openSUSE Security Announce
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
May 2024
- 2 participants
- 71 discussions
20 May '24
# Security update for cairo
Announcement ID: SUSE-SU-2024:1704-1
Rating: low
References:
* bsc#1122321
Cross-References:
* CVE-2019-6462
CVSS scores:
* CVE-2019-6462 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2019-6462 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2019-6462 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for cairo fixes the following issues:
* CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1704=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1704=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1704=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1704=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1704=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1704=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1704=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1704=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1704=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1704=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1704=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcairo-script-interpreter2-debuginfo-1.16.0-150400.11.3.1
* cairo-devel-1.16.0-150400.11.3.1
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-1.16.0-150400.11.3.1
* cairo-tools-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-tools-debuginfo-1.16.0-150400.11.3.1
* openSUSE Leap 15.4 (x86_64)
* libcairo-gobject2-32bit-debuginfo-1.16.0-150400.11.3.1
* libcairo2-32bit-debuginfo-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-32bit-1.16.0-150400.11.3.1
* libcairo-gobject2-32bit-1.16.0-150400.11.3.1
* libcairo2-32bit-1.16.0-150400.11.3.1
* cairo-devel-32bit-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-32bit-debuginfo-1.16.0-150400.11.3.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcairo-gobject2-64bit-debuginfo-1.16.0-150400.11.3.1
* libcairo-gobject2-64bit-1.16.0-150400.11.3.1
* libcairo2-64bit-1.16.0-150400.11.3.1
* libcairo2-64bit-debuginfo-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-64bit-debuginfo-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-64bit-1.16.0-150400.11.3.1
* cairo-devel-64bit-1.16.0-150400.11.3.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcairo-script-interpreter2-debuginfo-1.16.0-150400.11.3.1
* cairo-devel-1.16.0-150400.11.3.1
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-1.16.0-150400.11.3.1
* cairo-tools-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-tools-debuginfo-1.16.0-150400.11.3.1
* openSUSE Leap 15.5 (x86_64)
* libcairo-gobject2-32bit-debuginfo-1.16.0-150400.11.3.1
* libcairo2-32bit-debuginfo-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-32bit-1.16.0-150400.11.3.1
* libcairo-gobject2-32bit-1.16.0-150400.11.3.1
* libcairo2-32bit-1.16.0-150400.11.3.1
* cairo-devel-32bit-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-32bit-debuginfo-1.16.0-150400.11.3.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcairo-script-interpreter2-debuginfo-1.16.0-150400.11.3.1
* cairo-devel-1.16.0-150400.11.3.1
* libcairo2-debuginfo-1.16.0-150400.11.3.1
* libcairo2-1.16.0-150400.11.3.1
* libcairo-gobject2-1.16.0-150400.11.3.1
* libcairo-script-interpreter2-1.16.0-150400.11.3.1
* libcairo-gobject2-debuginfo-1.16.0-150400.11.3.1
* cairo-debugsource-1.16.0-150400.11.3.1
* Desktop Applications Module 15-SP5 (x86_64)
* libcairo2-32bit-1.16.0-150400.11.3.1
* libcairo2-32bit-debuginfo-1.16.0-150400.11.3.1
## References:
* https://www.suse.com/security/cve/CVE-2019-6462.html
* https://bugzilla.suse.com/show_bug.cgi?id=1122321
1
0
openSUSE-SU-2024:0130-1: important: Security update for git-cliff
by opensuse-securityďĽ opensuse.org 18 May '24
by opensuse-securityďĽ opensuse.org 18 May '24
18 May '24
openSUSE Security Update: Security update for git-cliff
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0130-1
Rating: important
References: #1223218
Cross-References: CVE-2024-32650
CVSS scores:
CVE-2024-32650 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for git-cliff fixes the following issues:
- update to 2.2.2:
* (changelog) Allow adding custom context
* (changelog) Ignore empty lines when using split_commits
* (parser) Allow matching empty commit body
* Documentation updates
- update to 2.2.1:
* Make rendering errors more verbose
* Support detecting config from project manifest
* Make the bump version rules configurable
* bug fixes and documentation updates
- CVE-2024-32650: rust-rustls: Infinite loop with proper client input
fixes (boo#1223218)
- Update to version 2.1.2:
* feat(npm): add programmatic API for TypeScript
* chore(fixtures): enable verbose logging for output
* refactor(clippy): apply clippy suggestions
* refactor(changelog): do not output to stdout when prepend is used
* feat(args): add `--tag-pattern` argument
* fix(config): fix commit parser regex in the default config
* fix(github): sanitize the GitHub token in debug logs
* chore(config): add animation to the header of the changelog
* refactor(clippy): apply clippy suggestions
* docs(security): update security policy
* chore(project): add readme to core package
* chore(embed): do not allow missing docs
* chore(config): skip dependabot commits for dev updates
* docs(readme): mention RustLab 2023 talk
* chore(config): revamp the configuration files
* chore(docker): update versions in Dockerfile
* chore(example): use full links in GitHub templates
* chore(project): bump MSRV to 1.74.1
* revert(config): use postprocessors for checking the typos
* feat(template): support using PR labels in the GitHub template
* docs(configuration): fix typo
* feat(args): add `--no-exec` flag for skipping command execution
* chore(command): explicitly set the directory of command to current dir
* refactor(ci): use hardcoded workspace members for cargo-msrv command
* refactor(ci): simplify cargo-msrv installation
* refactor(clippy): apply clippy suggestions
* refactor(config): use postprocessors for checking the typos
* chore(project): update copyright years
* chore(github): update templates about GitHub integration
* feat(changelog): set the timestamp of the previous release
* feat(template): support using PR title in the GitHub template
* feat(changelog): improve skipping via `.cliffignore` and
`--skip-commit`
* chore(changelog): disable the default behavior of next-version
* fix(git): sort commits in topological order
* test(changelog): use the correct version for missing tags
* chore(changelog): use 0.1.0 as default next release if no tag is found
* feat(github)!: support integration with GitHub repos
* refactor(changelog): support `--bump` for processed releases
* fix(cli): fix broken pipe when stdout is interrupted
* test(fixtures): update the bumped value output to add prefix
* feat(changelog): support tag prefixes with `--bump`
* feat(changelog)!: set tag to `0.0.1` via `--bump` if no tags exist
* fix(commit): trim the trailing newline from message
* docs(readme): use the raw link for the animation
* chore(example): remove limited commits example
* feat(args): add `-x` short argument for `--context`
* revert(deps): bump actions/upload-pages-artifact from 2 to 3
* revert(deps): bump actions/deploy-pages from 3 to 4
* chore(dependabot): group the dependency updates for creating less PRs
* feat(parser): support using SHA1 of the commit
* feat(commit): add merge_commit flag to the context
* chore(mergify): don't update PRs for the main branch
* fix(links): skip checking the GitHub commit URLs
* fix(changelog): fix previous version links
* feat(parser): support using regex scope values
* test(fixture): update the date for example test fixture
* docs(fixtures): add instructions for adding new fixtures
* feat(args): support initialization with built-in templates
* feat(changelog)!: support templating in the footer
* feat(args): allow returning the bumped version
* test(fixture): add test fixture for bumping version
* fix: allow version bump with a single previous release
* fix(changelog): set the correct previous tag when a custom tag is given
* feat(args): set `CHANGELOG.md` as default missing value for output
option
* refactor(config): remove unnecessary newline from configs
- Update to version 1.4.0:
* Support bumping the semantic version via `--bump`
* Add 'typos' check
* Log the output of failed external commands -
* breaking change: Support regex in 'tag_pattern' configuration
* Add field and value matchers to the commit parser
- Update to version 1.2.0:
* Update clap and clap extras to v4
* Make the fields of Signature public
* Add a custom configuration file for the repository
* Support placing configuration inside pyproject.toml
* Generate SBOM/provenance for the Docker image
* Support using regex group values
* [breaking] Nested environment config overrides
* Set max of limit_commits to the number of commits
* Set the node cache dependency path
* Use the correct argument in release script
- Update to version 1.1.2:
* Do not skip all tags when skip_tags is empty (#136)
* Allow saving context to a file (#138)
* Derive the tag order from commits instead of timestamp (#139)
* Use timestamp for deriving the tag order (#139)
- Update to version 1.1.1:
* Relevant change: Update README.md about the NPM package
* Fix type casting in base NPM package
* Rename the package on Windows
* Disable liquid parsing in README.md by using raw blocks
* Support for generating changelog for multiple git repositories
* Publish binaries for more platforms/architectures
- Update to version 1.0.0:
* Bug Fixes
- Fix test fixture failures
* Documentation
- Fix GitHub badges in README.md
* Features
- [breaking] Replace --date-order by --topo-order
- Allow running with --prepend and --output
- [breaking] Use current time for --tag argument
- Include completions and mangen in binary releases
- Publish Debian package via release workflow
* Miscellaneous Tasks
- Run all test fixtures
- Remove deprecated set-output usage
- Update actions/checkout to v3
- Comment out custom commit preprocessor
* Refactor
- Apply clippy suggestions
* Styling
- Update README.md about the styling of footer field
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-130=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
git-cliff-2.2.2-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
git-cliff-bash-completion-2.2.2-bp155.2.3.1
git-cliff-fish-completion-2.2.2-bp155.2.3.1
git-cliff-zsh-completion-2.2.2-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-32650.html
https://bugzilla.suse.com/1223218
1
0
SUSE-SU-2024:1673-1: critical: Security update for python-Pillow
by OPENSUSE-SECURITY-UPDATES 17 May '24
by OPENSUSE-SECURITY-UPDATES 17 May '24
17 May '24
# Security update for python-Pillow
Announcement ID: SUSE-SU-2024:1673-1
Rating: critical
References:
* bsc#1180833
* bsc#1183101
* bsc#1183102
* bsc#1183103
* bsc#1183105
* bsc#1183107
* bsc#1183108
* bsc#1183110
* bsc#1188574
* bsc#1190229
* bsc#1194551
* bsc#1194552
Cross-References:
* CVE-2020-35654
* CVE-2021-23437
* CVE-2021-25289
* CVE-2021-25290
* CVE-2021-25292
* CVE-2021-25293
* CVE-2021-27921
* CVE-2021-27922
* CVE-2021-27923
* CVE-2021-34552
* CVE-2022-22815
* CVE-2022-22816
CVSS scores:
* CVE-2020-35654 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-35654 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-23437 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-23437 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-25289 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-25289 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-25290 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-25290 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-25292 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-25292 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-25293 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-25293 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-27921 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-27921 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-27922 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-27922 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-27923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-27923 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-34552 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-34552 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-22815 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2022-22815 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-22816 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2022-22816 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
An update that solves 12 vulnerabilities can now be installed.
## Description:
This update for python-Pillow fixes the following issues:
* Fixed ImagePath.Path array handling (bsc#1194552, CVE-2022-22815,
bsc#1194551, CVE-2022-22816)
* Use snprintf instead of sprintf (bsc#1188574, CVE-2021-34552)
* Fix Memory DOS in Icns, Ico and Blp Image Plugins. (bsc#1183110,
CVE-2021-27921, bsc#1183108, CVE-2021-27922, bsc#1183107, CVE-2021-27923)
* Fix OOB read in SgiRleDecode.c (bsc#1183102, CVE-2021-25293)
* Use more specific regex chars to prevent ReDoS (bsc#1183101, CVE-2021-25292)
* Fix negative size read in TiffDecode.c (bsc#1183105, CVE-2021-25290)
* Raise ValueError if color specifier is too long (bsc#1190229,
CVE-2021-23437)
* Incorrect error code checking in TiffDecode.c (bsc#1183103, CVE-2021-25289)
* OOB Write in TiffDecode.c (bsc#1180833, CVE-2020-35654)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1673=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1673=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python-Pillow-debugsource-7.2.0-150300.3.15.1
* python3-Pillow-tk-7.2.0-150300.3.15.1
* python-Pillow-debuginfo-7.2.0-150300.3.15.1
* python3-Pillow-7.2.0-150300.3.15.1
* python3-Pillow-debuginfo-7.2.0-150300.3.15.1
* python3-Pillow-tk-debuginfo-7.2.0-150300.3.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-Pillow-debugsource-7.2.0-150300.3.15.1
* python3-Pillow-tk-7.2.0-150300.3.15.1
* python-Pillow-debuginfo-7.2.0-150300.3.15.1
* python3-Pillow-7.2.0-150300.3.15.1
* python3-Pillow-debuginfo-7.2.0-150300.3.15.1
* python3-Pillow-tk-debuginfo-7.2.0-150300.3.15.1
## References:
* https://www.suse.com/security/cve/CVE-2020-35654.html
* https://www.suse.com/security/cve/CVE-2021-23437.html
* https://www.suse.com/security/cve/CVE-2021-25289.html
* https://www.suse.com/security/cve/CVE-2021-25290.html
* https://www.suse.com/security/cve/CVE-2021-25292.html
* https://www.suse.com/security/cve/CVE-2021-25293.html
* https://www.suse.com/security/cve/CVE-2021-27921.html
* https://www.suse.com/security/cve/CVE-2021-27922.html
* https://www.suse.com/security/cve/CVE-2021-27923.html
* https://www.suse.com/security/cve/CVE-2021-34552.html
* https://www.suse.com/security/cve/CVE-2022-22815.html
* https://www.suse.com/security/cve/CVE-2022-22816.html
* https://bugzilla.suse.com/show_bug.cgi?id=1180833
* https://bugzilla.suse.com/show_bug.cgi?id=1183101
* https://bugzilla.suse.com/show_bug.cgi?id=1183102
* https://bugzilla.suse.com/show_bug.cgi?id=1183103
* https://bugzilla.suse.com/show_bug.cgi?id=1183105
* https://bugzilla.suse.com/show_bug.cgi?id=1183107
* https://bugzilla.suse.com/show_bug.cgi?id=1183108
* https://bugzilla.suse.com/show_bug.cgi?id=1183110
* https://bugzilla.suse.com/show_bug.cgi?id=1188574
* https://bugzilla.suse.com/show_bug.cgi?id=1190229
* https://bugzilla.suse.com/show_bug.cgi?id=1194551
* https://bugzilla.suse.com/show_bug.cgi?id=1194552
1
0
openSUSE-SU-2024:0128-1: important: Security update for opera
by opensuse-securityďĽ opensuse.org 16 May '24
by opensuse-securityďĽ opensuse.org 16 May '24
16 May '24
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0128-1
Rating: important
References:
Cross-References: CVE-2024-3832 CVE-2024-3833 CVE-2024-3834
CVE-2024-3837 CVE-2024-3838 CVE-2024-3839
CVE-2024-3840 CVE-2024-3841 CVE-2024-3843
CVE-2024-3844 CVE-2024-3845 CVE-2024-3846
CVE-2024-3847 CVE-2024-3914
CVSS scores:
CVE-2024-3834 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-3837 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-3838 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2024-3839 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Affected Products:
openSUSE Leap 15.5:NonFree
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
- Update to 110.0.5130.23
* CHR-9706 Update Chromium on desktop-stable-124-5130 to 124.0.6367.62
* DNA-116450 Promote 110 to stable
- Complete Opera 110 changelog at:
https://blogs.opera.com/desktop/changelog-for-110/
- The update to chromium 124.0.6367.62 fixes following issues:
CVE-2024-3832, CVE-2024-3833, CVE-2024-3914, CVE-2024-3834,
CVE-2024-3837, CVE-2024-3838, CVE-2024-3839, CVE-2024-3840, CVE-2024-3841,
CVE-2024-3843, CVE-2024-3844, CVE-2024-3845, CVE-2024-3846, CVE-2024-3847
- Update to 109.0.5097.80
* DNA-115738 Crash at extensions::ExtensionRegistry::
GetExtensionById(std::__Cr::basic_string const&, int)
* DNA-115797 [Flow] Never ending loading while connecting to flow
* DNA-116315 Chat GPT in Sidebar Panel doesn’t work
- Update to 109.0.5097.59
* CHR-9416 Updating Chromium on desktop-stable-* branches
* DNA-115810 Enable #drag-multiple-tabs on all streams
- Update to 109.0.5097.45
* CHR-9416 Updating Chromium on desktop-stable-* branches
* DNA-114737 [Search box] It's getting blurred when click
on it, also lower corners are not rounded sometimes
* DNA-115042 '+' button is not responsive when 30+ tabs opened
* DNA-115326 Wrong fonts and padding after intake
* DNA-115392 [Badges] Text displayed in red
* DNA-115501 'Review your payment' native popup has wrong colors
* DNA-115809 Enable #show-duplicate-indicator-on-link on all streams
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.5:NonFree:
zypper in -t patch openSUSE-2024-128=1
Package List:
- openSUSE Leap 15.5:NonFree (x86_64):
opera-110.0.5130.23-lp155.3.45.1
References:
https://www.suse.com/security/cve/CVE-2024-3832.html
https://www.suse.com/security/cve/CVE-2024-3833.html
https://www.suse.com/security/cve/CVE-2024-3834.html
https://www.suse.com/security/cve/CVE-2024-3837.html
https://www.suse.com/security/cve/CVE-2024-3838.html
https://www.suse.com/security/cve/CVE-2024-3839.html
https://www.suse.com/security/cve/CVE-2024-3840.html
https://www.suse.com/security/cve/CVE-2024-3841.html
https://www.suse.com/security/cve/CVE-2024-3843.html
https://www.suse.com/security/cve/CVE-2024-3844.html
https://www.suse.com/security/cve/CVE-2024-3845.html
https://www.suse.com/security/cve/CVE-2024-3846.html
https://www.suse.com/security/cve/CVE-2024-3847.html
https://www.suse.com/security/cve/CVE-2024-3914.html
1
0
SUSE-SU-2024:1659-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 15 May '24
by OPENSUSE-SECURITY-UPDATES 15 May '24
15 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1659-1
Rating: important
References:
* bsc#1177529
* bsc#1192145
* bsc#1211592
* bsc#1217408
* bsc#1218562
* bsc#1218917
* bsc#1219104
* bsc#1219126
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220569
* bsc#1220761
* bsc#1220901
* bsc#1220915
* bsc#1220935
* bsc#1221042
* bsc#1221044
* bsc#1221080
* bsc#1221084
* bsc#1221088
* bsc#1221162
* bsc#1221299
* bsc#1221612
* bsc#1221617
* bsc#1221645
* bsc#1221791
* bsc#1221825
* bsc#1222011
* bsc#1222051
* bsc#1222247
* bsc#1222266
* bsc#1222294
* bsc#1222307
* bsc#1222357
* bsc#1222368
* bsc#1222379
* bsc#1222416
* bsc#1222422
* bsc#1222424
* bsc#1222427
* bsc#1222428
* bsc#1222430
* bsc#1222431
* bsc#1222435
* bsc#1222437
* bsc#1222445
* bsc#1222449
* bsc#1222482
* bsc#1222503
* bsc#1222520
* bsc#1222536
* bsc#1222549
* bsc#1222550
* bsc#1222557
* bsc#1222559
* bsc#1222585
* bsc#1222586
* bsc#1222596
* bsc#1222609
* bsc#1222610
* bsc#1222613
* bsc#1222615
* bsc#1222618
* bsc#1222624
* bsc#1222630
* bsc#1222632
* bsc#1222660
* bsc#1222662
* bsc#1222664
* bsc#1222666
* bsc#1222669
* bsc#1222671
* bsc#1222677
* bsc#1222678
* bsc#1222680
* bsc#1222703
* bsc#1222704
* bsc#1222706
* bsc#1222709
* bsc#1222710
* bsc#1222720
* bsc#1222721
* bsc#1222724
* bsc#1222726
* bsc#1222727
* bsc#1222764
* bsc#1222772
* bsc#1222773
* bsc#1222776
* bsc#1222781
* bsc#1222784
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222796
* bsc#1222798
* bsc#1222801
* bsc#1222812
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1222968
* bsc#1223012
* bsc#1223014
* bsc#1223016
* bsc#1223024
* bsc#1223030
* bsc#1223033
* bsc#1223034
* bsc#1223035
* bsc#1223036
* bsc#1223037
* bsc#1223041
* bsc#1223042
* bsc#1223051
* bsc#1223052
* bsc#1223056
* bsc#1223057
* bsc#1223058
* bsc#1223060
* bsc#1223061
* bsc#1223065
* bsc#1223066
* bsc#1223067
* bsc#1223068
* bsc#1223076
* bsc#1223078
* bsc#1223111
* bsc#1223115
* bsc#1223118
* bsc#1223187
* bsc#1223189
* bsc#1223190
* bsc#1223191
* bsc#1223196
* bsc#1223197
* bsc#1223198
* bsc#1223275
* bsc#1223323
* bsc#1223369
* bsc#1223380
* bsc#1223473
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223478
* bsc#1223479
* bsc#1223481
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223490
* bsc#1223496
* bsc#1223498
* bsc#1223499
* bsc#1223501
* bsc#1223502
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223511
* bsc#1223512
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223520
* bsc#1223522
* bsc#1223523
* bsc#1223525
* bsc#1223539
* bsc#1223574
* bsc#1223595
* bsc#1223598
* bsc#1223634
* bsc#1223643
* bsc#1223644
* bsc#1223645
* bsc#1223646
* bsc#1223648
* bsc#1223655
* bsc#1223657
* bsc#1223660
* bsc#1223661
* bsc#1223663
* bsc#1223664
* bsc#1223668
* bsc#1223686
* bsc#1223693
* bsc#1223705
* bsc#1223714
* bsc#1223735
* bsc#1223745
* bsc#1223784
* bsc#1223785
* bsc#1223790
* bsc#1223816
* bsc#1223821
* bsc#1223822
* bsc#1223824
* bsc#1223827
* bsc#1223834
* bsc#1223875
* bsc#1223876
* bsc#1223877
* bsc#1223878
* bsc#1223879
* bsc#1223894
* bsc#1223921
* bsc#1223922
* bsc#1223923
* bsc#1223924
* bsc#1223929
* bsc#1223931
* bsc#1223932
* bsc#1223934
* bsc#1223941
* bsc#1223948
* bsc#1223949
* bsc#1223950
* bsc#1223951
* bsc#1223952
* bsc#1223953
* bsc#1223956
* bsc#1223957
* bsc#1223960
* bsc#1223962
* bsc#1223963
* bsc#1223964
* jsc#PED-7167
* jsc#PED-7619
Cross-References:
* CVE-2021-47047
* CVE-2021-47181
* CVE-2021-47182
* CVE-2021-47183
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47189
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47214
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48632
* CVE-2022-48634
* CVE-2022-48636
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48639
* CVE-2022-48640
* CVE-2022-48642
* CVE-2022-48644
* CVE-2022-48646
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48652
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48658
* CVE-2022-48659
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2022-48671
* CVE-2022-48672
* CVE-2022-48673
* CVE-2022-48675
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48690
* CVE-2022-48692
* CVE-2022-48693
* CVE-2022-48694
* CVE-2022-48695
* CVE-2022-48697
* CVE-2022-48698
* CVE-2022-48700
* CVE-2022-48701
* CVE-2022-48702
* CVE-2022-48703
* CVE-2022-48704
* CVE-2023-2860
* CVE-2023-52488
* CVE-2023-52503
* CVE-2023-52561
* CVE-2023-52585
* CVE-2023-52589
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52593
* CVE-2023-52614
* CVE-2023-52616
* CVE-2023-52620
* CVE-2023-52627
* CVE-2023-52635
* CVE-2023-52636
* CVE-2023-52645
* CVE-2023-52652
* CVE-2023-6270
* CVE-2024-0639
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26656
* CVE-2024-26660
* CVE-2024-26671
* CVE-2024-26673
* CVE-2024-26675
* CVE-2024-26680
* CVE-2024-26681
* CVE-2024-26684
* CVE-2024-26685
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26696
* CVE-2024-26697
* CVE-2024-26702
* CVE-2024-26704
* CVE-2024-26718
* CVE-2024-26722
* CVE-2024-26727
* CVE-2024-26733
* CVE-2024-26736
* CVE-2024-26737
* CVE-2024-26739
* CVE-2024-26743
