, 1232287, 1232295, 1232305, 1232307, 1232309, 1232310, 1232312, 1232313, 1232314, 1232315, 1232316, 1232317, 1232329, 1232332, 1232333, 1232334, 1232335, 1232337, 1232339, 1232340, 1232342, 1232345, 1232349, 1232352, 1232354, 1232355, 1232359, 1232362, 1232369, 1232370, 1232378, 1232381, 1232383, 1232392, 1232394, 1232395, 1232417, 1232418, 1232424, 1232427, 1232432, 1232435, 1232501, 1232502, 1232503, 1232504, 1232505, 1232506, 1232507, 1232511, 1232519, 1232520, 1232529, 1232552, 1232623, 1232626, 1232627, 1232628, 1232629, 1232757, 1232768, 1232819 CVE References: CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-6270, CVE-2024-26758, CVE-2024-26761, CVE-2024-26767, CVE-2024-26943, CVE-2024-27026, CVE-2024-27043, CVE-2024-35980, CVE-2024-36244, CVE-2024-38576, CVE-2024-38577, CVE-2024-38599, CVE-2024-41016, CVE-2024-41031, CVE-2024-41047, CVE-2024-41082, CVE-2024-42145, CVE-2024-44932, CVE-2024-44958, CVE-2024-44964, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46721, CVE-2024-46754, CVE-2024-46766, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46797, CVE-2024-46802, CVE-2024-46803, CVE-2024-46804, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46825, CVE-2024-46826, CVE-2024-46827, CVE-2024-46828, CVE-2024-46830, CVE-2024-46831, CVE-2024-46834, CVE-2024-46835, CVE-2024-46836, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46843, CVE-2024-46846, CVE-2024-46848, CVE-2024-46849, CVE-2024-46851, CVE-2024-46852, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46864, CVE-2024-46870, CVE-2024-46871, CVE-2024-47658, CVE-2024-47660, CVE-2024-47661, CVE-2024-47662, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47681, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687, CVE-2024-47688, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47702, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47741, CVE-2024-47742, CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751, CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49853, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49863, CVE-2024-49864, CVE-2024-49866, CVE-2024-49867, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874, CVE-2024-49875, CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49886, CVE-2024-49888, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49898, CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49931, CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49969, CVE-2024-49972, CVE-2024-49973, CVE-2024-49974, CVE-2024-49981, CVE-2024-49982, CVE-2024-49985, CVE-2024-49986, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50007, CVE-2024-50008, CVE-2024-50013, CVE-2024-50015, CVE-2024-50017, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50025, CVE-2024-50027, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50060, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50064, CVE-2024-50069, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078, CVE-2024-50080, CVE-2024-50081 Jira References: PED-10559, PED-10978, PED-9899, PED-9901 Maintenance Incident: [SUSE:Maintenance:36347](https://smelt.suse.de/incident/36347/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-azure-6.4.0-150600.8.17.1, kernel-source-azure-6.4.0-150600.8.17.1 Public Cloud Module 15-SP6 (src): kernel-syms-azure-6.4.0-150600.8.17.1, kernel-source-azure-6.4.0-150600.8.