* CVE-2024-26744
* CVE-2024-26745
* CVE-2024-26747
* CVE-2024-26749
* CVE-2024-26751
* CVE-2024-26754
* CVE-2024-26760
* CVE-2024-26763
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26769
* CVE-2024-26771
* CVE-2024-26772
* CVE-2024-26773
* CVE-2024-26776
* CVE-2024-26779
* CVE-2024-26783
* CVE-2024-26787
* CVE-2024-26790
* CVE-2024-26792
* CVE-2024-26793
* CVE-2024-26798
* CVE-2024-26805
* CVE-2024-26807
* CVE-2024-26816
* CVE-2024-26817
* CVE-2024-26820
* CVE-2024-26825
* CVE-2024-26830
* CVE-2024-26833
* CVE-2024-26836
* CVE-2024-26843
* CVE-2024-26848
* CVE-2024-26852
* CVE-2024-26853
* CVE-2024-26855
* CVE-2024-26856
* CVE-2024-26857
* CVE-2024-26861
* CVE-2024-26862
* CVE-2024-26866
* CVE-2024-26872
* CVE-2024-26875
* CVE-2024-26878
* CVE-2024-26879
* CVE-2024-26881
* CVE-2024-26882
* CVE-2024-26883
* CVE-2024-26884
* CVE-2024-26885
* CVE-2024-26891
* CVE-2024-26893
* CVE-2024-26895
* CVE-2024-26896
* CVE-2024-26897
* CVE-2024-26898
* CVE-2024-26901
* CVE-2024-26903
* CVE-2024-26917
* CVE-2024-26927
* CVE-2024-26948
* CVE-2024-26950
* CVE-2024-26951
* CVE-2024-26955
* CVE-2024-26956
* CVE-2024-26960
* CVE-2024-26965
* CVE-2024-26966
* CVE-2024-26969
* CVE-2024-26970
* CVE-2024-26972
* CVE-2024-26981
* CVE-2024-26982
* CVE-2024-26993
* CVE-2024-27013
* CVE-2024-27014
* CVE-2024-27030
* CVE-2024-27038
* CVE-2024-27039
* CVE-2024-27041
* CVE-2024-27043
* CVE-2024-27046
* CVE-2024-27056
* CVE-2024-27062
* CVE-2024-27389
CVSS scores:
* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48642 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48659 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48698 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52503 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52561 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52585 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52589 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52593 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52614 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52620 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26737 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26743 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26745 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26747 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26820 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26848 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26875 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
An update that solves 218 vulnerabilities, contains two features and has 29
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case
(bsc#1222596).
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
* CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists
(bsc#1223822).
* CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure
(bsc#1223827).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in
amdgpu_dm_fini() (bsc#1223714).
* CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree()
(bsc#1223821).
* CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
* CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts
(bsc#1223790).
* CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS
(bsc#1223735).
* CVE-2024-27013: Fixed tun limit printing rate when illegal packet received
by tun device (bsc#1223745).
* CVE-2024-26993: Fixed fs/sysfs reference leak in
sysfs_break_active_protection() (bsc#1223693).
* CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value
of zero (bsc#1223634).
* CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table
arrays (bsc#1223644).
* CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table
arrays (bsc#1223645).
* CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table
arrays (bsc#1223646).
* CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table
arrays (bsc#1223648).
* CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
swapoff() (bsc#1223655).
* CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead
instead of empty list (bsc#1223660).
* CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead
of peer (bsc#1223661).
* CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in
dc_state_release (bsc#1223664).
* CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch
(bsc#1223525).
* CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent
kernel-infoleak (bsc#1223198).
* CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
* CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC
transport cleanup path (bsc#1223196).
* CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
(bsc#1223190).
* CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
(bsc#1223189).
* CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
(bsc#1223035).
* CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in
ip_tunnel_rcv() (bsc#1223034).
* CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08
devices (bsc#1223041).
* CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps
(bsc#1223066).
* CVE-2024-26878: Fixed quota for potential NULL pointer dereference
(bsc#1223060).
* CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant
spi_controller_put call (bsc#1223024).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-26861: Fixed wireguard/receive annotate data-race around
receiving_counter.counter (bsc#1223076).
* CVE-2024-26857: Fixed geneve to make sure to pull inner header in
geneve_rx() (bsc#1223058).
* CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry
(bsc#1223052).
* CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).
* CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT
(bsc#1223061).
* CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
ip6_route_mpath_notify() (bsc#1223057).
* CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
* CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for
workstations (bsc#1222968).
* CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
administratively set MAC (bsc#1223012).
* CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid
integer overflow (bsc#1222812).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM
hooks (bsc#1222801).
* CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in
netlink (bsc#1222630).
* CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink()
in gtp (bsc#1222428).
* CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a
wrong zone index (bsc#1222615).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group
in ext4_mb_find_by_goal() (bsc#1222613).
* CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine
ti edma (bsc#1222610)
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on
device in dm-crypt (bsc#1222720).
* CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in
gtp_genl_dump_pdp() in gtp (bsc#1222632).
* CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table
(bsc#1222724).
* CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid
parameter in rdma/srpt (bsc#1222449).
* CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in
rdma/qedr (bsc#1222677).
* CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free
and bpf_timer_cancel (bsc#1222557).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already
gets read (bsc#1222536).
* CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len
in ext4 (bsc#1222422).
* CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers()
(bsc#1222549).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write
(bsc#1222437).
* CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA
channels (bsc#1222445).
* CVE-2024-26681: Fixed netdevsim to avoid potential loop in
nsim_dev_trap_report_work() (bsc#1222431).
* CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring
(bsc#1222427).
* CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
* CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization
(bsc#1222368).
* CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
* CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder
creation (bsc#1222266).
* CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device()
(bsc#1223686).
* CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
(bsc#1223033).
* CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in
msgr2 (bsc#1222247).
* CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop]
(bsc#1222294).
* CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace
(bsc#1222051).
* CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous
sets never used from userspace (bsc#1221825).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show
(bsc#1221617).
* CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in
wfx_set_mfp_ap() (bsc#1221042).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
renaming (bsc#1221088).
* CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
* CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in
amdgpu_ras_query_error_status_helper() (bsc#1221080).
* CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash
memory region (bsc#1220935).
* CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in
amdtee_close_session (bsc#1220915).
* CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap
functions for FIFO (bsc#1221162).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails
(bsc#1223498).
* CVE-2022-48658: Fixed mm/slub to avoid a problem in
flush_cpu_slab()/__free_slab() task context (bsc#1223496).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at
nf_tables_addchain() (bsc#1223478).
* CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in
bond_rr_gen_slave_id (bsc#1223499).
* CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries
== 0 and eh_depth > 0 (bsc#1223475).
* CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in
hugetlb_mcopy_atomic_pte() (bsc#1222710).
* CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
(bsc#1222878)
* CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within
drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
* CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).
* CVE-2021-47189: Fixed denial of service due to memory ordering issues
between normal and ordered work functions in btrfs (bsc#1222706).
* CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer
(bsc#1222669).
* CVE-2021-47183: Fixed a null pointer dereference during link down processing
in scsi lpfc (bsc#1192145, bsc#1222664).
* CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling
(bsc#1222662).
* CVE-2021-47181: Fixed a null pointer dereference caused by calling
platform_get_resource() (bsc#1222660).
The following non-security bugs were fixed:
* ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block
counter (stable-fixes).
* ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
(stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
* ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
* ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
fixes).
* ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
* ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
* ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
* ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
* ASoC: meson: axg-card: make links nonatomic (git-fixes).
* ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
* ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
* ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
* ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
* ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
* Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
* Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
* Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
* Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
fixes).
* Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: add quirk for broken address properties (git-fixes).
* Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
fixes).
* Bluetooth: btintel: Fixe build regression (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
fixes).
* Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
* Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).
* Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
* Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
* HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
(git-fixes).
* HID: logitech-dj: allow mice to use all types of reports (git-fixes).
* HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
* Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails
(stable-fixes).
* NFC: trf7970a: disable all regulators on removal (git-fixes).
* NFS: avoid spurious warning of lost lock that is being unlocked
(bsc#1221791).
* PCI/AER: Block runtime suspend when handling errors (git-fixes).
* PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
* PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
* PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).
* PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).
* PCI: Drop pci_device_remove() test of pci_dev->driver (git-fixes).
* PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
ltc#205888).
* RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
* RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
* RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
* Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
* Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default"
(stable-fixes).
* Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
* Revert "ice: Fix ice VF reset during iavf initialization (jsc#PED-376)."
(bsc#1223275)
* Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
* Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
* USB: UAS: return ENODEV when submit urbs fail with device not attached
(stable-fixes).
* USB: serial: add device ID for VeriFone adapter (stable-fixes).
* USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
* USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
fixes).
* USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
fixes).
* USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
* USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
* USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
* USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
fixes).
* USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
* USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
* USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
* ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
* ahci: asm1064: correct count of reported ports (stable-fixes).
* arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
* arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
* arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
fixes)
* arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
* arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
* arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
* ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
* batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
* bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent
(git-fixes).
* bcache: Remove dead references to cache_readaheads (git-fixes).
* bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
* bcache: add code comments for bch_btree_node_get() and
__bch_btree_node_alloc() (git-fixes).
* bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).
* bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
* bcache: bset: Fix comment typos (git-fixes).
* bcache: check return value from btree_node_alloc_replacement() (git-fixes).
* bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
* bcache: fix error info in register_bcache() (git-fixes).
* bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing
(git-fixes).
* bcache: fixup btree_cache_wait list damage (git-fixes).
* bcache: fixup init dirty data errors (git-fixes).
* bcache: fixup lock c->root error (git-fixes).
* bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-
fixes).
* bcache: move calc_cached_dev_sectors to proper place on backing device
detach (git-fixes).
* bcache: move uapi header bcache.h to bcache code directory (git-fixes).
* bcache: prevent potential division by zero error (git-fixes).
* bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device
registration' (git-fixes).
* bcache: remove redundant assignment to variable cur_idx (git-fixes).
* bcache: remove the backing_dev_name field from struct cached_dev (git-
fixes).
* bcache: remove the cache_dev_name field from struct cache (git-fixes).
* bcache: remove unnecessary flush_workqueue (git-fixes).
* bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-
fixes).
* bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in
btree_gc_coalesce() (git-fixes).
* bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
* bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
* bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
* bcache: use bvec_kmap_local in bio_csum (git-fixes).
* bcache: use default_groups in kobj_type (git-fixes).
* bcache:: fix repeated words in comments (git-fixes).
* ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
* ceph: switch to corrected encoding of max_xattr_size in mdsmap
(bsc#1223067).
* clk: Get runtime PM before walking tree during disable_unused (git-fixes).
* clk: Initialize struct clk_core kref earlier (stable-fixes).
* clk: Mark 'all_lists' as const (stable-fixes).
* clk: Print an info line before disabling unused clocks (stable-fixes).
* clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
* clk: remove extra empty line (stable-fixes).
* comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
* dm cache policy smq: ensure IO does not prevent cleaner policy progress
(git-fixes).
* dm cache: add cond_resched() to various workqueue loops (git-fixes).
* dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-
fixes).
* dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
* dm crypt: avoid accessing uninitialized tasklet (git-fixes).
* dm flakey: do not corrupt the zero page (git-fixes).
* dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
* dm flakey: fix a crash with invalid table line (git-fixes).
* dm flakey: fix logic when corrupting a bio (git-fixes).
* dm init: add dm-mod.waitfor to wait for asynchronously probed block devices
(git-fixes).
* dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path
(git-fixes).
* dm integrity: fix out-of-range warning (git-fixes).
* dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-
fixes).
* dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
* dm raid: fix false positive for requeue needed during reshape (git-fixes).
* dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-
fixes).
* dm stats: check for and propagate alloc_percpu failure (git-fixes).
* dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-
fixes).
* dm thin metadata: check fail_io before using data_sm (git-fixes).
* dm thin: add cond_resched() to various workqueue loops (git-fixes).
* dm thin: fix deadlock when swapping to thin device (bsc#1177529).
* dm verity: do not perform FEC for failed readahead IO (git-fixes).
* dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
* dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).
* dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
* dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata()
(git-fixes).
* dm-raid: fix lockdep waring in "pers->hot_add_disk" (git-fixes).
* dm-verity, dm-crypt: align "struct bvec_iter" correctly (git-fixes).
* dm-verity: align struct dm_verity_fec_io properly (git-fixes).
* dm: add cond_resched() to dm_wq_work() (git-fixes).
* dm: call the resume method on internal suspend (git-fixes).
* dm: do not lock fs when the map is NULL during suspend or resume (git-
fixes).
* dm: do not lock fs when the map is NULL in process of resume (git-fixes).
* dm: remove flush_scheduled_work() during local_exit() (git-fixes).
* dm: send just one event on resize, not two (git-fixes).
* dma: xilinx_dpdma: Fix locking (git-fixes).
* dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
* dmaengine: owl: fix register access functions (git-fixes).
* dmaengine: tegra186: Fix residual calculation (git-fixes).
* docs: Document the FAN_FS_ERROR event (stable-fixes).
* drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
* drm/amd/display: Do not recursively call manual trigger programming (stable-
fixes).
* drm/amd/display: Fix nanosec stat overflow (stable-fixes).
* drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
* drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
* drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
* drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
* drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
* drm/amdgpu: always force full reset for SOC21 (stable-fixes).
* drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
* drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
* drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
* drm/amdgpu: validate the parameters of bo mapping operations more clearly
(git-fixes).
* drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
* drm/ast: Fix soft lockup (git-fixes).
* drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
fixes).
* drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
fixes).
* drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
* drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
* drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
* drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
* drm/panel: ili9341: Respect deferred probe (git-fixes).
* drm/panel: ili9341: Use predefined error codes (git-fixes).
* drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
* drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
* drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
* drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
* drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
* drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
* drm: nv04: Fix out of bounds access (git-fixes).
* drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-
fixes).
* dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
* fbdev: fix incorrect address computation in deferred IO (git-fixes).
* fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
* fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
fixes).
* fix build warning
* fuse: do not unhash root (bsc#1223951).
* fuse: fix root lookup with nonzero generation (bsc#1223950).
* hwmon: (amc6821) add of_match table (stable-fixes).
* i2c: pxa: hide unused icr_bits[] variable (git-fixes).
* i2c: smbus: fix NULL function pointer dereference (git-fixes).
* i40e: Fix VF MAC filter removal (git-fixes).
* idma64: Do not try to serve interrupts when device is powered off (git-
fixes).
* iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
* iio:imu: adis16475: Fix sync mode setting (git-fixes).
* init/main.c: Fix potential static_command_line memory overflow (git-fixes).
* iommu/amd: Add a length limitation for the ivrs_acpihid command-line
parameter (git-fixes).
* iommu/amd: Fix "Guest Virtual APIC Table Root Pointer" configuration in IRTE
(git-fixes).
* iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
* iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
* iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
* iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
* iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
* iommu/iova: Fix alloc iova overflows issue (git-fixes).
* iommu/mediatek: Flush IOTLB completely only if domain has been attached
(git-fixes).
* iommu/rockchip: Fix unwind goto issue (git-fixes).
* iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
* iommu/vt-d: Allocate local memory for page request queue (git-fixes).
* iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
* iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
* iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
* ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
* kABI: Adjust trace_iterator.wait_index (git-fixes).
* kprobes: Fix double free of kretprobe_holder (bsc#1220901).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return
value (git-fixes).
* libnvdimm/region: Allow setting align attribute on regions without mappings
(git-fixes).
* livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).
* md/raid1: fix choose next idle in read_balance() (git-fixes).
* md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
* md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-
fixes).
* media: cec: core: remove length check of Timer Status (stable-fixes).
* media: sta2x11: fix irq handler cast (stable-fixes).
* mei: me: add arrow lake point H DID (stable-fixes).
* mei: me: add arrow lake point S DID (stable-fixes).
* mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
* mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
* mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
* mtd: diskonchip: work around ubsan link failure (stable-fixes).
* nd_btt: Make BTT lanes preemptible (git-fixes).
* net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
* net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
* net: fix skb leak in __skb_tstamp_tx() (git-fixes).
* net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
* net: mld: fix reference count leak in mld_{query | report}_work() (git-
fixes).
* net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
* net: usb: ax88179_178a: avoid the interface always configured as random
address (git-fixes).
* net: usb: ax88179_178a: avoid writing the mac address before first reading
(git-fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net: vlan: fix underflow for the real_dev refcnt (git-fixes).
* netfilter: br_netfilter: Drop dst references before setting (git-fixes).
* netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-
fixes).
* netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
fixes).
* nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
bsc#1217408).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nouveau: fix function cast warning (git-fixes).
* nouveau: fix instmem race condition around ptr stores (git-fixes).
* nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-
fixes).
* nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
* nvdimm: Fix badblocks clear off-by-one error (git-fixes).
* nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
* nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
* nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-
fixes).
* pci_iounmap(): Fix MMIO mapping leak (git-fixes).
* phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
* pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).
* platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi
Vi8 tablet (stable-fixes).
* powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).
* powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE
(bsc#1222011 ltc#205900).
* powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369
ltc#205888).
* powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc: Refactor verification of MSR_RI (bsc#1223191).
* printk: Add this_cpu_in_panic() (bsc#1223574).
* printk: Adjust mapping for 32bit seq macros (bsc#1223574).
* printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
* printk: Disable passing console lock owner completely during panic()
(bsc#1223574).
* printk: Drop console_sem during panic (bsc#1223574).
* printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
(bsc#1223574).
* printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
* printk: Wait for all reserved records with pr_flush() (bsc#1223574).
* printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
* printk: ringbuffer: Clarify special lpos values (bsc#1223574).
* printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
* printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
(bsc#1223574).
* printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
* printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
* pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
* ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
* ring-buffer: Fix full_waiters_pending in poll (git-fixes).
* ring-buffer: Fix resetting of shortest_full (git-fixes).
* ring-buffer: Fix waking up ring buffer readers (git-fixes).
* ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
* ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-
fixes).
* ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent
environment (git-fixes).
* s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
* s390/decompressor: fix misaligned symbol build error (git-fixes
bsc#1223785).
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223878).
* s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
* s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
* s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223876).
* s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
* s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223595).
* serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
* serial: core: Provide port lock wrappers (stable-fixes).
* serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
* serial: mxs-auart: add spinlock around changing cts state (git-fixes).
* slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
* speakup: Avoid crash on very long word (git-fixes).
* speakup: Fix 8bit characters from direct synth (git-fixes).
* tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
* thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
* thunderbolt: Fix wake configurations after device unplug (stable-fixes).
* tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
fixes).
* tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
* tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
* tracing: Remove precision vsnprintf() check from print event (git-fixes).
* tracing: Show size of requested perf buffer (git-fixes).
* tracing: Use .flush() call to wake up readers (git-fixes).
* usb: Disable USB3 LPM at shutdown (stable-fixes).
* usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
device (git-fixes).
* usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
* usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
* usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
fixes).
* usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error (stable-fixes).
* usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
* usb: ohci: Prevent missed ohci interrupts (git-fixes).
* usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).
* usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
* usb: typec: tcpm: Check for port partner validity before consuming it (git-
fixes).
* usb: typec: tcpm: unregister existing source caps before re-registration
(bsc#1220569).
* usb: typec: ucsi: Ack unsupported commands (stable-fixes).
* usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
* usb: typec: ucsi: Fix connector check on init (git-fixes).
* usb: udc: remove warning when queue disabled ep (stable-fixes).
* vdpa/mlx5: Allow CVQ size changes (git-fixes).
* virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
* wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
* wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
fixes).
* wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
* wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
fixes).
* wifi: nl80211: do not free NULL coalescing rule (git-fixes).
* x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
fixes).
* x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
(jsc#PED-7167 git-fixes).
* x86/sev: Skip ROM range scans and validation for SEV-SNP guests
(jsc#PED-7167 git-fixes).
* x86/xen: Add some null pointer checking to smp.c (git-fixes).
* x86/xen: add CPU dependencies for 32-bit build (git-fixes).
* x86/xen: fix percpu vcpu_info allocation (git-fixes).
* xen-netback: properly sync TX responses (git-fixes).
* xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
* xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-
fixes).
* xen/xenbus: document will_handle argument for xenbus_watch_path() (git-
fixes).
* xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1659=1 openSUSE-SLE-15.5-2024-1659=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1659=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1659=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1659=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-1659=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-1659=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-1659=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1659=1
## Package List:
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (noarch)
* kernel-devel-5.14.21-150500.55.62.2
* kernel-macros-5.14.21-150500.55.62.2
* kernel-source-vanilla-5.14.21-150500.55.62.2
* kernel-docs-html-5.14.21-150500.55.62.2
* kernel-source-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (ppc64le x86_64)
* kernel-debug-debugsource-5.14.21-150500.55.62.2
* kernel-debug-devel-5.14.21-150500.55.62.2
* kernel-debug-devel-debuginfo-5.14.21-150500.55.62.2
* kernel-debug-debuginfo-5.14.21-150500.55.62.2
* kernel-debug-livepatch-devel-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (x86_64)
* kernel-debug-vdso-5.14.21-150500.55.62.2
* kernel-default-vdso-5.14.21-150500.55.62.2
* kernel-kvmsmall-vdso-5.14.21-150500.55.62.2
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.62.2
* kernel-default-vdso-debuginfo-5.14.21-150500.55.62.2
* kernel-debug-vdso-debuginfo-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.62.2
* kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
* kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2
* kernel-kvmsmall-debugsource-5.14.21-150500.55.62.2
* kernel-kvmsmall-devel-5.14.21-150500.55.62.2
* kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-5.14.21-150500.55.62.2
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-livepatch-devel-5.14.21-150500.55.62.2
* kernel-default-optional-5.14.21-150500.55.62.2
* kernel-default-optional-debuginfo-5.14.21-150500.55.62.2
* dlm-kmp-default-5.14.21-150500.55.62.2
* kernel-default-devel-debuginfo-5.14.21-150500.55.62.2
* dlm-kmp-default-debuginfo-5.14.21-150500.55.62.2
* reiserfs-kmp-default-5.14.21-150500.55.62.2
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.62.2
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-extra-debuginfo-5.14.21-150500.55.62.2
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.62.2
* ocfs2-kmp-default-5.14.21-150500.55.62.2
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.62.2
* kernel-obs-build-debugsource-5.14.21-150500.55.62.2
* cluster-md-kmp-default-5.14.21-150500.55.62.2
* kernel-obs-qa-5.14.21-150500.55.62.1
* gfs2-kmp-default-5.14.21-150500.55.62.2
* kernel-default-livepatch-5.14.21-150500.55.62.2
* kernel-syms-5.14.21-150500.55.62.1
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* kselftests-kmp-default-5.14.21-150500.55.62.2
* kernel-default-extra-5.14.21-150500.55.62.2
* kernel-default-devel-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-1-150500.11.3.2
* kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-1-150500.11.3.2
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.62.2
* kernel-zfcpdump-debugsource-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.62.1
* openSUSE Leap 15.5 (aarch64)
* dtb-apple-5.14.21-150500.55.62.1
* dtb-socionext-5.14.21-150500.55.62.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.62.2
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.62.2
* kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.62.2
* dtb-xilinx-5.14.21-150500.55.62.1
* dtb-mediatek-5.14.21-150500.55.62.1
* dtb-amlogic-5.14.21-150500.55.62.1
* dtb-lg-5.14.21-150500.55.62.1
* dtb-hisilicon-5.14.21-150500.55.62.1
* gfs2-kmp-64kb-5.14.21-150500.55.62.2
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.62.2
* dtb-renesas-5.14.21-150500.55.62.1
* dtb-sprd-5.14.21-150500.55.62.1
* dtb-qcom-5.14.21-150500.55.62.1
* kernel-64kb-extra-5.14.21-150500.55.62.2
* dtb-apm-5.14.21-150500.55.62.1
* dlm-kmp-64kb-5.14.21-150500.55.62.2
* kernel-64kb-devel-5.14.21-150500.55.62.2
* ocfs2-kmp-64kb-5.14.21-150500.55.62.2
* kselftests-kmp-64kb-5.14.21-150500.55.62.2
* kernel-64kb-debugsource-5.14.21-150500.55.62.2
* reiserfs-kmp-64kb-5.14.21-150500.55.62.2
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.62.2
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.62.2
* dtb-amazon-5.14.21-150500.55.62.1
* dtb-allwinner-5.14.21-150500.55.62.1
* dtb-exynos-5.14.21-150500.55.62.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.62.2
* dtb-freescale-5.14.21-150500.55.62.1
* dtb-nvidia-5.14.21-150500.55.62.1
* dtb-rockchip-5.14.21-150500.55.62.1
* dtb-arm-5.14.21-150500.55.62.1
* dtb-cavium-5.14.21-150500.55.62.1
* dtb-broadcom-5.14.21-150500.55.62.1
* dtb-amd-5.14.21-150500.55.62.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.62.2
* kernel-64kb-optional-5.14.21-150500.55.62.2
* dtb-altera-5.14.21-150500.55.62.1
* cluster-md-kmp-64kb-5.14.21-150500.55.62.2
* dtb-marvell-5.14.21-150500.55.62.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.62.2
* kernel-64kb-debuginfo-5.14.21-150500.55.62.2
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.62.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150500.55.62.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.62.2
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.62.2
* kernel-64kb-debuginfo-5.14.21-150500.55.62.2
* kernel-64kb-debugsource-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-devel-debuginfo-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* kernel-default-devel-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (noarch)
* kernel-devel-5.14.21-150500.55.62.2
* kernel-macros-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.62.2
* Basesystem Module 15-SP5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.62.2
* kernel-zfcpdump-debugsource-5.14.21-150500.55.62.2
* Development Tools Module 15-SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.62.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-5.14.21-150500.55.62.2
* kernel-syms-5.14.21-150500.55.62.1
* kernel-obs-build-debugsource-5.14.21-150500.55.62.2
* Development Tools Module 15-SP5 (noarch)
* kernel-source-5.14.21-150500.55.62.2
* Legacy Module 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.62.2
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* reiserfs-kmp-default-5.14.21-150500.55.62.2
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.62.2
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.62.2
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2
* kernel-default-livepatch-5.14.21-150500.55.62.2
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-1-150500.11.3.2
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-1-150500.11.3.2
* kernel-default-livepatch-devel-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-5.14.21-150500.55.62.2
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.62.2
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.62.2
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.62.2
* gfs2-kmp-default-5.14.21-150500.55.62.2
* dlm-kmp-default-5.14.21-150500.55.62.2
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* ocfs2-kmp-default-5.14.21-150500.55.62.2
* dlm-kmp-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.62.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.62.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.62.2
* kernel-default-debugsource-5.14.21-150500.55.62.2
* kernel-default-extra-debuginfo-5.14.21-150500.55.62.2
* kernel-default-extra-5.14.21-150500.55.62.2
## References:
* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47181.html
* https://www.suse.com/security/cve/CVE-2021-47182.html
* https://www.suse.com/security/cve/CVE-2021-47183.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47189.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47214.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48632.html
* https://www.suse.com/security/cve/CVE-2022-48634.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48639.html
* https://www.suse.com/security/cve/CVE-2022-48640.html
* https://www.suse.com/security/cve/CVE-2022-48642.html
* https://www.suse.com/security/cve/CVE-2022-48644.html
* https://www.suse.com/security/cve/CVE-2022-48646.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48652.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48658.html
* https://www.suse.com/security/cve/CVE-2022-48659.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2022-48671.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48675.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48690.html
* https://www.suse.com/security/cve/CVE-2022-48692.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48694.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48698.html
* https://www.suse.com/security/cve/CVE-2022-48700.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2022-48703.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-52488.html
* https://www.suse.com/security/cve/CVE-2023-52503.html
* https://www.suse.com/security/cve/CVE-2023-52561.html
* https://www.suse.com/security/cve/CVE-2023-52585.html
* https://www.suse.com/security/cve/CVE-2023-52589.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52593.html
* https://www.suse.com/security/cve/CVE-2023-52614.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52620.html
* https://www.suse.com/security/cve/CVE-2023-52627.html
* https://www.suse.com/security/cve/CVE-2023-52635.html
* https://www.suse.com/security/cve/CVE-2023-52636.html
* https://www.suse.com/security/cve/CVE-2023-52645.html
* https://www.suse.com/security/cve/CVE-2023-52652.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26656.html
* https://www.suse.com/security/cve/CVE-2024-26660.html
* https://www.suse.com/security/cve/CVE-2024-26671.html
* https://www.suse.com/security/cve/CVE-2024-26673.html
* https://www.suse.com/security/cve/CVE-2024-26675.html
* https://www.suse.com/security/cve/CVE-2024-26680.html
* https://www.suse.com/security/cve/CVE-2024-26681.html
* https://www.suse.com/security/cve/CVE-2024-26684.html
* https://www.suse.com/security/cve/CVE-2024-26685.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26696.html
* https://www.suse.com/security/cve/CVE-2024-26697.html
* https://www.suse.com/security/cve/CVE-2024-26702.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26718.html
* https://www.suse.com/security/cve/CVE-2024-26722.html
* https://www.suse.com/security/cve/CVE-2024-26727.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26736.html
* https://www.suse.com/security/cve/CVE-2024-26737.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26743.html
* https://www.suse.com/security/cve/CVE-2024-26744.html
* https://www.suse.com/security/cve/CVE-2024-26745.html
* https://www.suse.com/security/cve/CVE-2024-26747.html
* https://www.suse.com/security/cve/CVE-2024-26749.html
* https://www.suse.com/security/cve/CVE-2024-26751.html
* https://www.suse.com/security/cve/CVE-2024-26754.html
* https://www.suse.com/security/cve/CVE-2024-26760.html
* https://www.suse.com/security/cve/CVE-2024-26763.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26769.html
* https://www.suse.com/security/cve/CVE-2024-26771.html
* https://www.suse.com/security/cve/CVE-2024-26772.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26776.html
* https://www.suse.com/security/cve/CVE-2024-26779.html
* https://www.suse.com/security/cve/CVE-2024-26783.html
* https://www.suse.com/security/cve/CVE-2024-26787.html
* https://www.suse.com/security/cve/CVE-2024-26790.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26793.html
* https://www.suse.com/security/cve/CVE-2024-26798.html
* https://www.suse.com/security/cve/CVE-2024-26805.html
* https://www.suse.com/security/cve/CVE-2024-26807.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26817.html
* https://www.suse.com/security/cve/CVE-2024-26820.html
* https://www.suse.com/security/cve/CVE-2024-26825.html
* https://www.suse.com/security/cve/CVE-2024-26830.html
* https://www.suse.com/security/cve/CVE-2024-26833.html
* https://www.suse.com/security/cve/CVE-2024-26836.html
* https://www.suse.com/security/cve/CVE-2024-26843.html
* https://www.suse.com/security/cve/CVE-2024-26848.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26853.html
* https://www.suse.com/security/cve/CVE-2024-26855.html
* https://www.suse.com/security/cve/CVE-2024-26856.html
* https://www.suse.com/security/cve/CVE-2024-26857.html
* https://www.suse.com/security/cve/CVE-2024-26861.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26866.html
* https://www.suse.com/security/cve/CVE-2024-26872.html
* https://www.suse.com/security/cve/CVE-2024-26875.html
* https://www.suse.com/security/cve/CVE-2024-26878.html
* https://www.suse.com/security/cve/CVE-2024-26879.html
* https://www.suse.com/security/cve/CVE-2024-26881.html
* https://www.suse.com/security/cve/CVE-2024-26882.html
* https://www.suse.com/security/cve/CVE-2024-26883.html
* https://www.suse.com/security/cve/CVE-2024-26884.html
* https://www.suse.com/security/cve/CVE-2024-26885.html
* https://www.suse.com/security/cve/CVE-2024-26891.html
* https://www.suse.com/security/cve/CVE-2024-26893.html
* https://www.suse.com/security/cve/CVE-2024-26895.html
* https://www.suse.com/security/cve/CVE-2024-26896.html
* https://www.suse.com/security/cve/CVE-2024-26897.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26901.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26917.html
* https://www.suse.com/security/cve/CVE-2024-26927.html
* https://www.suse.com/security/cve/CVE-2024-26948.html
* https://www.suse.com/security/cve/CVE-2024-26950.html
* https://www.suse.com/security/cve/CVE-2024-26951.html
* https://www.suse.com/security/cve/CVE-2024-26955.html
* https://www.suse.com/security/cve/CVE-2024-26956.html