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c45 --- Comment #45 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3983-1: An update that solves 204 vulnerabilities and has 30 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243983-1 Category: security (important) Bug References: 1204171, 1205796, 1206188, 1206344, 1209290, 1210449, 1210627, 1213034, 1216813, 1218562, 1223384, 1223524, 1223824, 1225189, 1225336, 1225611, 1225762, 1226498, 1226797, 1227437, 1227885, 1228119, 1228269, 1228709, 1228743, 1229005, 1229019, 1229450, 1229454, 1229456, 1229556, 1229769, 1229837, 1230179, 1230405, 1230414, 1230429, 1230456, 1230600, 1230620, 1230715, 1230722, 1230773, 1230801, 1230903, 1230918, 1231016, 1231072, 1231073, 1231094, 1231096, 1231105, 1231114, 1231148, 1231179, 1231191, 1231193, 1231195, 1231197, 1231200, 1231203, 1231293, 1231344, 1231375, 1231383, 1231439, 1231442, 1231496, 1231502, 1231539, 1231540, 1231578, 1231673, 1231857, 1231861, 1231872, 1231883, 1231885, 1231887, 1231888, 1231889, 1231890, 1231892, 1231893, 1231895, 1231896, 1231897, 1231902, 1231903, 1231907, 1231914, 1231929, 1231935, 1231936, 1231937, 1231938, 1231939, 1231940, 1231941, 1231942, 1231944, 1231950, 1231954, 1231958, 1231960, 1231961, 1231962, 1231965, 1231967, 1231968, 1231972, 1231973, 1231976, 1231979, 1231987, 1231988, 1231990, 1231992, 1231995, 1231996, 1231997, 1231998, 1232001, 1232004, 1232005, 1232006, 1232007, 1232025, 1232026, 1232033, 1232034, 1232035, 1232036, 1232037, 1232038, 1232039, 1232043, 1232049, 1232067, 1232069, 1232070, 1232071, 1232075, 1232083, 1232084, 1232085, 1232089, 1232097, 1232104, 1232105, 1232108, 1232114, 1232116, 1232119, 1232120, 1232123, 1232124, 1232133, 1232135, 1232136, 1232140, 1232145, 1232149, 1232150, 1232151, 1232154, 1232155, 1232160, 1232163, 1232164, 1232170, 1232172, 1232174, 1232175, 1232191, 1232196, 1232199, 1232200, 1232201, 1232217, 1232220, 1232221, 1232229, 1232233, 1232237, 1232251, 1232253, 1232259, 1232260, 1232262, 1232263, 1232282, 1232285, 1232286, 1232304, 1232305, 1232307, 1232309, 1232310, 1232313, 1232314, 1232316, 1232329, 1232332, 1232335, 1232337, 1232342, 1232345, 1232352, 1232354, 1232355, 1232358, 1232361, 1232366, 1232367, 1232368, 1232369, 1232374, 1232381, 1232383, 1232392, 1232395, 1232418, 1232424, 1232432, 1232435, 1232442, 1232446, 1232501, 1232519, 1232630, 1232631, 1232632, 1232757 CVE References: CVE-2021-47416, CVE-2021-47534, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948, CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955, CVE-2022-48956, CVE-2022-48957, CVE-2022-48958, CVE-2022-48959, CVE-2022-48960, CVE-2022-48961, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48968, CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48980, CVE-2022-48981, CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007, CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015, CVE-2022-49016, CVE-2022-49017, CVE-2022-49019, CVE-2022-49020, CVE-2022-49021, CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-36244, CVE-2024-36957, CVE-2024-39476, CVE-2024-40965, CVE-2024-42145, CVE-2024-42226, CVE-2024-42253, CVE-2024-44931, CVE-2024-44947, CVE-2024-44958, CVE-2024-45016, CVE-2024-45025, CVE-2024-46716, CVE-2024-46719, CVE-2024-46754, CVE-2024-46777, CVE-2024-46809, CVE-2024-46811, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46828, CVE-2024-46834, CVE-2024-46840, CVE-2024-46841, CVE-2024-46848, CVE-2024-46849, CVE-2024-47660, CVE-2024-47661, CVE-2024-47664, CVE-2024-47668, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710, CVE-2024-47720, CVE-2024-47727, CVE-2024-47730, CVE-2024-47738, CVE-2024-47739, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-49858, CVE-2024-49860, CVE-2024-49866, CVE-2024-49867, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49886, CVE-2024-49890, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49899, CVE-2024-49901, CVE-2024-49906, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49922, CVE-2024-49923, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49936, CVE-2024-49939, CVE-2024-49946, CVE-2024-49949, CVE-2024-49954, CVE-2024-49955, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49967, CVE-2024-49969, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49982, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50014, CVE-2024-50019, CVE-2024-50024, CVE-2024-50028, CVE-2024-50033, CVE-2024-50035, CVE-2024-50041, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50061, CVE-2024-50063, CVE-2024-50081 