* https://www.suse.com/security/cve/CVE-2024-26960.html
* https://www.suse.com/security/cve/CVE-2024-26965.html
* https://www.suse.com/security/cve/CVE-2024-26966.html
* https://www.suse.com/security/cve/CVE-2024-26969.html
* https://www.suse.com/security/cve/CVE-2024-26970.html
* https://www.suse.com/security/cve/CVE-2024-26972.html
* https://www.suse.com/security/cve/CVE-2024-26981.html
* https://www.suse.com/security/cve/CVE-2024-26982.html
* https://www.suse.com/security/cve/CVE-2024-26993.html
* https://www.suse.com/security/cve/CVE-2024-27013.html
* https://www.suse.com/security/cve/CVE-2024-27014.html
* https://www.suse.com/security/cve/CVE-2024-27030.html
* https://www.suse.com/security/cve/CVE-2024-27038.html
* https://www.suse.com/security/cve/CVE-2024-27039.html
* https://www.suse.com/security/cve/CVE-2024-27041.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27046.html
* https://www.suse.com/security/cve/CVE-2024-27056.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1177529
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1217408
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220569
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1220901
* https://bugzilla.suse.com/show_bug.cgi?id=1220915
* https://bugzilla.suse.com/show_bug.cgi?id=1220935
* https://bugzilla.suse.com/show_bug.cgi?id=1221042
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221080
* https://bugzilla.suse.com/show_bug.cgi?id=1221084
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221162
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221617
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221791
* https://bugzilla.suse.com/show_bug.cgi?id=1221825
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222051
* https://bugzilla.suse.com/show_bug.cgi?id=1222247
* https://bugzilla.suse.com/show_bug.cgi?id=1222266
* https://bugzilla.suse.com/show_bug.cgi?id=1222294
* https://bugzilla.suse.com/show_bug.cgi?id=1222307
* https://bugzilla.suse.com/show_bug.cgi?id=1222357
* https://bugzilla.suse.com/show_bug.cgi?id=1222368
* https://bugzilla.suse.com/show_bug.cgi?id=1222379
* https://bugzilla.suse.com/show_bug.cgi?id=1222416
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222424
* https://bugzilla.suse.com/show_bug.cgi?id=1222427
* https://bugzilla.suse.com/show_bug.cgi?id=1222428
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222431
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222437
* https://bugzilla.suse.com/show_bug.cgi?id=1222445
* https://bugzilla.suse.com/show_bug.cgi?id=1222449
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222520
* https://bugzilla.suse.com/show_bug.cgi?id=1222536
* https://bugzilla.suse.com/show_bug.cgi?id=1222549
* https://bugzilla.suse.com/show_bug.cgi?id=1222550
* https://bugzilla.suse.com/show_bug.cgi?id=1222557
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222586
* https://bugzilla.suse.com/show_bug.cgi?id=1222596
* https://bugzilla.suse.com/show_bug.cgi?id=1222609
* https://bugzilla.suse.com/show_bug.cgi?id=1222610
* https://bugzilla.suse.com/show_bug.cgi?id=1222613
* https://bugzilla.suse.com/show_bug.cgi?id=1222615
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222630
* https://bugzilla.suse.com/show_bug.cgi?id=1222632
* https://bugzilla.suse.com/show_bug.cgi?id=1222660
* https://bugzilla.suse.com/show_bug.cgi?id=1222662
* https://bugzilla.suse.com/show_bug.cgi?id=1222664
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222677
* https://bugzilla.suse.com/show_bug.cgi?id=1222678
* https://bugzilla.suse.com/show_bug.cgi?id=1222680
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222706
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222710
* https://bugzilla.suse.com/show_bug.cgi?id=1222720
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222724
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222727
* https://bugzilla.suse.com/show_bug.cgi?id=1222764
* https://bugzilla.suse.com/show_bug.cgi?id=1222772
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222781
* https://bugzilla.suse.com/show_bug.cgi?id=1222784
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222798
* https://bugzilla.suse.com/show_bug.cgi?id=1222801
* https://bugzilla.suse.com/show_bug.cgi?id=1222812
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1222968
* https://bugzilla.suse.com/show_bug.cgi?id=1223012
* https://bugzilla.suse.com/show_bug.cgi?id=1223014
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223024
* https://bugzilla.suse.com/show_bug.cgi?id=1223030
* https://bugzilla.suse.com/show_bug.cgi?id=1223033
* https://bugzilla.suse.com/show_bug.cgi?id=1223034
* https://bugzilla.suse.com/show_bug.cgi?id=1223035
* https://bugzilla.suse.com/show_bug.cgi?id=1223036
* https://bugzilla.suse.com/show_bug.cgi?id=1223037
* https://bugzilla.suse.com/show_bug.cgi?id=1223041
* https://bugzilla.suse.com/show_bug.cgi?id=1223042
* https://bugzilla.suse.com/show_bug.cgi?id=1223051
* https://bugzilla.suse.com/show_bug.cgi?id=1223052
* https://bugzilla.suse.com/show_bug.cgi?id=1223056
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223058
* https://bugzilla.suse.com/show_bug.cgi?id=1223060
* https://bugzilla.suse.com/show_bug.cgi?id=1223061
* https://bugzilla.suse.com/show_bug.cgi?id=1223065
* https://bugzilla.suse.com/show_bug.cgi?id=1223066
* https://bugzilla.suse.com/show_bug.cgi?id=1223067
* https://bugzilla.suse.com/show_bug.cgi?id=1223068
* https://bugzilla.suse.com/show_bug.cgi?id=1223076
* https://bugzilla.suse.com/show_bug.cgi?id=1223078
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223115
* https://bugzilla.suse.com/show_bug.cgi?id=1223118
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223189
* https://bugzilla.suse.com/show_bug.cgi?id=1223190
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223196
* https://bugzilla.suse.com/show_bug.cgi?id=1223197
* https://bugzilla.suse.com/show_bug.cgi?id=1223198
* https://bugzilla.suse.com/show_bug.cgi?id=1223275
* https://bugzilla.suse.com/show_bug.cgi?id=1223323
* https://bugzilla.suse.com/show_bug.cgi?id=1223369
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223473
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223478
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223481
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223490
* https://bugzilla.suse.com/show_bug.cgi?id=1223496
* https://bugzilla.suse.com/show_bug.cgi?id=1223498
* https://bugzilla.suse.com/show_bug.cgi?id=1223499
* https://bugzilla.suse.com/show_bug.cgi?id=1223501
* https://bugzilla.suse.com/show_bug.cgi?id=1223502
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223511
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223520
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223525
* https://bugzilla.suse.com/show_bug.cgi?id=1223539
* https://bugzilla.suse.com/show_bug.cgi?id=1223574
* https://bugzilla.suse.com/show_bug.cgi?id=1223595
* https://bugzilla.suse.com/show_bug.cgi?id=1223598
* https://bugzilla.suse.com/show_bug.cgi?id=1223634
* https://bugzilla.suse.com/show_bug.cgi?id=1223643
* https://bugzilla.suse.com/show_bug.cgi?id=1223644
* https://bugzilla.suse.com/show_bug.cgi?id=1223645
* https://bugzilla.suse.com/show_bug.cgi?id=1223646
* https://bugzilla.suse.com/show_bug.cgi?id=1223648
* https://bugzilla.suse.com/show_bug.cgi?id=1223655
* https://bugzilla.suse.com/show_bug.cgi?id=1223657
* https://bugzilla.suse.com/show_bug.cgi?id=1223660
* https://bugzilla.suse.com/show_bug.cgi?id=1223661
* https://bugzilla.suse.com/show_bug.cgi?id=1223663
* https://bugzilla.suse.com/show_bug.cgi?id=1223664
* https://bugzilla.suse.com/show_bug.cgi?id=1223668
* https://bugzilla.suse.com/show_bug.cgi?id=1223686
* https://bugzilla.suse.com/show_bug.cgi?id=1223693
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223714
* https://bugzilla.suse.com/show_bug.cgi?id=1223735
* https://bugzilla.suse.com/show_bug.cgi?id=1223745
* https://bugzilla.suse.com/show_bug.cgi?id=1223784
* https://bugzilla.suse.com/show_bug.cgi?id=1223785
* https://bugzilla.suse.com/show_bug.cgi?id=1223790
* https://bugzilla.suse.com/show_bug.cgi?id=1223816
* https://bugzilla.suse.com/show_bug.cgi?id=1223821
* https://bugzilla.suse.com/show_bug.cgi?id=1223822
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223827
* https://bugzilla.suse.com/show_bug.cgi?id=1223834
* https://bugzilla.suse.com/show_bug.cgi?id=1223875
* https://bugzilla.suse.com/show_bug.cgi?id=1223876
* https://bugzilla.suse.com/show_bug.cgi?id=1223877
* https://bugzilla.suse.com/show_bug.cgi?id=1223878
* https://bugzilla.suse.com/show_bug.cgi?id=1223879
* https://bugzilla.suse.com/show_bug.cgi?id=1223894
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223924
* https://bugzilla.suse.com/show_bug.cgi?id=1223929
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223949
* https://bugzilla.suse.com/show_bug.cgi?id=1223950
* https://bugzilla.suse.com/show_bug.cgi?id=1223951
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223956
* https://bugzilla.suse.com/show_bug.cgi?id=1223957
* https://bugzilla.suse.com/show_bug.cgi?id=1223960
* https://bugzilla.suse.com/show_bug.cgi?id=1223962
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
* https://bugzilla.suse.com/show_bug.cgi?id=1223964
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-7619
1
0
SUSE-SU-2024:1639-1: important: Security update for python-arcomplete, python-Fabric, python-PyGithub, python-antlr4-python3-runtime, python-avro, python-chardet, python-distro, python-docker, python-fakeredis, python-fixedint, pyth
by OPENSUSE-SECURITY-UPDATES 14 May '24
by OPENSUSE-SECURITY-UPDATES 14 May '24
14 May '24
# Security update for python-arcomplete, python-Fabric, python-PyGithub, python-
antlr4-python3-runtime, python-avro, python-chardet, python-distro, python-
docker, python-fakeredis, python-fixedint, pyth
Announcement ID: SUSE-SU-2024:1639-1
Rating: important
References:
* bsc#1209571
* bsc#1209811
* bsc#1209812
* bsc#1216606
* bsc#1222880
* bsc#761162
Cross-References:
* CVE-2023-28858
* CVE-2023-28859
CVSS scores:
* CVE-2023-28858 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-28858 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-28859 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-28859 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities and has four security fixes can now be
installed.
## Description:
This update for python-argcomplete, python-Fabric, python-PyGithub, python-
antlr4-python3-runtime, python-avro, python-chardet, python-distro, python-
docker, python-fakeredis, python-fixedint, python-httplib2, python-httpretty,
python-javaproperties, python-jsondiff, python-knack, python-marshmallow,
python-opencensus, python-opencensus-context, python-opencensus-ext-threading,
python-opentelemetry-api, python-opentelemetry-sdk, python-opentelemetry-
semantic-conventions, python-opentelemetry-test-utils, python-pycomposefile,
python-pydash, python-redis, python-retrying, python-semver, python-sshtunnel,
python-strictyaml, python-sure, python-vcrpy, python-xmltodict contains the
following fixes:
Changes in python-argcomplete \- Update to 3.3.0 (bsc#1222880): * Preserve
compatibility with argparse option tuples of length 4. This update is required
to use argcomplete on Python 3.11.9+ or 3.12.3+. \- update to 3.2.3: * Allow
register-python-argcomplete output to be used as lazy-loaded zsh completion
module (#475) \- Move debug_stream initialization to helper method to allow fd 9
behavior to be overridden in subclasses (#471)
* update to 3.2.2:
* Expand tilde in zsh
* Remove coverage check
* Fix zsh test failures: avoid coloring terminal
* update to 3.2.1:
* Allow explicit zsh global completion activation (#467)
* Fix and test global completion in zsh (#463, #466)
* Add –yes option to activate-global-python-argcomplete (#461)
* Test suite improvements
* drop without_zsh.patch: obsolete
* update to 3.1.6:
* Respect user choice in activate-global-python-argcomplete
* Escape colon in zsh completions. Fixes #456
* Call _default as a fallback in zsh global completion
* update to 3.1.4:
* Call _default as a fallback in zsh global completion
* zsh: Allow to use external script (#453)
* Add support for Python 3.12 and drop EOL 3.6 and 3.7 (#449)
* Use homebrew prefix by default
* zsh: Allow to use external script (#453)
Changes in python-Fabric: \- Update to 3.2.2 \- add fix-test-deps.patch to
remove vendored dependencies *[Bug]: fabric.runners.Remote failed to properly
deregister its SIGWINCH signal handler on shutdown; in rare situations this
could cause tracebacks when the Python process receives SIGWINCH while no remote
session is active. This has been fixed. * [Bug] #2204: The signal handling
functionality added in Fabric 2.6 caused unrecoverable tracebacks when invoked
from inside a thread (such as the use of fabric.group.ThreadingGroup) under
certain interpreter versions. This has been fixed by simply refusing to register
signal handlers when not in the main thread. Thanks to Francesco Giordano and
others for the reports. * [Bug]: Neglected to actually add deprecated to our
runtime dependency specification (it was still in our development dependencies).
This has been fixed. * [Feature]: Enhanced fabric.testing in ways large and
small: Backwards-compatibly merged the functionality of MockSFTP into MockRemote
(may be opted-into by instantiating the latter with enable_sftp=True) so you can
mock out both SSH and SFTP functionality in the same test, which was previously
impossible. It also means you can use this in a Pytest autouse fixture to
prevent any tests from accidentally hitting the network! A new pytest fixture,
remote_with_sftp, has been added which leverages the previous bullet point (an
all-in-one fixture suitable for, eg, preventing any incidental ssh/sftp attempts
during test execution). A pile of documentation and test enhancements (yes,
testing our testing helpers is a thing). * [Support]: Added a new runtime
dependency on the Deprecated library. * [Support]: Language update: applied
s/sanity/safety/g to the codebase (with the few actual API members using the
term now marked deprecated & new ones added in the meantime, mostly in
fabric.testing). * [Feature]: Add a new CLI flag to fab, fab --list-agent-keys,
which will attempt to connect to your local SSH agent and print a key list,
similarly to ssh-add -l. This is mostly useful for expectations-checking Fabric
and Paramiko’s agent functionality, or for situations where you might not have
ssh-add handy. * [Feature]: Implement opt-in support for Paramiko 3.2’s
AuthStrategy machinery, as follows: Added a new module and class,
fabric.auth.OpenSSHAuthStrategy, which leverages aforementioned new Paramiko
functionality to marry loaded SSH config files with Fabric-level and runtime-
level parameters, arriving at what should be OpenSSH-client-compatible
authentication behavior. See its API docs for details. Added new configuration
settings: authentication.strategy_class, which defaults to None, but can be set
to OpenSSHAuthStrategy to opt-in to the new behavior. authentication.identities,
which defaults to the empty list, and can be a list of private key paths for use
by the new strategy class. * [Bug] #2263: Explicitly add our dependency on
decorator to setup.py instead of using Invoke’s old, now removed, vendored copy
of same. This allows Fabric to happily use Invoke 2.1 and above
* Update to 3.0.1
* [Bug] #2241: A typo prevented Fabric’s command runner from properly calling
its superclass stop() method, which in tandem with a related Invoke bug
meant messy or long shutdowns in many scenarios.
* Changes from 3.0.0
* [Feature]: Change the default configuration value for inline_ssh_env from
False to True, to better align with the practicalities of common SSH server
configurations.
* Warning This change is backwards incompatible if you were using environment-variable-setting kwargs or config settings, such as Connection.run(command, env={'SOME': 'ENV VARS'}), and were not already explicitly specifying the value of inline_ssh_env.
* [Bug] #1981: (fixed in #2195) Automatically close any open SFTP session
during fabric.connection.Connection.close; this avoids issues encountered
upon re-opening a previously-closed connection object.
* [Support]: Drop support for Python <3.6, including Python 2.
* Warning This is a backwards incompatible change if you are not yet on Python 3.6 or above; however, pip shouldn’t offer you this version of Fabric as long as your pip version understands python_requires metadata.
* Drop remove-mock.patch because now in upstream.
* Drop remove-pathlib2.patch because now in upstream.
* Add %{?sle15_python_module_pythons}
* Remove conditional definition of python_module.
* Add patch remove-pathlib2.patch:
* Drop install_requires on pathlib2.
* Update to 2.7.1:
* [Bug] #1924: (also #2007) Overhaul behavior and testing re: merging together
different sources for the key_filename parameter in
Connection.connect_kwargs. This fixes a number of type-related errors
(string objects have no extend attribute, cannot add lists to strings, etc).
* Update to 2.7.0:
* Add ~fabric.connection.Connection.shell, a belated port of the v1
open_shell() feature.
* Forward local terminal resizes to the remote end, when applicable. (For the
technical: this means we now turn SIGWINCH into SSH window-change messages.)
* Update ~fabric.connection.Connection temporarily so that it doesn't
incidentally apply replace_env=True to local shell commands, only remote
ones.
* Add patch remove-mock.patch:
* Use unittest.mock, instead of mock
* pytest-relaxed now supports pytest 6, so test on all python versions.
* Don't test on python310 -- gh#bitprophet/pytest-relaxed#12 (This is mainly
required by azure-cli in the primary python3 flavor)
* Update to 2.6.0:
* [Feature] #1999: Add sudo support to Group. Thanks to Bonnie Hardin for the
report and to Winston Nolan for an early patchset.
* [Feature] #1810: Add put/get support to Group.
* [Feature] #1868: Ported a feature from v1: interpolating the local path
argument in Transfer.get with connection and remote filepath attributes. For
example, cxn.get(remote="/var/log/foo.log", local="{host}/") is now feasible
for storing a file in per-host-named directories or files, and in fact
Group.get does this by default.
* [Feature]: When the local path argument to Transfer.get contains nonexistent
directories, they are now created instead of raising an error. Warning: This
change introduces a new runtime dependency: pathlib2.
* [Bug]: Fix a handful of issues in the handling and mocking of SFTP local
paths and os.path members within fabric.testing; this should remove some
occasional “useless Mocks” as well as hewing closer to the real behavior of
things like os.path.abspath re: path normalization.
* Update Requires from setup.py
Changes in python-PyGithub: \- Switch package to modern Python Stack on SLE-15
\+ Add %{?sle15_python_module_pythons} \+ Drop %{?!python_module:%define
python_module() python-%{ **} python3-%{** }} \+ Drop %define skip_python2 1
* Update to 1.57 Breaking Changes
* Add support for Python 3.11, drop support for Python 3.6 (#2332) (1e2f10d)
Bug Fixes & Improvements
* Speed up get requested reviewers and teams for pr (#2349) (6725ece)
* [WorkflowRun] - Add missing attributes (run_started_at & run_attempt),
remove deprecated unicode type (#2273) (3a6235b)
* Add support for repository autolink references (#2016) (0fadd6b)
* Add retry and pool_size to typing (#2151) (784a3ef)
* Fix/types for repo topic team (#2341) (db9337a)
* Add class Artifact (#2313) (#2319) (437ff84)
* Update to 1.56 This is the last release that will support Python 3.6. *Bug
Fixes & Improvements Create repo from template (#2090) (b50283a) Improve
signature of Repository.create_repo (#2118) (001970d) Add support for
'visibility' attribute preview for Repositories (#1872) (8d1397a) Add
Repository.rename_branch method (#2089) (6452ddf) Add function to delete
pending reviews on a pull request (#1897) (c8a945b) Cover all code paths in
search_commits (#2087) (f1faf94) Correctly deal when PaginatedList's data is
a dict (#2084) (93b92cd) Add two_factor_authentication in AuthenticatedUser.
(#1972) (4f00cbf) Add ProjectCard.edit() to the type stub (#2080) (d417e4c)
Add method to delete Workflow runs (#2078) (b1c8eec) Implement
organization.cancel_invitation() (#2072) (53fb498) Feat: Add html_url
property in Team Class. (#1983) (6570892) Add support for Python 3.10
(#2073) (aa694f8) Add github actions secrets to org (#2006) (bc5e595)
Correct replay for Organization.create_project() test (#2075) (fcc1236) Fix
install command example (#2043) (99e00a2) Fix: #1671 Convert Python Bool to
API Parameter for Authenticated User Notifications (#2001) (1da600a) Do not
transform requestHeaders when logging (#1965) (1265747) Add type to
OrderedDict (#1954) (ed7d0fe) Add Commit.get_pulls() to pyi (#1958)
(b466470) Adding headers in GithubException is a breaking change (#1931)
(d1644e3)
* Update to 1.55:
* Remove client_id/client_secret authentication (#1888) (901af8c8)
* Adjust to Github API changes regarding emails (#1890) (2c77cfad)
* This impacts what AuthenticatedUser.get_emails() returns
* Export headers in GithubException (#1887) (ddd437a7)
* Do not import from unpackaged paths in typing (#1926) (27ba7838)
* Implement hash for CompletableGithubObject (#1922) (4faff23c)
* Use right variable in both get_check_runs() (#1889) (3003e065)
* fix bad assertions in github.Project.edit (#1817) (6bae9e5c)
* Add support for deleting repository secrets (#1868) (696793de)
* Adding github actions secrets (#1681) (c90c050e)
* Drop support for Python 3.5 (#1770) (63e4fae9)
* Fix stubs file for Repository (fab682a5)
* The Github.get_installation(integer) method has been removed.
* Repository.create_deployment()'s payload parameter is now a dictionary.
* Add support for Check Suites (#1764) (6d501b28)
* Add missing preview features of Deployment and Deployment Statuses API
* Add Support for Check Runs (#1727) (c77c0676)
* Add WorkflowRun.workflow_id (#1737) (78a29a7c)
* Added support for the Self-Hosted actions runners API (#1684) (24251f4b)
* Fix Branch protection status in the examples (#1729) (88800844)
* Filter the DeprecationWarning in Team tests (#1728) (23f47539)
* Added get_installations() to Organizations (#1695) (b42fb244)
* Fix #1507: Add new Teams: Add or update team repository endpoint
* Added support for `Repository.get_workflow_runs` parameters
* feat(pullrequest): add the rebaseable attribute (#1690) (ee4c7a7e)
* Add support for deleting reactions (#1708) (f7d203c0)
* Add get_timeline() to Issue's type stubs (#1663) (6bc9ecc8)
* Update to 1.53:
* Add method get_team_membership for user to Team (#1658) (749e8d35)
* PaginatedList's totalCount is 0 if no last page (#1641) (69b37b4a)
* Add initial support for Github Apps. (#1631) (260558c1)
* Add delete_branch_on_merge arg to Repository.edit type stub (#1639)
(15b5ae0c)
* upload_asset with data in memory (#1601) (a7786393)
* Make Issue.closed_by nullable (#1629) (06dae387)
* Add support for workflow dispatch event (#1625) (16850ef1)
* Do not check reaction_type before sending (#1592) (136a3e80)
* more flexible header splitting (#1616) (85e71361)
* Add support for deployment statuses (#1588) (048c8a1d)
* Adds the 'twitter_username' attribute to NamedUser. (#1585) (079f75a7)
* Add support for Workflow Runs (#1583) (4fb1d23f)
* Small documentation correction in Repository.py (#1565) (f0f6ec83)
* Remove "api_preview" parameter from type stubs and docstrings (#1559)
(cc1b884c)
* Repository.update_file() content also accepts bytes (#1543) (9fb8588b)
* Fix Repository.get_issues stub (#1540) (b40b75f8)
* Check all arguments of NamedUser.get_repos() (#1532) (69bfc325)
* Remove RateLimit.rate (#1529) (7abf6004)
* PullRequestReview is not a completable object (#1528) (19fc43ab)
* Remove pointless setters in GitReleaseAsset (#1527) (1dd1cf9c)
* Drop some unimplemented methods in GitRef (#1525) (d4b61311)
* Fixed formatting of docstrings for `Repository.create_git_tag_and_release()`
and `StatsPunchCard`. (#1520) (ce400bc7)
* Remove Repository.topics (#1505) (53d58d2b)
* Correct Repository.get_workflows() (#1518) (8727003f)
* correct Repository.stargazers_count return type to int (#1513) (b5737d41)
* Raise a FutureWarning on use of client_{id,secret} (#1506) (2475fa66)
* Improve type signature for create_from_raw_data (#1503) (c7b5eff0)
* feat(column): move, edit and delete project columns (#1497) (a32a8965)
* Add support for Workflows (#1496) (a1ed7c0e)
* Add OAuth support for GitHub applications (4b437110)
* Create AccessToken entity (4a6468aa)
* Extend installation attributes (61808da1)
* Update to 1.51
* New features
* PyGithub now supports type checking
* Ability to retrieve public events
* Add and handle the maintainer_can_modify attribute in PullRequest
* List matching references
* Add create_repository_dispatch
* Add some Organization and Repository attributes.
* Add create project method
* Bug Fixes & Improvements
* Drop use of shadow-cat for draft PRs
* AuthenticatedUser.get_organization_membership() should be str
* Drop documentation for len() of PaginatedList
* Fix param name of projectcard's move function
* Correct typos found with codespell
* Export IncompletableObject in the github namespace
* Add GitHub Action workflow for checks
* Drop unneeded ignore rule for flake8
* Use pytest to parametrize tests
* Type stubs are now packaged with the build
* Get the project column by id
* Drop parametrized and pytest-cov from BuildRequires.
* Update to 1.47
* Bug Fixes & Improvements
* Add support to edit and delete a project (#1434) (f11f739)
* Add method for fetching pull requests associated with a commit (#1433) (0c55381)
* Add "get_repo_permission" to Team class (#1416) (219bde5)
* Add list projects support, update tests (#1431) (e44d11d)
* Don't transform completely in PullRequest.*assignees (#1428) (b1c3549)
* Add create_project support, add tests (#1429) (bf62f75)
* Add draft attribute, update test (bd28524)
* Docstring for Repository.create_git_tag_and_release (#1425) (bfeacde)
* Create a tox docs environment (#1426) (b30c09a)
* Add Deployments API (#1424) (3d93ee1)
* Add support for editing project cards (#1418) (425280c)
* Add draft flag parameter, update tests (bd0211e)
* Switch to using pytest (#1423) (c822dd1)
* Fix GitMembership with a hammer (#1420) (f2939eb)
* Add support to reply to a Pull request comment (#1374) (1c82573)
* PullRequest.update_branch(): allow expected_head_sha to be empty (#1412) (806130e)
* Implement ProjectCard.delete() (#1417) (aeb27b7)
* Add pre-commit plugin for black/isort/flake8 (#1398) (08b1c47)
* Add tox (#1388) (125536f)
* Open file in text mode in scripts/add_attribute.py (#1396) (0396a49)
* Silence most ResourceWarnings (#1393) (dd31a70)
* Assert more attributes in Membership (#1391) (d6dee01)
* Assert on changed Repository attributes (#1390) (6e3ceb1)
* Add reset to the repr for Rate (#1389) (0829af8)
* Update to 1.46
* Bug Fixes & Improvements
* Add repo edit support for delete_branch_on_merge
* Fix mistake in Repository.create_fork()
* Correct two attributes in Invitation
* Search repo issues by string label
* Correct Repository.create_git_tag_and_release()
* exposed seats and filled_seats for Github Organization Plan
* Repository.create_project() body is optional
* Implement move action for ProjectCard
* Tidy up ProjectCard.get_content()
* Added nested teams and parent
* Correct parameter for Label.edit
* doc: example of Pull Request creation
* Fix PyPI wheel deployment
* No longer build Python 2 package
* Drop BuildRequires on mock, no longer required
* Drop no-hardcoded-dep.patch, no longer required
* Update to 1.45:
* Breaking Changes
* Branch.edit_{user,team} _push_restrictions() have been removed The new API is: Branch.add_ {user,team} _push_restrictions() to add new members Branch.replace_ {user,team} _push_restrictions() to replace all members Branch.remove_ {user,team}_push_restrictions() to remove members
* The api_preview parameter to Github() has been removed.
* Bug Fixes & Improvements
* Allow sha=None for InputGitTreeElement
* Support github timeline events.
* Add support for update branch
* Refactor Logging tests
* Fix rtd build
* Apply black to whole codebase
* Fix class used returning pull request comments
* Support for create_fork
* Use Repository.get_contents() in tests
* Allow GithubObject.update() to be passed headers
* Correct URL for assignees on PRs
* Use inclusive ordered comparison for 'parameterized' requirement
* Deprecate Repository.get_dir_contents()
* Apply some polish to manage.sh
* Refresh no-hardcoded-dep.patch
* Add patch to not pull in hardcoded dependencies:
* no-hardcoded-dep.patch
* Update to 1.44.1:
* Too many changes to enumerate.
* Drop PyGithub-drop-network-tests.patch, the test in question no longer
requires network access.
* Drop fix-httpretty-dep.patch, the httpretty requirement has been relaxed
upstream.
* Use %python_expand to run the test suite, it works fine on Python 3 now.
* Add mock and parameterized to BuildRequires, the test suite requires them.
* Update to 1.43.8:
* Add two factor attributes on organizations (#1132) (a073168)
* Add Repository methods for pending invitations (#1159) (57af1e0)
* Adds get_issue_events to PullRequest object (#1154) (acd515a)
* Add invitee and inviter to Invitation (#1156) (0f2beac)
* Adding support for pending team invitations (#993) (edab176)
* Add support for custom base_url in GithubIntegration class (#1093) (6cd0d64)
* GithubIntegration: enable getting installation (#1135) (1818704)
* Add sorting capability to Organization.get_repos() (#1139) (ef6f009)
* Add new Organization.get_team_by_slug method (#1144) (4349bca)
* Add description field when creating a new team (#1125) (4a37860)
* Handle a path of / in Repository.get_contents() (#1070) (102c820)
* Add issue lock/unlock (#1107) (ec7bbcf)
* Fix bug in recursive repository contents example (#1166) (8b6b450)
* Allow name to be specified for upload_asset (#1151) (8d2a6b5)
* Fixes #1106 for GitHub Enterprise API (#1110) (5406579)
* Update to 1.43.7:
* Exclude tests from PyPI distribution (#1031) (78d283b9)
* Add codecov badge (#1090) (4c0b54c0)
* Update to 1.43.6:
* New features o Add support for Python 3.7 (#1028) (6faa00ac) o Adding HTTP
retry functionality via urllib3 (#1002) (5ae7af55) o Add new dismiss()
method on PullRequestReview (#1053) (8ef71b1b) o Add since and before to
get_notifications (#1074) (7ee6c417) o Add url parameter to include
anonymous contributors in get_contributors (#1075) (293846be) o Provide
option to extend expiration of jwt token (#1068) (86a9d8e9)
* Bug Fixes & Improvements o Fix the default parameter for
PullRequest.create_review (#1058) (118def30) o Fix get_access_token (#1042)
(6a89eb64) o Fix Organization.add_to_members role passing (#1039) (480f91cf)
* Deprecation o Remove Status API (6efd6318)
* Add patch fix-httpretty-dep.patch Changes in python-antlr4-python3-runtime:
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Drop %{?!python_module:%define python_module() python-%{ **} python3-%{** }}
* Drop %define skip_python2 1
* Drop support for older Python 3.x versions
* fix build for python 3.12
* require setuptools
* Update to version 4.13.1 csharp target
* [CSharp] Fix for #4386 -- change signatures for
ReportAttemptingFullContext() and ReportContextSensitivity() to be identical
to all other targets (target:csharp, type:cleanup) go target
* Move GetText(), SetText(), and String() from CommonToken to BaseToken
(target:go, type:cleanup)
* Restore "Obtained from string" source name. (target:go, type:cleanup)
* fix: Fix very minor code issues spotted by goreportcard.com (target:go,
type:cleanup) java target
* Java: suppress this-escape warning introduced in JDK 21. (actions,
target:java) javascript target
* Adds default targets for babel configuration (target:javascript)
* fix dependabot warnings (target:javascript, type:cleanup) swift target
* [SWIFT] Add Antlr4Dynamic product (target:swift)
* Cleanup duplicate SwiftTarget code (target:swift, type:cleanup) dart target
* [Dart] Fix for #4320--export additional types (type:bug, target:dart)
* from version 4.13.0 Issues fixed
* antlr4 jar doubled in size in 4.9.3 (unicode, comp:performance)
* Go: exponentially bad/absymal performance as of ... (type:bug, target:go)
* Go runtime panic (type:bug, target:go) Improvements, features
* Update LexerATNSimulator.cs with virtual Consume (type:improvement,
target:csharp)
* Feature/fixembedding (type:improvement, target:go, comp:performance)
* Provide Javascript port of TokenStreamRewriter (type:feature,
target:javascript, target:typescript)
* from version 4.12.0 Issues fixed
* github actions now fail for python2 and ubuntu clang and ubuntu swift
(comp:runtime, comp:build, comp:testing)
* js mergeArrays output differs from java (atn-analysis, target:javascript)
* C++ target fails Performance/DropLoopEntryBranchInLRRule_4.txt (atn-
analysis, type:bug, target:cpp)
* Wrong grammarFileName in generated code (code-gen, type:bug)
* C++ crashes on new test ParserExec/ListLabelsOnRuleRefStartOfAlt.txt (atn-
analysis, type:bug, target:cpp)
* [JavaScript runtime] Bad field name, bad comments (type:bug) Improvements,
features
* Fully qualify std::move invocations to fix -Wunqualified-std-cast-call
(type:improvement, target:cpp)
* Extract FileUtils updates by @ericvergnaud (type:improvement, cross-
platform-issue, comp:testing)
* Extract unit test updates by @ericvergnaud needed for TypeScript
(type:improvement, comp:testing)
* [Go target] Fix for #3926: Add accessors for tree navigation to interfaces
in generated parser (trees-contexts, code-gen, type:improvement, target:go)
* GitHub Workflows security hardening (actions, type:improvement,
comp:testing)
* from version 4.11.1
* Just fixes 4.11.0 release issue. I forgot to change runtime tool version so
it didn't say SNAPSHOT.
* from version 4.11.0 Issues fixed
* Disable failing CI tests in master (comp:build, comp:testing)
* Create accessor for Go-based IntervalSet.intervals (target:go)
* Grammar Name Conflict Golang with SPARQL issue (target:go, type:cleanup)
* Dependency declaration error in ANTLR 4.10.1 (comp:build)
* Drop old version of Visual Studio C++ (2013, 2015, 2017) (comp:build,
target:cpp)
* Circular grammar inclusion causes stack overflow in the tool. (comp:tool,
type:bug)
* Cpp, Go, JavaScript, Python2/3: Template rendering error. (code-gen,
comp:runtime, target:java, target:javascript, target:python2,
target:python3, target:go) Improvements, features
* Augment error message during testing to include full cause of problem.
(type:improvement, comp:testing)
* Include swift & tool verification in CI workflow (type:improvement,
comp:build, cross-platform-issue, target:swift)
* Issue #3783: CI Check Builds (type:improvement, comp:build, cross-platform-
issue, comp:testing)
* Parallel lock free testing, remove potential deadlocks, cache static data,
go to descriptor via test (comp:runtime, type:improvement, comp:testing)
* update getting-started doc (type:improvement, comp:doc)
* Getting Started has error (type:improvement, comp:doc)
* new nuget directory for building ANTLR4 C++ runtime as 3 Nuget packages
(type:improvement, comp:build, target:cpp)
* Add interp tool like TestRig (comp:tool, type:feature)
* Issue 3720: Java 2 Security issue (type:improvement, target:java)
* Cpp: Disable warnings for external project (type:bug, type:improvement,
target:cpp)
* Fix Docker README for arm OS user (type:improvement, comp:doc)
* from version 4.10.1
* [C++] Remove reference to antlrcpp:s2ws
* Update publishing instruction for Dart
* from version 4.10.0 Issues fixed
* C++ runtime: Version identifier macro ? (target:cpp, type:cleanup)
* Generating XPath lexer/parser (actions, type:bug)
* do we need this C++ ATN serialization? (target:cpp, type:cleanup)
* Incorrect type of token with number 0xFFFF because of incorrect ATN
serialization (atn-analysis, type:bug)
* Clean up ATN serialization: rm UUID and shifting by value of 2 (atn-
analysis, type:cleanup)
* The parseFile method of the InterpreterDataReader class is missing code:
"line = br.readLine();" (type:bug, target:java)
* antlr.runtime.standard 4.9.3 invalid strong name. (type:bug, comp:build,
target:csharp)
* Serialized ATN data element 810567 element 11 out of range 0..65535 (atn-
analysis, type:cleanup)
* Go target, unable to check when custom error strategy is in recovery mode
(target:go)
* Escape issue for characeters (grammars, type:bug)
* antlr4 java.lang.NullPointerException Antlr 4 4.8 (grammars, comp:tool,
type:bug)
* UnsupportedOperationException while generating code for large grammars.
(atn-analysis, type:cleanup)
* Add a more understandable message than "Serialized ATN data element ....
element ... out of range 0..65535" (atn-analysis, type:cleanup)
* avoid java.lang.StackOverflowError (lexers, error-handling)
* Getting this error: Exception in thread "main"
java.lang.UnsupportedOperationException: Serialized ATN data element out of
range (atn-analysis, type:cleanup) Improvements, features
* Updated getting started with Cpp documentation. (type:improvement, comp:doc)
* Escape bad words during grammar generation (code-gen, type:improvement)
* Implement caseInsensitive option (lexers, options, type:improvement)
* Some tool bugfixes (error-handling, comp:tool, type:improvement,
type:cleanup)
* Run testsuite using the tests/run.py script instead of %pyunittest
* Switch build systemd from setuptools to pyproject.toml
* Update BuildRequires from pyproject.toml
* Update filename pattern in %files section
* Update to version 4.9.3 Issues fixed
* Swift Target Crashes with Multi-Threading
* JavaScript Runtime bug
* Go target, cannot use superClass for the lexer grammar!
* Python runtime is inconsistent with Java
* FunctionDef source extract using getText()
* Provide .NET Framework target in the csharp nuget package
* Go target for Antlr tool, type ",int8" => "int8"
* Flutter/Dart web support
* Allow Antlr Javascript runtime to be loaded into Kindle Touch
* Fix Go test suite
* Weird error Improvements, features
* [C++] Use faster alternative to dynamic_cast when not testing inherit
* Stackoverflow after upgrading from 4.6 to 4.7
* from version 4.9.2 Issues fixed
* CSharp and Java produce different results for identical input, identical
tokens Improvements, features
* Moved away from travis-ci.com
* Source upstream tarball from Github since PyPi tarball no longer ships
testsuite
* Update to version 4.9.1.
* Improve python3 performance by adding slots
* Fix incorrect python token string templates
* Add testing.
* Skip python2 because this is for python3.
* Use python_alternative Changes in python-avro:
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Drop %define skip_python2 1
* Update to version 1.11.3:
* See jira board for all the fixes addressed in this release:
https://issues.apache.org/jira/browse/AVRO-3855?jql=project%3DAVRO%20AND%20…
* Drop py311.patch: fixed upstream.
* Add py311.patch to make tests compatible with python 3.11
gh#apache/avro#1961
* Update to 1.11.1 (from GitHub release notes):
* Avro specification
* Clarify which names are allowed to be qualified with namespaces
* Inconsistent behaviour on types as invalid names
* Clarify how fullnames are created, with example
* IDL: add syntax to create optional fields
* Improve docs for logical type annotation
* Python
* Scale assignment optimization
* "Scale" property from decimal object
* Byte reading in avro.io does not assert bytes read
* validate the default value of an enum field
* Pass LogicalType to BytesDecimalSchema
* Website
* Website refactor
* Document IDL support in IDEs Changes in python-chardet:
* update to 5.2.0:
* Adds support for running chardet CLI via `python -m chardet`
Changes in python-distro: \- Switch to autosetup macro.
* update to 1.9.0:
* Refactor distro.info() method to return an InfoDict [#360]
* Ignore the file '/etc/board-release' [#353]
* Ignore the file '/etc/ec2_version' [#359]
* Test on modern versions of CPython and PyPy and macOS [#362]
* Add support for ALT Linux Server 10.1 distribution [#354]
* Add Debian Testing to the tests [#356]
* Update archlinux resource for tests [#352]
* Remove duplicate files calling %fdupes
* add sle15_python_module_pythons
* update to 1.8.0:
* Lowered `LinuxDistribution._distro_release_info` method complexity [#327]
* Added official support for Buildroot distribution [#329]
* Added official support for Guix distribution [#330]
* Added support for `/etc/debian_version` [#333] & [#349]
* Fixed a typography in CONTRIBUTING.md [#340]
* Improved README.md "Usage" code block [#343]
* Bumped black to v22.3.0 in pre-commit.ci configuration [#331]
* Enabled GitHub Dependabot to keep GitHub Actions up to date [#335]
* remove shebang from distro.py
* update to version 1.7.0:
* BACKWARD COMPATIBILITY:
* Dropped support for EOL Pythons 2.7, 3.4 and 3.5 [#281]
* Dropped support for LSB and `uname` back-ends when `--root-dir` is specified
[#311]
* Moved `distro.py` to `src/distro/distro.py` [#315]
* ENHANCEMENTS:
* Documented that `distro.version()` can return an empty string on rolling
releases [#312]
* Documented support for Python 3.10 [#316]
* Added official support for Rocky Linux distribution [#318]
* Added a shebang to `distro.py` to allow standalone execution [#313]
* Added support for AIX platforms [#311]
* Added compliance for PEP-561 [#315]
* BUG FIXES:
* Fixed `include_uname` parameter oversight [#305]
* Fixed crash when `uname -rs` output is empty [#304]
* Fixed Amazon Linux identifier in `distro.id()` documentation [#318]
* Fixed OpenSuse >= 15 support [#319]
* Fixed encoding issues when opening distro release files [#324]
* Fixed `linux_distribution` regression introduced in [#230] [#325]
* Tests: Set locale to UTF-8 to fix tests on Leap 15.3.