Maintenance Incident: [SUSE:Maintenance:36346](https://smelt.suse.de/incident/36346/) Sources used: openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.72.1, kernel-source-azure-5.14.21-150500.33.72.1 Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.72.1, kernel-source-azure-5.14.21-150500.33.72.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c56 --- Comment #56 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4318-1: An update that solves 506 vulnerabilities, contains eight features and has 101 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244318-1 Category: security (important) Bug References: 1012628, 1065729, 1082555, 1194869, 1215199, 1217845, 1218562, 1218644, 1219596, 1219803, 1220355, 1220382, 1221309, 1222423, 1222587, 1222590, 1223112, 1223384, 1223656, 1223700, 1223733, 1223824, 1223848, 1224088, 1224429, 1224518, 1224548, 1224574, 1224948, 1225611, 1225713, 1225725, 1225730, 1225742, 1225764, 1225768, 1225813, 1225903, 1226003, 1226130, 1226498, 1226623, 1226631, 1226748, 1226797, 1226848, 1226872, 1227726, 1227842, 1228119, 1228244, 1228269, 1228410, 1228430, 1228454, 1228537, 1228620, 1228743, 1228747, 1228850, 1228857, 1229019, 1229165, 1229429, 1229450, 1229585, 1229677, 1229769, 1229808, 1229891, 1230055, 1230132, 1230179, 1230220, 1230231, 1230289, 1230295, 1230339, 1230341, 1230375, 1230414, 1230429, 1230456, 1230501, 1230527, 1230550, 1230557, 1230558, 1230600, 1230620, 1230710, 1230733, 1230762, 1230763, 1230773, 1230774, 1230801, 1230807, 1230817, 1230827, 1230831, 1230914, 1230918, 1230971, 1231016, 1231035, 1231072, 1231073, 1231075, 1231076, 1231081, 1231082, 1231083, 1231084, 1231085, 1231087, 1231089, 1231092, 1231093, 1231094, 1231096, 1231098, 1231100, 1231101, 1231102, 1231105, 1231108, 1231111, 1231114, 1231115, 1231116, 1231117, 1231131, 1231132, 1231135, 1231136, 1231138, 1231148, 1231169, 1231170, 1231171, 1231178, 1231179, 1231182, 1231183, 1231187, 1231191, 1231193, 1231195, 1231197, 1231200, 1231202, 1231203, 1231276, 1231293, 1231384, 1231434, 1231435, 1231436, 1231439, 1231440, 1231441, 1231442, 1231452, 1231453, 1231465, 1231474, 1231481, 1231496, 1231502, 1231537, 1231539, 1231540, 1231541, 1231617, 1231630, 1231634, 1231635, 1231636, 1231637, 1231638, 1231639, 1231640, 1231673, 1231828, 1231849, 1231855, 1231856, 1231857, 1231858, 1231859, 1231860, 1231861, 1231864, 1231865, 1231868, 1231869, 1231871, 1231872, 1231901, 1231902, 1231903, 1231904, 1231906, 1231907, 1231908, 1231914, 1231916, 1231920, 1231924, 1231926, 1231930, 1231931, 1231935, 1231942, 1231944, 1231946, 1231947, 1231950, 1231951, 1231952, 1231953, 1231954, 1231955, 1231956, 1231957, 1231965, 1231967, 1231968, 1231987, 1231988, 1231989, 1231990, 1231998, 1232000, 1232003, 1232009, 1232013, 1232015, 1232016, 1232017, 1232018, 1232033, 1232034, 1232036, 1232043, 1232047, 1232048, 1232049, 1232050, 1232056, 1232075, 1232076, 1232079, 1232080, 1232083, 1232084, 1232085, 1232089, 1232090, 1232093, 1232094, 1232096, 1232097, 1232098, 1232103, 1232104, 1232105, 1232109, 1232111, 1232114, 1232116, 1232117, 1232124, 1232126, 1232127, 1232129, 1232130, 1232131, 1232132, 1232134, 1232135, 1232140, 1232141, 1232142, 1232145, 