* Expliciting setting of locale is not necessary anymore (gh#python-
distro/distro#223).
* Update to version 1.6.0
* Deprecated the distro.linux_distribution() function. Use distro.id(),
distro.version() and distro.name() instead [#296]
* Deprecated Python 2.7, 3.4 and 3.5 support. Further releases will only
support Python 3.6+
* Added type hints to distro module [#269]
* Added **version** for checking distro version [#292]
* Added support for arbitrary rootfs via the root_dir parameter [#247]
* Added the --root-dir option to CLI [#161]
* Added fallback to /usr/lib/os-release when /etc/os-release isn't available
[#262]
* Fixed subprocess.CalledProcessError when running lsb_release [#261]
* Ignore /etc/iredmail-release file while parsing distribution [#268]
* Use a binary file for /dev/null to avoid TextIOWrapper overhead [#271]
* use %pytest macro
* Enable tests properly (this is pytest, not unittest), Changes in python-
docker:
* update to 7.0.0:
* Removed SSL version (`ssl_version`) and explicit hostname check
(`assert_hostname`) options (#3185)
* Python 3.7+ supports TLSv1.3 by default
* Websocket support is no longer included by default (#3123)
* Use `pip install docker[websockets]` to include `websocket- client`
dependency
* By default, `docker-py` hijacks the TCP connection and does not use
Websockets
* Websocket client is only required to use `attach_socket(container, ws=True)`
* Python 3.7 no longer supported (reached end-of-life June 2023) (#3187)
* Python 3.12 support (#3185)
* Full `networking_config` support for `containers.create()`
* Replaces `network_driver_opt` (added in 6.1.0)
* Add `health()` property to container that returns status (e.g. `unhealthy`)
* Add `pause` option to `container.commit()` (#3159)
* Add support for bind mount propagation (e.g. `rshared`, `private`)
* Add support for `filters`, `keep_storage`, and `all` in `prune_builds()` on
API v1.39+ (#3192)
* Consistently return `docker.errors.NotFound` on 404 responses
* Validate tag format before push (#3191)
* update to 6.1.3:
* Bugfixes
* Fix eventlet compatibility (#3132)
* update to 6.1.2:
* Bugfixes
* Fix for socket timeouts on long docker exec calls (#3125)
* Respect timeout param on Windows (#3112)
* update to 6.1.1:
* Upgrade Notes (6.1.x)
* Errors are no longer returned during client initialization if the credential helper cannot be found. A warning will be emitted instead, and an error is returned if the credential helper is used.
* Bugfixes
* Fix containers.stats() hanging with stream=True
* Correct return type in docs for containers.diff() method
* update to 6.1.0:
* Upgrade Notes
* Errors are no longer returned during client initialization if the credential helper cannot be found. A warning will be emitted instead, and an error is returned if the credential helper is used.
* Features
* Python 3.11 support
* Use poll() instead of select() on non-Windows platforms
* New API fields
* network_driver_opt on container run / create
* one-shot on container stats
* status on services list
* Bugfixes
* Support for requests 2.29.0+ and urllib3 2.x
* Do not strip characters from volume names
* Fix connection leak on container.exec_* operations
* Fix errors closing named pipes on Windows
* update to 6.0.1:
* Notice This version is not compatible with requests 2.29+ or urllib3 2.x.
Either add requests < 2.29 and urllib3 < 2 to your requirements or upgrade
to to the latest docker-py release.
* Bugfixes
* Fix for The pipe has been ended errors on Windows (#3056)
* Support floats for timestamps in Docker logs (since / until) (#3031)
* update to 6.0.0:
* Upgrade Notes
* Minimum supported Python version is 3.7+
* When installing with pip, the docker[tls] extra is deprecated and a no-op, use docker for same functionality (TLS support is always available now)
* Native Python SSH client (used by default / use_ssh_client=False) will now
* reject unknown host keys with paramiko.ssh_exception.SSHException
* Short IDs are now 12 characters instead of 10 characters (same as Docker CLI)
* Version metadata is now exposed as **version**
* Features
* Python 3.10 support
* Automatically negotiate most secure TLS version
* Add platform (e.g. linux/amd64, darwin/arm64) to container create & run
* Add support for GlobalJob and ReplicatedJobs for Swarm
* Add remove() method on Image
* Add force param to disable() on Plugin
* Bugfixes
* Fix install issues on Windows related to pywin32
* Do not accept unknown SSH host keys in native Python SSH mode
* Use 12 character short IDs for consistency with Docker CLI
* Ignore trailing whitespace in .dockerignore files
* Fix IPv6 host parsing when explicit port specified
* Fix ProxyCommand option for SSH connections
* Do not spawn extra subshell when launching external SSH client
* Improve exception semantics to preserve context
* Documentation improvements (formatting, examples, typos, missing params)
* Miscellaneous
* Upgrade dependencies in requirements.txt to latest versions
* Remove extraneous transitive dependencies
* Eliminate usages of deprecated functions/methods
* Test suite reliability improvements
* GitHub Actions workflows for linting, unit tests, integration tests, and publishing releases
* add sle15_python_module_pythons
* python-six is not required as well
* python-mock actually not required for build
* update to 5.0.3:
* Add cap_add and cap_drop parameters to service create and ContainerSpec
* Add templating parameter to config create
* Bump urllib3 to 1.26.5
* Bump requests to 2.26.0
* Remove support for Python 2.7
* Make Python 3.6 the minimum version supported
* Update to 4.4.4 From project changelog: 4.4.4 Bugfixes Remove
LD_LIBRARY_PATH and SSL_CERT_FILE environment variables when shelling out to
the ssh client 4.4.3 Features Add support for
docker.types.Placement.MaxReplicas Bugfixes Fix SSH port parsing when
shelling out to the ssh client 4.4.2 Bugfixes Fix SSH connection bug where
the hostname was incorrectly trimmed and the error was hidden Fix docs
example Miscellaneous Add Python3.8 and 3.9 in setup.py classifier list
4.4.1 Bugfixes Avoid setting unsuported parameter for subprocess.Popen on
Windows Replace use of deprecated "filter" argument on ""docker/api/image"
* update to 4.4.0:
* Add an alternative SSH connection to the paramiko one, based on shelling out
to the SSh client. Similar to the behaviour of Docker cli
* Default image tag to `latest` on `pull`
* Fix plugin model upgrade
* Fix examples URL in ulimits
* Improve exception messages for server and client errors
* Bump cryptography from 2.3 to 3.2
* Set default API version to `auto`
* Fix conversion to bytes for `float`
* Support OpenSSH `identityfile` option
* Add `DeviceRequest` type to expose host resources such as GPUs
* Add support for `DriverOpts` in EndpointConfig
* Disable compression by default when using container.get_archive method
* Update default API version to v1.39
* Update test engine version to 19.03.12
* update to 4.2.2:
* Fix context load for non-docker endpoints
* update to 4.2.1:
* Add option on when to use `tls` on Context constructor
* Make context orchestrator field optional
* Bump required version of pycreds to 0.4.0 (sync with requirements.txt)
* update to 3.7.0 (mandatory for latest docker-compose)
* add python-dockerpycreds dependency in the spec file rebase
hide_py_pckgmgmt.patch Changes in python-fakeredis:
* update to 2.21.0:
* Implement all TOP-K commands (`TOPK.INFO`, `TOPK.LIST`, `TOPK.RESERVE`,
* `TOPK.ADD`, `TOPK.COUNT`, `TOPK.QUERY`, `TOPK.INCRBY`) #278
* Implement all cuckoo filter commands #276
* Implement all Count-Min Sketch commands #277
* Fix XREAD blocking bug #274 #275
* EXAT option does not work #279
* update to 2.20.1:
* Fix `XREAD` bug #256
* Testing for python 3.12
* update to 2.20.0:
* Implement `BITFIELD` command #247
* Implement `COMMAND`, `COMMAND INFO`, `COMMAND COUNT` #248
* Remove unnecessary BR on python-lupa
* update to 2.19.0:
* Implement Bloom filters commands #239
* Fix error on blocking XREADGROUP #237
* update to 2.18.1:
* Fix stream type issue #233
* update to 2.18.0:
* Implement `PUBSUB NUMPAT` #195, `SSUBSCRIBE` #199, `SPUBLISH` #198,
`SUNSUBSCRIBE` #200, `PUBSUB SHARDCHANNELS` #196, `PUBSUB SHARDNUMSUB` #197
* Fix All aio.FakeRedis instances share the same server #218
* update to 2.17.0:
* Implement `LPOS` #207, `LMPOP` #184, and `BLMPOP` #183
* Implement `ZMPOP` #191, `BZMPOP` #186
* Fix incorrect error msg for group not found #210
* fix: use same server_key within pipeline when issued watch issue with ZRANGE
and ZRANGESTORE with BYLEX #214
* Implemented support for `JSON.MSET` #174, `JSON.MERGE` #181
* Add support for version for async FakeRedis #205
* Updated how to test django_rq #204
* update to 2.15.0:
* Implemented support for various stream groups commands:
* `XGROUP CREATE` #161, `XGROUP DESTROY` #164, `XGROUP SETID` #165, `XGROUP
DELCONSUMER` #162,
* `XGROUP CREATECONSUMER` #163, `XINFO GROUPS` #168, `XINFO CONSUMERS` #168,
`XINFO STREAM` #169, `XREADGROUP` #171,
* `XACK` #157, `XPENDING` #170, `XCLAIM` #159, `XAUTOCLAIM`
* Implemented sorted set commands:
* `ZRANDMEMBER` #192, `ZDIFF` #187, `ZINTER` #189, `ZUNION` #194, `ZDIFFSTORE`
#188,
* `ZINTERCARD` #190, `ZRANGESTORE` #193
* Implemented list commands:
* `BLMOVE` #182,
* Improved documentation.
* Fix documentation link
* Fix requirement for packaging.Version #177
* Implement `HRANDFIELD` #156
* Implement `JSON.MSET`
* Improve streams code
* update to 2.13.0:
* Fixed xadd timestamp (fixes #151) (#152)
* Implement XDEL #153
* Improve test code
* Fix reported security issue
* Add support for `Connection.read_response` arguments used in redis-py 4.5.5
and 5.0.0
* Adding state for scan commands (#99)
* Improved documentation (added async sample, etc.)
* update to 2.12.0:
* Implement `XREAD` #147
* Unique FakeServer when no connection params are provided
* Minor fixes supporting multiple connections
* Update documentation
* connection parameters awareness:
* Creating multiple clients with the same connection parameters will result in
the same server data structure.
* Fix creating fakeredis.aioredis using url with user/password
* add sle15_python_module_pythons
* Update to 2.10.3:
* Support for redis-py 5.0.0b1
* Include tests in sdist (#133)
* Fix import used in GenericCommandsMixin.randomkey (#135)
* Fix async_timeout usage on py3.11 (#132)
* Enable testing django-cache using FakeConnection.
* All geo commands implemented
* Fix bug for xrange
* Fix bug for xrevrange
* Implement XTRIM
* Add support for MAXLEN, MAXID, LIMIT arguments for XADD command
* Add support for ZRANGE arguments for ZRANGE command #127
* Relax python version requirement #128
* Support for redis-py 4.5.0 #125
* update to 2.7.1:
* Fix import error for NoneType (#120)
* Implement
* JSON.ARRINDEX
* JSON.OBJLEN
* JSON.OBJKEYS
* JSON.ARRPOP
* JSON.ARRTRIM
* JSON.NUMINCRBY
* JSON.NUMMULTBY
* XADD
* XLEN
* XRANGE
* XREVRANGE
* Implement `JSON.TYPE`, `JSON.ARRLEN` and `JSON.ARRAPPEND`
* Fix encoding of None (#118)
* update to v2.5.0:
* Implement support for BITPOS (bitmap command) (#112)
* Fix json mget when dict is returned (#114)
* fix: properly export (#116)
* Extract param handling (#113)
* update to v2.4.0:
* Implement LCS (#111), BITOP (#110)
* Fix bug checking type in scan_iter (#109)
* Implement GETEX (#102)
* Implement support for JSON.STRAPPEND (json command) (#98)
* Implement JSON.STRLEN, JSON.TOGGLE and fix bugs with JSON.DEL (#96)
* Implement PUBSUB CHANNELS, PUBSUB NUMSUB
* Implement JSON.CLEAR (#87)
* Support for redis-py v4.4.0
* Implement json.mget (#85)
* Initial json module support - JSON.GET, JSON.SET and JSON.DEL (#80)
* fix: add nowait for asyncio disconnect (#76)
* Refactor how commands are registered (#79)
* Refactor tests from redispy4_plus (#77)
* Remove support for aioredis separate from redis-py (redis-py versions 4.1.2
and below). (#65)
* Add support for redis-py v4.4rc4 (#73)
* Add mypy support (#74)
* Implement support for zmscore by @the-wondersmith in #67
* What's Changed
* implement GETDEL and SINTERCARD support by @cunla in #57
* Test get float-type behavior by @cunla in #59
* Implement BZPOPMIN/BZPOPMAX support by @cunla in #60
* drop fakeredis-pr54-fix-ensure_str.patch (upstream)
* Update to 1.9.3
* Removed python-six dependency
* zadd support for GT/LT by @cunla in #49
* Remove six dependency by @cunla in #51
* Add host to conn_pool_args by @cunla in #51
* Drop python-fakeredis-no-six.patch which was incomplete
* all commits, including the missing ones in release now
* Add fakeredis-pr54-fix-ensure_str.patch
* use upstream https://github.com/cunla/fakeredis-py/pull/51/
* modified patches % python-fakeredis-no-six.patch (refreshed)
* version update to 1.9.1
* Zrange byscore by @cunla in #44
* Expire options by @cunla in #46
* Enable redis7 support by @cunla in #42
* added patches fix https://github.com/cunla/fakeredis-py/issues/50
* python-fakeredis-no-six.patch
* Update to 1.8.1
* fix: allow redis 4.3.* by @terencehonles in #30
* Release 1.8
* Fix handling url with username and password by @cunla in #27
* Refactor tests by @cunla in #28
* Release 1.7.6
* add IMOVE operation by @BGroever in #11
* Add SMISMEMBER command by @OlegZv in #20
* fix: work with redis.asyncio by @zhongkechen in #10
* Migrate to poetry by @cunla in #12
* Create annotation for redis4+ tests by @cunla in #14
* Make aioredis and lupa optional dependencies by @cunla in #16
* Remove aioredis requirement if redis-py 4.2+ by @ikornaselur in #19
* update to 1.7.0
* Change a number of corner-case behaviours to match Redis 6.2.6.
* Fix DeprecationWarning for sampling from a set
* Improved support for constructor arguments
* Support redis-py 4
* Add support for GET option to SET
* PERSIST and EXPIRE should invalidate watches
* Update to 1.6.1
* # 305 Some packaging modernisation
* # 306 Fix FakeRedisMixin.from_url for unix sockets
* # 308 Remove use of async_generator from tests
* Release 1.6.0
* # 304 Support aioredis 2
* # 302 Switch CI from Travis CI to Github Actions
* update to 1.5.2
* support python 3.9
* support aioredis
* Disable py2 as upstream actually disabled python2 support competely
* The syntax simply is not compatible
* Update to 1.3.0:
* No upstream changelog
* python2 tests are dysfunctional, test with python3 only
* Update to 1.0.5:
* No upstream changelog
* Update to 1.0.4:
* various bugfixes all around
* Update to v1.0.3
* Support for redis 3.2 (no effective changes in v1.0.2)
* Initial spec for v1.0.1 Changes in python-fixedint:
* Switch build system from setuptools to pyproject.toml
* Add python-pip and python-wheel to BuildRequires
* Replace %python_build with %pyproject_wheel
* Replace %python_install with %pyproject_install
* Fix capitalization in Summary
* Limit Python files matched in %files section
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Drop %{?!python_module:%define python_module() python-%{ **} python3-%{** }}
* Initial build
* Version 0.2.0 Changes in python-httplib2:
* require setuptools
* Clean up SPEC file.
* Add %{?sle15_python_module_pythons}
* update to 0.22.0:
* https: disable_ssl_certificate_validation caused ValueError: Cannot set
verify_mode to CERT_NONE when check_hostname is enabled
* Update to 0.21.0:
* http: `Content-Encoding: deflate` must accept zlib encapsulation
* https://github.com/httplib2/httplib2/pull/230
* Begin support and CI against CPython 3.10 and 3.11.
* update to 0.20.4: proxy: support proxy urls with ipv6 address Tests
compatible with Python3.10 and recent pytest.
* add pyparsing dependency
* update to 0.20.2: auth: support pyparsing v3 proxy: correct extraction of
errno from pysocks ProxyConnectionError IMPORTANT cacerts: remove expired
DST Root CA X3, add ISRG Root X1, X2
* update to 0.19.1:
* auth header parsing performance optimizations; Thanks to Paul McGuire
* Use mock from the standard library on Python>=3.3
set first, othewise a "ValueError: Cannot set verify_mode to CERT_NONE when
check_hostname instead (bnc#761162) item not in cache \- initial version of
python-httplib2 (0.2.0) Changes in python-httpretty: \- Add patch 0001-Fix-
test_417_openssl.py-if-pyOpenSSL-not-available.patch: * Fix tests without
pyOpenSSL support in urllib3
* Allow building with python-urllib3 >= 2.x
* Do not use python-boto3 when building in SLE where it's currently not
available for python311
* Add %{?sle15_python_module_pythons}
* skip failing testsuite tests after requests update
* Add patch relax-test-callback-response.patch:
* Relax timeout for test_callback_response (bsc#1209571)
* Add patch 460-miliseconds_tests.patch (gh#gabrielfalcao/HTTPretty#460):
* Correct tests for s390x and aarch64 because of timeout failures after 2
miliseconds
* Fix test suite:
* Remove nose idioms
* Remove outdated test skips
* Add patch double-slash-paths.patch:
* http.request may replace // with /, handle that in the testcase.
* Add 453-fix-tests-pytest.patch (gh#gabrielfalcao/HTTPretty#449) to make
tests compatible with pytest.
* Add patch remove-mock.patch:
* Use unittest.mock in the functional tests.
* specfile:
* update copyright year
* update to version 1.1.4:
* Bugfix: #435 Fallback to WARNING when logging.getLogger().level is None.
* changes from version 1.1.3:
* Bugfix: #430 Respect socket timeout.
* changes from version 1.1.2:
* Bugfix: #426 Segmentation fault when running against a large amount of tests
with pytest --mypy.
* changes from version 1.1.1:
* Bugfix: httpretty.disable() injects pyopenssl into :py:mod:`urllib3` even if
it originally wasn't #417
* Bugfix: "Incompatibility with boto3 S3 put_object" #416
* Bugfix: "Regular expression for URL -> TypeError: wrap_socket() missing 1
required" #413
* Bugfix: "Making requests to non-stadard port throws TimeoutError "#387
* changes from version 1.1.0:
* Feature: Display mismatched URL within UnmockedError whenever possible. #388
* Feature: Display mismatched URL via logging. #419
* Add new properties to :py:class:`httpretty.core.HTTPrettyRequest` (protocol,
host, url, path, method).
* Updater to 1.0.5
* Bugfix: Support socket.socketpair() . #402
* Bugfix: Prevent exceptions from re-applying monkey patches. #406
* Release 1.0.4
* Python 3.8 and 3.9 support. #407
* Update to 1.0.3
* Fix compatibility with urllib3>=1.26. #410
* Replace nose with nose2
* avoid reading DNS resolver settings gh#gabrielfalcao/HTTPretty#405
* remove unnecessary test packages
* Update to 1.0.2
* Drop Python 2 support.