1232147, 1232148, 1232149, 1232151, 1232152, 1232154, 1232155, 1232156, 1232157, 1232159, 1232160, 1232162, 1232164, 1232165, 1232166, 1232174, 1232180, 1232182, 1232183, 1232185, 1232187, 1232189, 1232192, 1232195, 1232196, 1232198, 1232199, 1232200, 1232201, 1232207, 1232208, 1232217, 1232218, 1232220, 1232221, 1232222, 1232224, 1232232, 1232250, 1232251, 1232253, 1232254, 1232255, 1232256, 1232258, 1232259, 1232260, 1232262, 1232263, 1232264, 1232272, 1232275, 1232279, 1232282, 1232285, 1232287, 1232295, 1232305, 1232307, 1232309, 1232310, 1232312, 1232313, 1232314, 1232315, 1232316, 1232317, 1232318, 1232329, 1232332, 1232333, 1232334, 1232335, 1232337, 1232339, 1232340, 1232342, 1232345, 1232349, 1232352, 1232354, 1232355, 1232357, 1232358, 1232359, 1232361, 1232362, 1232366, 1232367, 1232368, 1232369, 1232370, 1232371, 1232374, 1232378, 1232381, 1232383, 1232385, 1232386, 1232387, 1232392, 1232394, 1232395, 1232396, 1232413, 1232416, 1232417, 1232418, 1232424, 1232427, 1232432, 1232435, 1232436, 1232442, 1232446, 1232483, 1232494, 1232498, 1232499, 1232500, 1232501, 1232502, 1232503, 1232504, 1232505, 1232506, 1232507, 1232511, 1232519, 1232520, 1232529, 1232552, 1232623, 1232626, 1232627, 1232628, 1232629, 1232704, 1232757, 1232768, 1232819, 1232823, 1232860, 1232869, 1232870, 1232873, 1232876, 1232877, 1232878, 1232880, 1232881, 1232884, 1232885, 1232887, 1232888, 1232890, 1232892, 1232894, 1232896, 1232897, 1232905, 1232907, 1232914, 1232919, 1232925, 1232926, 1232928, 1232935, 1233029, 1233032, 1233035, 1233036, 1233041, 1233044, 1233049, 1233050, 1233051, 1233056, 1233057, 1233061, 1233062, 1233063, 1233065, 1233067, 1233070, 1233073, 1233074, 1233088, 1233091, 1233092, 1233097, 1233100, 1233103, 1233104, 1233105, 1233106, 1233107, 1233108, 1233110, 1233111, 1233113, 1233114, 1233115, 1233117, 1233119, 1233123, 1233125, 1233127, 1233129, 1233130, 1233132, 1233135, 1233176, 1233179, 1233185, 1233188, 1233189, 1233191, 1233193, 1233197, 1233201, 1233203, 1233205, 1233206, 1233207, 1233208, 1233209, 1233210, 1233211, 1233212, 1233216, 1233217, 1233219, 1233226, 1233238, 1233241, 1233244, 1233253, 1233255, 1233293, 1233298, 1233305, 1233320, 1233350, 1233443, 1233452, 1233453, 1233454, 1233456, 1233457, 1233458, 1233460, 1233462, 1233463, 1233464, 1233465, 1233468, 1233471, 1233476, 1233478, 1233479, 1233481, 1233484, 1233485, 1233487, 1233490, 1233491, 1233523, 1233524, 1233540, 1233547, 1233548, 1233550, 1233552, 1233553, 1233554, 1233555, 1233557, 1233560, 1233561, 1233564, 1233566, 1233567, 1233568, 1233570, 1233572, 1233573, 1233577, 1233580, 1233640, 1233641, 1233642, 1233721, 1233754, 1233756, 1233769, 1233771, 1233977, 1234009, 1234011, 1234012, 1234025, 1234039, 1234040, 1234041, 1234042, 1234043, 1234044, 1234045, 1234046, 1234072, 1234078, 1234081, 1234083, 1234085, 1234087, 1234093, 1234098, 1234108, 1234121, 1234223 CVE References: CVE-2023-52766, CVE-2023-52778, CVE-2023-52800, CVE-2023-52881, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-52920, CVE-2023-52921, CVE-2023-52922, CVE-2023-6270, CVE-2024-26596, CVE-2024-26703, CVE-2024-26741, CVE-2024-26758, CVE-2024-26761, CVE-2024-26767, CVE-2024-26782, CVE-2024-26864, CVE-2024-26943, CVE-2024-26953, CVE-2024-27017, CVE-2024-27026, CVE-2024-27043, CVE-2024-27407, CVE-2024-35888, CVE-2024-35980, CVE-2024-36000, CVE-2024-36031, CVE-2024-36244, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36920, CVE-2024-36927, CVE-2024-36954, CVE-2024-36968, CVE-2024-38576, CVE-2024-38577, CVE-2024-38589, CVE-2024-38599, CVE-2024-40914, CVE-2024-41016, CVE-2024-41023, CVE-2024-41031, CVE-2024-41047, CVE-2024-41082, CVE-2024-42102, CVE-2024-42145, CVE-2024-44932, CVE-2024-44958, CVE-2024-44964, CVE-2024-44995, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46680, CVE-2024-46681, CVE-2024-46721, CVE-2024-46754, CVE-2024-46765, CVE-2024-46766, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46788, CVE-2024-46797, CVE-2024-46800, CVE-2024-46802, CVE-2024-46803, CVE-2024-46804, CVE-2024-46805, CVE-2024-46806, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46825, CVE-2024-46826, CVE-2024-46827, CVE-2024-46828, CVE-2024-46830, CVE-2024-46831, CVE-2024-46834, CVE-2024-46835, CVE-2024-46836, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46843, CVE-2024-46845, CVE-2024-46846, CVE-2024-46848, CVE-2024-46849, CVE-2024-46851, CVE-2024-46852, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46860, CVE-2024-46861, CVE-2024-46864, CVE-2024-46870, CVE-2024-46871, CVE-2024-47658, CVE-2024-47660, CVE-2024-47661, CVE-2024-47662, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47666, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47675, CVE-2024-47679, CVE-2024-47681, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687, CVE-2024-47688, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47702, CVE-2024-47703, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714, CVE-2024-47715, CVE-2024-47718, CVE-2024-47719, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47741, CVE-2024-47742, CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751, CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49853, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862, CVE-2024-49863, CVE-2024-49864, CVE-2024-49866, CVE-2024-49867, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874, CVE-2024-49875, CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49888, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49898, CVE-2024-49899, CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921, CVE-2024-49922, CVE-2024-49923, CVE-2024-49925, CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49931, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939, CVE-2024-49944, CVE-2024-49945, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49952, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49968, CVE-2024-49969, CVE-2024-49972, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976, CVE-2024-49981, CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49986, CVE-2024-49987, CVE-2024-49989, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50003, CVE-2024-50004, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50012, CVE-2024-50013, CVE-2024-50014, CVE-2024-50015, CVE-2024-50017, CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022, CVE-2024-50023, CVE-2024-50024, CVE-2024-50025, CVE-2024-50026, CVE-2024-50027, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50060, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50064, CVE-2024-50067, CVE-2024-50069, CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076, CVE-2024-50077, CVE-2024-50078, CVE-2024-50080, CVE-2024-50081, CVE-2024-50082, CVE-2024-50084, CVE-2024-50087, CVE-2024-50088, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50100, CVE-2024-50101, CVE-2024-50102, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50121, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50130, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50136, CVE-2024-50138, CVE-2024-50139, CVE-2024-50141, CVE-2024-50145, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50157, CVE-2024-50158, CVE-2024-50159, CVE-2024-50160, CVE-2024-50166, CVE-2024-50167, CVE-2024-50169, CVE-2024-50171, CVE-2024-50172, CVE-2024-50175, CVE-2024-50176, CVE-2024-50177, CVE-2024-50179, CVE-2024-50180, CVE-2024-50181, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50200, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50210, CVE-2024-50215, CVE-2024-50216, CVE-2024-50218, CVE-2024-50221, CVE-2024-50224, CVE-2024-50225, CVE-2024-50229, CVE-2024-50230, CVE-2024-50231, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50235, CVE-2024-50236, CVE-2024-50237, CVE-2024-50240, CVE-2024-50245, CVE-2024-50246, CVE-2024-50248, CVE-2024-50249, CVE-2024-50250, CVE-2024-50252, CVE-2024-50255, CVE-2024-50257, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50275, CVE-2024-50276, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50296, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042, CVE-2024-53043, CVE-2024-53045, CVE-2024-53048, CVE-2024-53051, CVE-2024-53052, CVE-2024-53055, CVE-2024-53056, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53072, CVE-2024-53074, CVE-2024-53076, CVE-2024-53079, CVE-2024-53081, CVE-2024-53082, CVE-2024-53085, CVE-2024-53088, CVE-2024-53093, CVE-2024-53094, CVE-2024-53095, CVE-2024-53096, CVE-2024-53100, CVE-2024-53101, CVE-2024-53104, CVE-2024-53106, CVE-2024-53108, CVE-2024-53110, CVE-2024-53112, CVE-2024-53114, CVE-2024-53121, CVE-2024-53138 Jira References: PED-10559, PED-10978, PED-11316, PED-11442, PED-11580, PED-9899, PED-9901, PED-9943 Maintenance Incident: [SUSE:Maintenance:36330](https://smelt.suse.de/incident/36330/) Sources used: openSUSE Leap 15.6 (src): kernel-source-6.4.0-150600.23.30.1, kernel-obs-qa-6.4.0-150600.23.30.1, kernel-livepatch-SLE15-SP6_Update_6-1-150600.13.3.5, kernel-obs-build-6.4.0-150600.23.30.1, kernel-default-base-6.4.0-150600.23.30.1.150600.12.12.6, kernel-syms-6.4.0-150600.23.30.1 Basesystem Module 15-SP6 (src): kernel-source-6.4.0-150600.23.30.1, kernel-default-base-6.4.0-150600.23.30.1.150600.12.12.6 Development Tools Module 15-SP6 (src): kernel-source-6.4.0-150600.23.30.1, kernel-obs-build-6.4.0-150600.23.30.1, kernel-syms-6.4.0-150600.23.30.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6_Update_6-1-150600.13.3.5 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229450 https://bugzilla.suse.com/show_bug.cgi?id=1229450#c57 --- Comment #57 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4364-1: An update that solves 439 vulnerabilities, contains nine features and has 68 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244364-1 Category: security (important) Bug References: 1054914, 1065729, 1082555, 1194869, 1204171, 1205796, 1206188, 1206344, 1209290, 1210449, 1210627, 1213034, 1216813, 1218562, 1218644, 1220382, 1221309, 1221333, 1222364, 1222590, 1223202, 1223384, 1223524, 1223656, 1223824, 1223848, 1223919, 1223942, 1224518, 1224526, 1224574, 1225189, 1225336, 1225611, 1225725, 1225730, 1225742, 1225762, 1225764, 1225812, 1226498, 1226560, 1226592, 1226631, 1226748, 1226797, 1226872, 1227437, 1227853, 1227885, 1228119, 1228269, 1228410, 1228430, 1228486, 1228650, 1228709, 1228743, 1228747, 1228857, 1229005, 1229019, 1229312, 1229429, 1229450, 1229454, 1229456, 1229556, 1229585, 1229752, 1229769, 1229808, 1229837, 1229891, 1230055, 1230179, 1230220, 1230231, 1230270, 1230289, 1230405, 1230414, 1230429, 1230456, 1230550, 1230558, 1230600, 1230620, 1230715, 1230722, 1230763, 1230773, 1230774, 1230801, 1230827, 1230903, 1230918, 1231016, 1231072, 1231073, 1231083, 1231084, 1231085, 1231087, 1231089, 1231094, 1231096, 1231098, 1231101, 1231105, 1231108, 1231111, 1231114, 1231115, 1231132, 1231135, 1231138, 1231148, 1231169, 1231178, 1231179, 1231180, 1231181, 1231187, 1231191, 1231193, 1231195, 1231197, 1231200, 1231202, 1231203, 1231277, 1231293, 1231327, 1231344, 1231375, 1231383, 1231434, 1231439, 1231441, 1231442, 1231452, 1231465, 1231474, 1231481, 1231496, 1231502, 