* Fix usage with redis and improve overall real-socket passthrough.
* Fix TypeError: wrap_socket() missing 1 required positional argument: 'sock'.
* Fix simple typo: neighter -> neither.
* Updated documentation for register_uri concerning using ports.
* Clarify relation between `enabled` and `httprettized` in API docs.
* Align signature with builtin socket.
* Version update to 0.9.6:
* Many fixes all around
* Support for python 3.7
* Make sure we really run the tests
* Remove superfluous devel dependency for noarch package
Changes in python-javaproperties: \- Switch package to modern Python Stack on
SLE-15 \+ Add %{?sle15_python_module_pythons}
* version update to 0.8.1 v0.8.1 (2021-10-05)
* * *
* Fix a typing issue in Python 3.9
* Support Python 3.10
v0.8.0 (2020-11-28)
* * *
* Drop support for Python 2.7, 3.4, and 3.5
* Support Python 3.9
* `ensure_ascii` parameter added to `PropertiesFile.dump()` and
`PropertiesFile.dumps()`
* **Bugfix** : When parsing XML input, empty `<entry>` tags now produce
an empty string as a value, not `None`
* Added type annotations
* `Properties` and `PropertiesFile` no longer raise `TypeError` when given a
non-string key or value, as type correctness is now expected to be enforced
through static type checking
* The `PropertiesElement` classes returned by `parse()` are no longer
subclasses of `namedtuple`, but they can still be iterated over to retrieve
their fields like a tuple
* python-six is not required Changes in python-jsondiff:
* Switch build system from setuptools to pyproject.toml
* Add python-pip and python-wheel to BuildRequires
* Replace %python_build with %pyproject_wheel
* Replace %python_install with %pyproject_install
* Limit Python files matched in %files section
* Add %{?sle15_python_module_pythons}
* Update to version 2.0.0
* Removed deprecated function
* Remove deprecated jsondiff entry point
* from version 1.3.1
* Optionally allow different escape_str than '$'
* Clarified the readme, closes #23
* Fixed readme
* Remove jsondiff command from %install, %post, %postun and %files sections
Changes in python-knack:
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Drop %{?!python_module:%define python_module() python-%{ **} python3-%{** }}
* Drop %define skip_python2 1
* Update to version 0.11.0
* Declare support for Python 3.11 and drop support for Python 3.7 (#275)
* Stop converting argument's `bool` default value to `DefaultInt` (#273)
* Update to version 0.10.1
* Support bytearray serialization (#268)
* Update to version 0.10.0
* Enable Virtual Terminal mode on legacy Windows terminal to support ANSI
escape sequences (#265)
* Drop Python 3.6 support (#259)
* python-mock is not required for build Changes in python-marshmallow:
* Switch build system from setuptools to pyproject.toml
* Add python-pip and python-wheel to BuildRequires
* Replace %python_build with %pyproject_wheel
* Replace %python_install with %pyproject_install
* Limit Python files matched in %files section
* update to 3.20.2:
* Bug fixes: - Fix Nested field type hint for lambda Schema types
(:pr:`2164`).
* Other changes: - Officially support Python 3.12 (:pr:`2188`).
* update to 3.20.1:
* Fix call to `get_declared_fields`: pass `dict_cls` again
* Add `absolute` parameter to `URL` validator and `Url`
* Use Abstract Base Classes to define `FieldABC` and `SchemaABC`
* Use `OrderedSet` as default `set_class`. Schemas are now ordered by default.
* Handle `OSError` and `OverflowError` in `utils.from_timestamp` (:pr:`2102`).
* Fix the default inheritance of nested partial schemas
* Officially support Python 3.11 (:pr:`2067`).
* Drop support for Python 3.7 (:pr:`2135`).
* Switch documentation to be within the main package on SLE15
* rename docs subpackage to the more common doc name
* Update to 3.19.0
* Add timestamp and timestamp_ms formats to fields.DateTime (#612). Thanks
@vgavro for the suggestion and thanks @vanHoi for the PR.
Changes in python-opencensus: \- Add Obsoletes for old python3 package on SLE-15
\- Switch build system from setuptools to pyproject.toml \+ Add python-pip and
python-wheel to BuildRequires \+ Replace %python_build with %pyproject_wheel \+
Replace %python_install with %pyproject_install \- Update to 0.11.4 * Changed
bit-mapping for `httpx` and `fastapi` integrations \- Refresh patches for new
version * opencensus-pr1002-remove-mock.patch \- Switch package to modern Python
Stack on SLE-15 * Add %{?sle15_python_module_pythons} * Drop
%{?!python_module:%define python_module() python-%{ **} python3-%{** }}
* update to 0.11.3
* Updated azure modules
* sorry, six is still needed :(
* update to 0.11.2:
* Updated `azure`, `fastapi`,`flask` modules
* Updated `azure`, `httpx` modules
* Update to 0.11.0
* Updated `azure`, `context`, `flask`, `requests` modules
* from version 0.10.0
* Add kwargs to derived gauge (#1135)
* from version 0.9.0
* Make sure handler.flush() doesn't deadlock (#1112)
* Refresh patches for new version
* opencensus-pr1002-remove-mock.patch
* Update Requires from setup.py
Changes in python-opencensus-context: \- Clean up the SPEC file \- Switch
package to modern Python Stack on SLE-15 \+ Add %{?sle15_python_module_pythons}
\+ Drop %{?!python_module:%define python_module() python-%{ **} python3-%{** }}
\- Update to 0.1.3 * Move `version.py` file into `runtime_context` folder
(#1143) Changes in python-opencensus-ext-threading: \- Switch package to modern
Python Stack on SLE-15 \+ Add %{?sle15_python_module_pythons} \+ Drop
%{?!python_module:%define python_module() python-%{ **} python3-%{** }} \+ Drop
build support for Python 2.x Changes in python-opentelemetry-api: \- update to
1.23.0: * Use Attribute rather than boundattribute in logrecord (#3567) * Fix
flush error when no LoggerProvider configured for LoggingHandler (#3608) * Fix
OTLPMetricExporter ignores preferred_aggregation property (#3603) * Logs: set
observed_timestamp field (#3565) * Add missing Resource SchemaURL in OTLP
exporters (#3652) * Fix loglevel warning text (#3566) * Prometheus Exporter
string representation for target_info labels (#3659) * Logs: ObservedTimestamp
field is missing in console exporter output (#3564) * Fix explicit bucket
histogram aggregation (#3429) * Add code.lineno, code.function and code.filepath
to all logs (#3645) * Add Synchronous Gauge instrument (#3462) * Drop support
for 3.7 (#3668) * Include key in attribute sequence warning (#3639) * Upgrade
markupsafe, Flask and related dependencies to dev and test environments (#3609)
* Handle HTTP 2XX responses as successful in OTLP exporters (#3623) * Improve
Resource Detector timeout messaging (#3645) * Add Proxy classes for logging
(#3575) * Remove dependency on 'backoff' library (#3679)
* update to 1.22.0:
* Prometheus exporter sanitize info metric (#3572)
* Remove Jaeger exporters (#3554)
* Log stacktrace on `UNKNOWN` status OTLP export error (#3536)
* Fix OTLPExporterMixin shutdown timeout period (#3524)
* Handle `taskName` `logrecord` attribute (#3557)
* update to 1.21.0:
* Fix `SumAggregation`(#3390)
* Fix handling of empty metric collection cycles (#3335)
* Fix error when no LoggerProvider configured for LoggingHandler (#3423)
* Make `opentelemetry_metrics_exporter` entrypoint support pull exporters
(#3428)
* Allow instrument names to have '/' and up to 255 characters (#3442)
* Do not load Resource on sdk import (#3447)
* Update semantic conventions to version 1.21.0 (#3251)
* Add missing schema_url in global api for logging and metrics (#3251)
* Prometheus exporter support for auto instrumentation (#3413)
* Modify Prometheus exporter to translate non-monotonic Sums into Gauges
(#3306)
* Update the body type in the log ($3343)
* Add max_scale option to Exponential Bucket Histogram Aggregation (#3323)
* Use BoundedAttributes instead of raw dict to extract attributes from
LogRecord (#3310)
* Support dropped_attributes_count in LogRecord and exporters (#3351)
* Add unit to view instrument selection criteria (#3341)
* Upgrade opentelemetry-proto to 0.20 and regen #3355)
* Include endpoint in Grpc transient error warning #3362)
* Fixed bug where logging export is tracked as trace #3375)
* Select histogram aggregation with an environment variable
* Move Protobuf encoding to its own package (#3169)
* Add experimental feature to detect resource detectors in auto
instrumentation (#3181)
* Fix exporting of ExponentialBucketHistogramAggregation from
opentelemetry.sdk.metrics.view (#3240)
* Fix headers types mismatch for OTLP Exporters (#3226)
* Fix suppress instrumentation for log batch processor (#3223)
* Add speced out environment variables and arguments for
BatchLogRecordProcessor (#3237)
* Fix `ParentBased` sampler for implicit parent spans. Fix also `trace_state` erasure for dropped spans or spans sampled by the `TraceIdRatioBased` sampler. Changes in python-opentelemetry-sdk:
* Add missing python-wheel build dependency to BuildRequires
* update to 1.23.0:
* Use Attribute rather than boundattribute in logrecord (#3567)
* Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
* Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
* Logs: set observed_timestamp field (#3565)
* Add missing Resource SchemaURL in OTLP exporters (#3652)
* Fix loglevel warning text (#3566)
* Prometheus Exporter string representation for target_info labels (#3659)
* Logs: ObservedTimestamp field is missing in console exporter output (#3564)
* Fix explicit bucket histogram aggregation (#3429)
* Add code.lineno, code.function and code.filepath to all logs (#3645)
* Add Synchronous Gauge instrument (#3462)
* Drop support for 3.7 (#3668)
* Include key in attribute sequence warning (#3639)
* Upgrade markupsafe, Flask and related dependencies to dev and test
environments (#3609)
* Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
* Improve Resource Detector timeout messaging (#3645)
* Add Proxy classes for logging (#3575)
* Remove dependency on 'backoff' library (#3679)
* update to 1.23.0:
* Use Attribute rather than boundattribute in logrecord (#3567)
* Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
* Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
* Logs: set observed_timestamp field (#3565)
* Add missing Resource SchemaURL in OTLP exporters (#3652)
* Fix loglevel warning text (#3566)
* Prometheus Exporter string representation for target_info labels (#3659)
* Logs: ObservedTimestamp field is missing in console exporter output (#3564)
* Fix explicit bucket histogram aggregation (#3429)
* Add code.lineno, code.function and code.filepath to all logs (#3645)
* Add Synchronous Gauge instrument (#3462)
* Drop support for 3.7 (#3668)
* Include key in attribute sequence warning (#3639)
* Upgrade markupsafe, Flask and related dependencies to dev and test
environments (#3609)
* Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
* Improve Resource Detector timeout messaging (#3645)
* Add Proxy classes for logging (#3575)
* Remove dependency on 'backoff' library (#3679)
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Initial package (1.22.0) Changes in python-opentelemetry-semantic-
conventions:
* update to 0.44b0:
* Use Attribute rather than boundattribute in logrecord (#3567)
* Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
* Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
* Logs: set observed_timestamp field (#3565)
* Add missing Resource SchemaURL in OTLP exporters (#3652)
* Fix loglevel warning text (#3566)
* Prometheus Exporter string representation for target_info labels (#3659)
* Logs: ObservedTimestamp field is missing in console exporter output (#3564)
* Fix explicit bucket histogram aggregation (#3429)
* Add code.lineno, code.function and code.filepath to all logs (#3645)
* Add Synchronous Gauge instrument (#3462)
* Drop support for 3.7 (#3668)
* Include key in attribute sequence warning (#3639)
* Upgrade markupsafe, Flask and related dependencies to dev and test
environments (#3609)
* Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
* Improve Resource Detector timeout messaging (#3645)
* Add Proxy classes for logging (#3575)
* Remove dependency on 'backoff' library (#3679)
* update to 0.43b0:
* Prometheus exporter sanitize info metric
* Remove Jaeger exporters
* Log stacktrace on `UNKNOWN` status OTLP export error
* Fix OTLPExporterMixin shutdown timeout period
* Handle `taskName` `logrecord` attribute
* Fix `SumAggregation`
* Fix handling of empty metric collection cycles
* Fix error when no LoggerProvider configured for LoggingHandler
* Make `opentelemetry_metrics_exporter` entrypoint support pull exporters
* Allow instrument names to have '/' and up to 255 characters
* Do not load Resource on sdk import
* Update semantic conventions to version 1.21.0
* Add missing schema_url in global api for logging and metrics
* Prometheus exporter support for auto instrumentation
* Drop `setuptools` runtime requirement.
* Update the body type in the log ($3343)
* Add max_scale option to Exponential Bucket Histogram Aggregation
* Use BoundedAttributes instead of raw dict to extract attributes from
LogRecord
* Support dropped_attributes_count in LogRecord and exporters
* Add unit to view instrument selection criteria
* Upgrade opentelemetry-proto to 0.20 and regen #3355)
* Include endpoint in Grpc transient error warning #3362)
* Fixed bug where logging export is tracked as trace #3375)
* Select histogram aggregation with an environment variable
* Move Protobuf encoding to its own package
* Add experimental feature to detect resource detectors in auto
instrumentation
* Fix exporting of ExponentialBucketHistogramAggregation from
opentelemetry.sdk.metrics.view
* Fix headers types mismatch for OTLP Exporters
* Fix suppress instrumentation for log batch processor
* Add speced out environment variables and arguments for
BatchLogRecordProcessor
* Initial build
* Version 0.25b2 Changes in python-opentelemetry-test-utils:
* update to 0.44b0:
* Use Attribute rather than boundattribute in logrecord (#3567)
* Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
* Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
* Logs: set observed_timestamp field (#3565)
* Add missing Resource SchemaURL in OTLP exporters (#3652)
* Fix loglevel warning text (#3566)
* Prometheus Exporter string representation for target_info labels (#3659)
* Logs: ObservedTimestamp field is missing in console exporter output (#3564)
* Fix explicit bucket histogram aggregation (#3429)
* Add code.lineno, code.function and code.filepath to all logs (#3645)
* Add Synchronous Gauge instrument (#3462)
* Drop support for 3.7 (#3668)
* Include key in attribute sequence warning (#3639)
* Upgrade markupsafe, Flask and related dependencies to dev and test
environments (#3609)
* Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
* Improve Resource Detector timeout messaging (#3645)
* Add Proxy classes for logging (#3575)
* Remove dependency on 'backoff' library (#3679)
* Initial package (0.43b0) Changes in python-pycomposefile:
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Initial build
* Version 0.0.30 Changes in python-pydash:
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* Drop %{?!python_module:%define python_module() python-%{ **} python3-%{** }}
* Update to version 6.0.2
* Only prevent access to object paths containing `__globals__` or
`__builtins__` instead of all dunder-methods for non-dict/list objects.
* from version 6.0.1
* Fix exception raised due to mishandling of non-string keys in functions like
`get()` for non-dict/list objects that used integer index references like
`"[0]"`.
* from version 6.0.0
* Prevent access to object paths containing dunder-methods in functions like
`get()` for non-dict/list objects. Attempting to access dunder-methods using
get-path keys will raise a `KeyError` (e.g. `get(SomeClass(),
'__init__'` will raise). Access to dict keys are unaffected (e.g.
`get({"__init__": True}, "__init__")` will return
`True`). ( **breaking change** )
* Add support for Python 3.11.
* Drop support for Python 3.6 ( **breaking change** )
* from version 5.1.2
* Remove unnecessary type check and conversion for `exceptions` argument in
`pydash.retry`.
* from version 5.1.1
* Add support for Python 3.10.
* Fix timing assertion issue in test for `pydash.delay` where it could fail on
certain environments.
* Switch build system from setuptools to pyproject.toml
* Update BuildRequires from pyproject.toml
* version update to 5.1.0 v5.1.0 (2021-10-02)
* * *
* Support matches-style callbacks on non-dictionary objects that are
compatible with `pydash.get` in functions like `pydash.find`. v5.0.2
(2021-07-15)
* * *
* Fix compatibility issue between `pydash.py_` / `pydash._` and
`typing.Protocol` \+ `typing.runtime_checkable` that caused an exception to
be raised for `isinstance(py_, SomeRuntimeCheckableProtocol)`. v5.0.1
(2021-06-27)
* * *
* Fix bug in `merge_with` that prevented custom iteratee from being used when
recursively merging. Thanks weineel_! v5.0.0 (2021-03-29)
* * *
* Drop support for Python 2.7. ( **breaking change** )
* Improve Unicode word splitting in string functions to be inline with Lodash.
Thanks mervynlee94_! ( **breaking change** )
* `camel_case`
* `human_case`
* `kebab_case`
* `lower_case`
* `pascal_case`
* `separator_case`
* `slugify`
* `snake_case`
* `start_case`
* `upper_case`
* Optimize regular expression constants used in `pydash.strings` by pre-
compiling them to regular expression pattern objects. v4.9.3 (2021-03-03)
* * *
* Fix regression introduced in `v4.8.0` that caused `merge` and `merge_with`
to raise an exception when passing `None` as the first argument. v4.9.2
(2020-12-24)
* * *
* Fix regression introduced in `v4.9.1` that broke `pydash.get` for
dictionaries and dot-delimited keys that reference integer dict-keys. v4.9.1
(2020-12-14)
* * *
* Fix bug in `get/has` that caused `defaultdict` objects to get populated on
key access. v4.9.0 (2020-10-27)
* * *
* Add `default_to_any`. Thanks gonzalonaveira_!
* Fix mishandling of key names containing `\.` in `set_`, `set_with`, and
`update_with` where the `.` was not treated as a literal value within the
key name. Thanks zhaowb_!
* python-mock is not required for build
* Activate test suite
* Update to v4.8.0
* Initial spec for v4.7.6 Changes in python-redis:
* Switch build system from setuptools to pyproject.toml
* Add python-pip and python-wheel to BuildRequires
* Replace %python_build with %pyproject_wheel
* Replace %python_install with %pyproject_install
* add https://github.com/redis/redis-py/pull/3005 as Close-various-objects-
created-during-asyncio-tests.patch to fix tests for python 3.12
* Add patch to increase timeouts in s390x where tests take longer to run:
* increase-test-timeout.patch
* Disable broken tests for ppc64le, bsc#1216606
* Add pytest.ini source needed to run tests
* Remove/disable broken tests because of suse environment
* drop tox.ini. seems it does no longer exist in 5.0.1
* add support to easily disable the testsuite at build time
* update to 5.0.1
* New Features
* Provide aclose() / close() for classes requiring lifetime management (#2898)
* Add support for ModuleCommands in cluster (#2951)
* Add support for multiple values in RPUSHX (#2949)
* Add Redis.from_pool() class method, for explicitly owning and closing a ConnectionPool (#2913)
* Bug Fixes
* Fixing monitor parsing for messages containing specific substrings (#2950)
* Cluster determine slot command name need to be upper (#2919)
* Support timeout = 0 in search query (#2934)
* Fix async sentinel: add push_request keyword argument to read_response (#2922)
* Fix protocol checking for search commands (#2923)
* Fix: SentinelManagedConnection.read_response() got an unexpected keyword argument 'push_request' (#2894)
* Fix: automatically close connection pool for async Sentinel (#2900)
* Save a reference to created async tasks, to avoid tasks potentially disappearing (#2816)
* Avoid reference cycling by the garbage collector during response reading (#2932)
* Maintenance
* Type hint improvements (#2952)
* Replace clear_connect_callbacks with _deregister_connect_callback (#2955)
* Async fixes, remove del and other things (#2870)
* Add pagination, sorting and grouping examples to search json example (#2890)
* Remove process-id checks from asyncio. Asyncio and fork() does not mix. (#2911)
* Fix resource usage and cleanup Mocks in the unit tests (#2936)
* Remove mentions of tox (#2929)
* Add 7.2 to supported Redis versions (#2896)
* Fix resource warnings in unit tests (#2899)
* Fix typo in redis-stream-example.ipynb (#2918)
* Deprecate RedisGraph (#2927)
* Fix redis 7.2.0 tests (#2902)
* Fix test_scorer (search) (#2920)
* changes from 5.0.0
* What's new?