1231537, 1231539, 1231540, 1231541, 1231578, 1231646, 1231673, 1231849, 1231856, 1231857, 1231858, 1231859, 1231861, 1231864, 1231872, 1231883, 1231885, 1231887, 1231888, 1231889, 1231890, 1231892, 1231893, 1231895, 1231896, 1231897, 1231902, 1231903, 1231904, 1231907, 1231914, 1231916, 1231920, 1231923, 1231929, 1231930, 1231931, 1231935, 1231936, 1231937, 1231938, 1231939, 1231940, 1231941, 1231942, 1231944, 1231947, 1231950, 1231952, 1231953, 1231954, 1231958, 1231959, 1231960, 1231961, 1231962, 1231965, 1231967, 1231968, 1231972, 1231973, 1231976, 1231978, 1231979, 1231987, 1231988, 1231990, 1231991, 1231992, 1231995, 1231996, 1231997, 1231998, 1232001, 1232004, 1232005, 1232006, 1232007, 1232013, 1232015, 1232016, 1232017, 1232025, 1232026, 1232027, 1232028, 1232033, 1232034, 1232035, 1232036, 1232037, 1232038, 1232039, 1232043, 1232047, 1232048, 1232049, 1232050, 1232056, 1232067, 1232069, 1232070, 1232071, 1232075, 1232076, 1232080, 1232083, 1232084, 1232085, 1232089, 1232094, 1232096, 1232097, 1232098, 1232104, 1232105, 1232108, 1232111, 1232114, 1232116, 1232119, 1232120, 1232123, 1232124, 1232126, 1232133, 1232134, 1232135, 1232136, 1232140, 1232141, 1232142, 1232145, 1232147, 1232149, 1232150, 1232151, 1232152, 1232154, 1232155, 1232159, 1232160, 1232162, 1232163, 1232164, 1232165, 1232170, 1232172, 1232174, 1232175, 1232180, 1232185, 1232187, 1232189, 1232191, 1232195, 1232196, 1232198, 1232199, 1232200, 1232201, 1232217, 1232218, 1232220, 1232221, 1232224, 1232229, 1232232, 1232233, 1232237, 1232251, 1232253, 1232254, 1232255, 1232259, 1232260, 1232262, 1232263, 1232264, 1232272, 1232279, 1232282, 1232285, 1232286, 1232287, 1232293, 1232304, 1232305, 1232307, 1232309, 1232310, 1232312, 1232313, 1232314, 1232316, 1232317, 1232318, 1232329, 1232332, 1232333, 1232334, 1232335, 1232337, 1232339, 1232342, 1232345, 1232349, 1232352, 1232354, 1232355, 1232357, 1232358, 1232359, 1232361, 1232362, 1232364, 1232366, 1232367, 1232368, 1232369, 1232370, 1232371, 1232374, 1232378, 1232381, 1232383, 1232385, 1232387, 1232392, 1232394, 1232395, 1232413, 1232416, 1232418, 1232424, 1232432, 1232435, 1232436, 1232442, 1232446, 1232483, 1232500, 1232501, 1232503, 1232504, 1232507, 1232519, 1232520, 1232552, 1232630, 1232631, 1232632, 1232757, 1232819, 1232860, 1232870, 1232873, 1232877, 1232878, 1232881, 1232884, 1232885, 1232887, 1232888, 1232890, 1232892, 1232896, 1232897, 1232905, 1232907, 1232919, 1232926, 1232928, 1232935, 1233035, 1233049, 1233051, 1233056, 1233057, 1233061, 1233063, 1233065, 1233067, 1233070, 1233073, 1233074, 1233100, 1233103, 1233104, 1233105, 1233106, 1233107, 1233108, 1233110, 1233111, 1233113, 1233114, 1233117, 1233123, 1233125, 1233129, 1233130, 1233134, 1233135, 1233150, 1233189, 1233191, 1233197, 1233205, 1233206, 1233209, 1233210, 1233211, 1233212, 1233214, 1233216, 1233238, 1233241, 1233253, 1233255, 1233293, 1233350, 1233452, 1233453, 1233454, 1233456, 1233457, 1233458, 1233460, 1233462, 1233463, 1233468, 1233471, 1233476, 1233478, 1233479, 1233481, 1233484, 1233487, 1233490, 1233491, 1233528, 1233548, 1233552, 1233553, 1233554, 1233555, 1233557, 1233560, 1233561, 1233570, 1233577, 1233580, 1233977, 1234012, 1234025, 1234085, 1234093, 1234098, 1234108 CVE References: CVE-2021-47416, CVE-2021-47534, CVE-2021-47594, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48674, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948, CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955, CVE-2022-48956, CVE-2022-48957, CVE-2022-48958, CVE-2022-48959, CVE-2022-48960, CVE-2022-48961, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48968, CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48979, CVE-2022-48980, CVE-2022-48981, CVE-2022-48982, CVE-2022-48983, CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48989, CVE-2022-48990, CVE-2022-48991, CVE-2022-48992, CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007, CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015, CVE-2022-49016, CVE-2022-49017, CVE-2022-49019, CVE-2022-49020, CVE-2022-49021, CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52915, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-52921, CVE-2023-52922, CVE-2023-6270, CVE-2024-26782, CVE-2024-26906, CVE-2024-26953, CVE-2024-27043, CVE-2024-35888, CVE-2024-35937, CVE-2024-35980, CVE-2024-36244, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36953, CVE-2024-36954, CVE-2024-36957, CVE-2024-38577, CVE-2024-38589, CVE-2024-38615, CVE-2024-39476, CVE-2024-40965, CVE-2024-40997, CVE-2024-41016, CVE-2024-41023, CVE-2024-41049, CVE-2024-42131, CVE-2024-42145, CVE-2024-42226, CVE-2024-42253, CVE-2024-43817, CVE-2024-43897, CVE-2024-44931, CVE-2024-44932, CVE-2024-44947, CVE-2024-44958, CVE-2024-44964, CVE-2024-44995, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46681, CVE-2024-46716, CVE-2024-46719, CVE-2024-46754, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46800, CVE-2024-46802, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46826, CVE-2024-46828, CVE-2024-46834, CVE-2024-46835, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46848, CVE-2024-46849, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46864, CVE-2024-46871, CVE-2024-47660, CVE-2024-47661, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47718, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47742, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49863, CVE-2024-49866, CVE-2024-49867, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49875, CVE-2024-49877, CVE-2024-49879, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49899, CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921, CVE-2024-49922, CVE-2024-49923, CVE-2024-49924, CVE-2024-49925, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49936, CVE-2024-49938, CVE-2024-49939, CVE-2024-49945, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49968, CVE-2024-49969, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49981, CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49989, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50003, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50013, CVE-2024-50014, CVE-2024-50017, CVE-2024-50019, CVE-2024-50024, CVE-2024-50025, CVE-2024-50026, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50041, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50077, CVE-2024-50078, CVE-2024-50081, CVE-2024-50082, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50138, CVE-2024-50141, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50160, CVE-2024-50167, CVE-2024-50171, CVE-2024-50179, CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50215, CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50249, CVE-2024-50255, CVE-2024-50259, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53052, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53104, CVE-2024-53110 Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-2849 Maintenance Incident: [SUSE:Maintenance:36349](https://smelt.suse.de/incident/36349/) Sources used: SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4, kernel-source-5.14.21-150500.55.88.1 Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.88.1, kernel-syms-5.14.21-150500.55.88.1, kernel-obs-build-5.14.21-150500.55.88.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_21-1-150500.11.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com