* Triggers and Functions support Triggers and Functions allow you to execute server-side functions triggered when key values are modified or created in Redis, a stream entry arrival, or explicitly calling them. Simply put, you can replace Lua scripts with easy-to-develop JavaScript or TypeScript code. Move your business logic closer to the data to ensure a lower latency, and forget about updating dependent key values manually in your code. Try it for yourself with Quick start
* Full Redis 7.2 and RESP3 support
* Python 3.7 End-of-Life
* Python 3.7 has reached its end-of-life (EOL) as of June
1. This means that starting from this date, Python 3.7 will no longer receive any updates, including security patches, bug fixes, or improvements. If you continue to use Python 3.7 post-EOL, you may expose your projects and systems to potential security vulnerabilities. We ended its support in this version and strongly recommend migrating to Python 3.10.
* Bug Fixes
* Fix timeout retrying on pipeline execution (#2812)
* Fix socket garbage collection (#2859)
* Maintenance
* Updating client license to clear, MIT (#2884)
* Add py.typed in accordance with PEP-561 (#2738)
* Dependabot label change (#2880)
* Fix type hints in SearchCommands (#2817)
* Add sync modules (except search) tests to cluster CI (#2850)
* Fix a duplicate word in CONTRIBUTING.md (#2848)
* Fixing doc builds (#2869)
* Change cluster docker to edge and enable debug command (#2853)
* changes from 4.6.0
* Experimental Features
* Support JSON.MERGE command (#2761)
* Support JSON.MSET command (#2766)
* New Features
* Extract abstract async connection class (#2734)
* Add support for WAITAOF (#2760)
* Introduce OutOfMemoryError exception for Redis write command rejections due to OOM errors (#2778)
* Add WITHSCORE argument to ZRANK (#2758)
* Bug Fixes
* Fix dead weakref in sentinel connection causing ReferenceError (#2767) (#2771)
* Fix Key Error in parse_xinfo_stream (#2788)
* Remove unnecessary **del** handlers (#2755)
* Added support for missing argument to SentinelManagedConnection.read_response() (#2756)
* Maintenance
* Fix type hint for retry_on_error in async cluster (#2804)
* Clean up documents and fix some redirects (#2801)
* Add unit tests for the connect method of all Redis connection classes (#2631)
* Docstring formatting fix (#2796)
* update to 4.5.5:
* Add support for CLIENT NO-TOUCH
* Add support for CLUSTER MYSHARDID
* Add "address_remap" feature to RedisCluster
* Add WITHSCORES argument to ZREVRANK command
* Improve error output for master discovery
* Fix XADD: allow non negative maxlen
* Fix create single connection client from url
* Optionally disable disconnects in read_response
* Fix SLOWLOG GET return value
* Fix potential race condition during disconnection
* Return response in case of KeyError
* Fix incorrect usage of once flag in async Sentinel
* Fix memory leak caused by hiredis in asyncio case
* Really do not use asyncio's timeout lib before 3.11.2
* add sle15_python_module_pythons
* Update to 4.5.4:
* Security
* Cancelling an async future does not, properly trigger, leading to a potential data leak in specific cases. (CVE-2023-28858, bsc#1209811)
* Cancelling an async future does not, properly trigger, leading to a potential data leak in specific cases. (CVE-2023-28859, bsc#1209812)
* New Features
* Introduce AbstractConnection so that UnixDomainSocketConnection can call super().init (#2588)
* Added queue_class to REDIS_ALLOWED_KEYS (#2577)
* Made search document subscriptable (#2615)
* Sped up the protocol parsing (#2596)
* Use hiredis::pack_command to serialized the commands. (#2570)
* Add support for unlink in cluster pipeline (#2562)
* Bug Fixes
* Fixing cancelled async futures (#2666)
* Fix: do not use asyncio's timeout lib before 3.11.2 (#2659)
* Fix UDS in v4.5.2: UnixDomainSocketConnection missing constructor argument (#2630)
* CWE-404 AsyncIO Race Condition Fix (#2624, #2579)
* Fix behaviour of async PythonParser to match RedisParser as for issue #2349 (#2582)
* Replace async_timeout by asyncio.timeout (#2602)
* Update json().arrindex() default values (#2611)
* Fix #2581 UnixDomainSocketConnection object has no attribute _command_packer (#2583)
* Fix issue with pack_commands returning an empty byte sequence (#2416)
* Async HiredisParser should finish parsing after a Connection.disconnect() (#2557)
* Check for none, prior to raising exception (#2569)
* Tuple function cannot be passed more than one argument (#2573)
* Synchronise concurrent command calls to single-client to single-client mode (#2568)
* Async: added 'blocking' argument to call lock method (#2454)
* Added a replacement for the default cluster node in the event of failure. (#2463)
* Fixed geosearch: Wrong number of arguments for geosearch command (#2464)
* Clean up BuildRequires and Requires.
* Disable broken test test_xautoclaim gh#redis/redis-py#2554
* udpate to 4.3.5:
* Add support for TIMESERIES 1.8 (#2296)
* Graph - add counters for removed labels and properties (#2292)
* Add support for TDIGEST.QUANTILE extensions (#2317)
* Add TDIGEST.TRIMMED_MEAN (#2300)
* Add support for async GRAPH module (#2273)
* Support TDIGEST.MERGESTORE and make compression optional on TDIGEST.CREATE
(#2319)
* Adding reserve as an alias for create, so that we have BF.RESERVE and
CF.RESERVE accuratenly supported (#2331)
* Fix async connection.is_connected to return a boolean value (#2278)
* Fix: workaround asyncio bug on connection reset by peer (#2259)
* Fix crash: key expire while search (#2270)
* Async cluster: fix concurrent pipeline (#2280)
* Fix async SEARCH pipeline (#2316)
* Fix KeyError in async cluster - initialize before execute multi key commands
(#2439)
* Supply chain risk reduction: remove dependency on library named deprecated
(#2386)
* Search test - Ignore order of the items in the response (#2322)
* Fix GRAPH.LIST & TDIGEST.QUANTILE tests (#2335)
* Fix TimeSeries range aggregation (twa) tests (#2358)
* Mark TOPK.COUNT as deprecated (#2363)
* update to 4.3.4:
* Fix backward compatibility from 4.3.2 in Lock.acquire()
* Fix XAUTOCLAIM to return the full response, instead of only keys 2+
* Added dynamic_startup_nodes configuration to RedisCluster.
* Fix retries in async mode
* Async cluster: fix simultaneous initialize
* Uppercased commands in CommandsParser.get_keys
* Late eval of the skip condition in async tests
* Reuse the old nodes' connections when a cluster topology refresh is being
done
* Docs: add pipeline examples
* Correct retention_msecs value
* Cluster: use pipeline to execute split commands
* Docs: Add a note about client_setname and client_name difference
* Delete unused redismod.conf, remove duplicate Source entry for tox.ini
* Add redismod.conf and tox.ini as Sources to SPEC file.
* Update to version 4.3.3
* Fix Lock crash, and versioning 4.3.3 (#2210)
* Async cluster: improve docs (#2208)
* Release 4.3.2
* SHUTDOWN - add support for the new NOW, FORCE and ABORT modifiers (#2150)
* Adding pipeline support for async cluster (#2199)
* Support CF.MEXISTS + Clean bf/commands.py (#2184)
* Extending query_params for FT.PROFILE (#2198)
* Implementing ClusterPipeline Lock (#2190)
* Set default response_callbacks to redis.asyncio.cluster.ClusterNode (#2201)
* Add default None for maxlen at xtrim command (#2188)
* Async cluster: add/update typing (#2195)
* Changed list type to single element type (#2203)
* Made sync lock consistent and added types to it (#2137)
* Async cluster: optimisations (#2205)
* Fix typos in README (#2206)
* Fix modules links to https://redis.io/commands/ (#2185)
* Update to version 4.3.1
* Allow negative `retries` for `Retry` class to retry forever
* Add `items` parameter to `hset` signature
* Create codeql-analysis.yml (#1988). Thanks @chayim
* Add limited support for Lua scripting with RedisCluster
* Implement `.lock()` method on RedisCluster
* Fix cursor returned by SCAN for RedisCluster & change default target to PRIMARIES
* Fix scan_iter for RedisCluster
* Remove verbose logging when initializing ClusterPubSub, ClusterPipeline or RedisCluster
* Fix broken connection writer lock-up for asyncio (#2065)
* Fix auth bug when provided with no username (#2086)
* Release 4.1.3
* Fix flushdb and flushall (#1926)
* Add redis5 and redis4 dockers (#1871)
* Change json.clear test multi to be up to date with redisjson (#1922)
* Fixing volume for unstable_cluster docker (#1914)
* Update changes file with changes since 4.0.0-beta2 (#1915)
* Release 4.1.2
* Invalid OCSP certificates should raise ConnectionError on failed validation (#1907)
* Added retry mechanism on socket timeouts when connecting to the server (#1895)
* LMOVE, BLMOVE return incorrect responses (#1906)
* Fixing AttributeError in UnixDomainSocketConnection (#1903)
* Fixing TypeError in GraphCommands.explain (#1901)
* For tests, increasing wait time for the cluster (#1908)
* Increased pubsub's wait_for_messages timeout to prevent flaky tests (#1893)
* README code snippets formatted to highlight properly (#1888)
* Fix link in the main page (#1897)
* Documentation fixes: JSON Example, SSL Connection Examples, RTD version (#1887)
* Direct link to readthedocs (#1885)
* Release 4.1.1
* Add retries to connections in Sentinel Pools (#1879)
* OCSP Stapling Support (#1873)
* Define incr/decr as aliases of incrby/decrby (#1874)
* FT.CREATE - support MAXTEXTFIELDS, TEMPORARY, NOHL, NOFREQS, SKIPINITIALSCAN (#1847)
* Timeseries docs fix (#1877)
* get_connection: catch OSError too (#1832)
* Set keys var otherwise variable not created (#1853)
* Clusters should optionally require full slot coverage (#1845)
* Triple quote docstrings in client.py PEP 257 (#1876)
* syncing requirements (#1870)
* Typo and typing in GraphCommands documentation (#1855)
* Allowing poetry and redis-py to install together (#1854)
* setup.py: Add project_urls for PyPI (#1867)
* Support test with redis unstable docker (#1850)
* Connection examples (#1835)
* Documentation cleanup (#1841)
* Release 4.1.0
* OCSP stapling support (#1820)
* Support for SELECT (#1825)
* Support for specifying error types with retry (#1817)
* Support for RESET command since Redis 6.2.0 (#1824)
* Support CLIENT TRACKING (#1612)
* Support WRITE in CLIENT PAUSE (#1549)
* JSON set_file and set_path support (#1818)
* Allow ssl_ca_path with rediss:// urls (#1814)
* Support for password-encrypted SSL private keys (#1782)
* Support SYNC and PSYNC (#1741)
* Retry on error exception and timeout fixes (#1821)
* Fixing read race condition during pubsub (#1737)
* Fixing exception in listen (#1823)
* Fixed MovedError, and stopped iterating through startup nodes when slots are fully covered (#1819)
* Socket not closing after server disconnect (#1797)
* Single sourcing the package version (#1791)
* Ensure redis_connect_func is set on uds connection (#1794)
* SRTALGO - Skip for redis versions greater than 7.0.0 (#1831)
* Documentation updates (#1822)
* Add CI action to install package from repository commit hash (#1781) (#1790)
* Fix link in lmove docstring (#1793)
* Disabling JSON.DEBUG tests (#1787)
* Migrated targeted nodes to kwargs in Cluster Mode (#1762)
* Added support for MONITOR in clusters (#1756)
* Adding ROLE Command (#1610)
* Integrate RedisBloom support (#1683)
* Adding RedisGraph support (#1556)
* Allow overriding connection class via keyword arguments (#1752)
* Aggregation LOAD * support for RediSearch (#1735)
* Adding cluster, bloom, and graph docs (#1779)
* Add packaging to setup_requires, and use >= to play nice to setup.py (fixes #1625) (#1780)
* Fixing the license link in the readme (#1778)
* Removing distutils from tests (#1773)
* Fix cluster ACL tests (#1774)
* Improved RedisCluster's reinitialize_steps and documentation (#1765)
* Added black and isort (#1734)
* Link Documents for all module commands (#1711)
* Pyupgrade + flynt + f-strings (#1759)
* Remove unused aggregation subclasses in RediSearch (#1754)
* Adding RedisCluster client to support Redis Cluster Mode (#1660)
* Support RediSearch FT.PROFILE command (#1727)
* Adding support for non-decodable commands (#1731)
* COMMAND GETKEYS support (#1738)
* RedisJSON 2.0.4 behaviour support (#1747)
* Removing deprecating distutils (PEP 632) (#1730)
* Updating PR template (#1745)
* Removing duplication of Script class (#1751)
* Splitting documentation for read the docs (#1743)
* Improve code coverage for aggregation tests (#1713)
* Fixing COMMAND GETKEYS tests (#1750)
* GitHub release improvements (#1684)
* Release 4.0.2
* Restoring Sentinel commands to redis client (#1723)
* Better removal of hiredis warning (#1726)
* Adding links to redis documents in function calls (#1719)
* Release 4.0.1
* Removing command on initial connections (#1722)
* Removing hiredis warning when not installed (#1721)
* Release 4.0.0
* FT.EXPLAINCLI intentionally raising NotImplementedError
* Restoring ZRANGE desc for Redis < 6.2.0 (#1697)
* Response parsing occasionally fails to parse floats (#1692)
* Re-enabling read-the-docs (#1707)
* Call HSET after FT.CREATE to avoid keyspace scan (#1706)
* Unit tests fixes for compatibility (#1703)
* Improve documentation about Locks (#1701)
* Fixes to allow --redis-url to pass through all tests (#1700)
* Fix unit tests running against Redis 4.0.0 (#1699)
* Search alias test fix (#1695)
* Adding RediSearch/RedisJSON tests (#1691)
* Updating codecov rules (#1689)
* Tests to validate custom JSON decoders (#1681)
* Added breaking icon to release drafter (#1702)
* Removing dependency on six (#1676)
* Re-enable pipeline support for JSON and TimeSeries (#1674)
* Export Sentinel, and SSL like other classes (#1671)
* Restore zrange functionality for older versions of Redis (#1670)
* Fixed garbage collection deadlock (#1578)
* Tests to validate built python packages (#1678)
* Sleep for flaky search test (#1680)
* Test function renames, to match standards (#1679)
* Docstring improvements for Redis class (#1675)
* Fix georadius tests (#1672)
* Improvements to JSON coverage (#1666)
* Add python_requires setuptools check for python > 3.6 (#1656)
* SMISMEMBER support (#1667)
* Exposing the module version in loaded_modules (#1648)
* RedisTimeSeries support (#1652)
* Support for json multipath ($) (#1663)
* Added boolean parsing to PEXPIRE and PEXPIREAT (#1665)
* Add python_requires setuptools check for python > 3.6 (#1656)
* Adding vulture for static analysis (#1655)
* Starting to clean the docs (#1657)
* Update README.md (#1654)
* Adding description format for package (#1651)
* Publish to pypi as releases are generated with the release drafter (#1647)
* Restore actions to prs (#1653)
* Fixing the package to include commands (#1649)
* Re-enabling codecov as part of CI process (#1646)
* Adding support for redisearch (#1640) Thanks @chayim
* redisjson support (#1636) Thanks @chayim
* Sentinel: Add SentinelManagedSSLConnection (#1419) Thanks @AbdealiJK
* Enable floating parameters in SET (ex and px) (#1635) Thanks @AvitalFineRedis
* Add warning when hiredis not installed. Recommend installation. (#1621) Thanks @adiamzn
* Raising NotImplementedError for SCRIPT DEBUG and DEBUG SEGFAULT (#1624) Thanks @chayim
* CLIENT REDIR command support (#1623) Thanks @chayim
* REPLICAOF command implementation (#1622) Thanks @chayim
* Add support to NX XX and CH to GEOADD (#1605) Thanks @AvitalFineRedis
* Add support to ZRANGE and ZRANGESTORE parameters (#1603) Thanks @AvitalFineRedis
* Pre 6.2 redis should default to None for script flush (#1641) Thanks @chayim
* Add FULL option to XINFO SUMMARY (#1638) Thanks @agusdmb
* Geosearch test should use any=True (#1594) Thanks @Andrew-Chen-Wang
* Removing packaging dependency (#1626) Thanks @chayim
* Fix client_kill_filter docs for skimpy (#1596) Thanks @Andrew-Chen-Wang
* Normalize minid and maxlen docs (#1593) Thanks @Andrew-Chen-Wang
* Update docs for multiple usernames for ACL DELUSER (#1595) Thanks @Andrew-Chen-Wang
* Fix grammar of get param in set command (#1588) Thanks @Andrew-Chen-Wang
* Fix docs for client_kill_filter (#1584) Thanks @Andrew-Chen-Wang
* Convert README & CONTRIBUTING from rst to md (#1633) Thanks @davidylee
* Test BYLEX param in zrangestore (#1634) Thanks @AvitalFineRedis
* Tox integrations with invoke and docker (#1632) Thanks @chayim
* Adding the release drafter to help simplify release notes (#1618). Thanks @chayim
* BACKWARDS INCOMPATIBLE: Removed support for end of life Python 2.7. #1318
* BACKWARDS INCOMPATIBLE: All values within Redis URLs are unquoted via urllib.parse.unquote. Prior versions of redis-py supported this by specifying the `decode_components` flag to the `from_url` functions. This is now done by default and cannot be disabled. #589
* POTENTIALLY INCOMPATIBLE: Redis commands were moved into a mixin (see commands.py). Anyone importing `redis.client` to access commands directly should import `redis.commands`. #1534, #1550
* Removed technical debt on REDIS_6_VERSION placeholder. Thanks @chayim #1582.
* Various docus fixes. Thanks @Andrew-Chen-Wang #1585, #1586.
* Support for LOLWUT command, available since Redis 5.0.0. Thanks @brainix #1568.
* Added support for CLIENT REPLY, available in Redis 3.2.0. Thanks @chayim #1581.
* Support for Auto-reconnect PubSub on get_message. Thanks @luhn #1574.
* Fix RST syntax error in README/ Thanks @JanCBrammer #1451.
* IDLETIME and FREQ support for RESTORE. Thanks @chayim #1580.
* Supporting args with MODULE LOAD. Thanks @chayim #1579.
* Updating RedisLabs with Redis. Thanks @gkorland #1575.
* Added support for ASYNC to SCRIPT FLUSH available in Redis 6.2.0. Thanks @chayim. #1567
* Added CLIENT LIST fix to support multiple client ids available in Redis 2.8.12. Thanks @chayim #1563.
* Added DISCARD support for pipelines available in Redis 2.0.0. Thanks @chayim #1565.
* Added ACL DELUSER support for deleting lists of users available in Redis 6.2.0. Thanks @chayim. #1562
* Added CLIENT TRACKINFO support available in Redis 6.2.0. Thanks @chayim. #1560
* Added GEOSEARCH and GEOSEARCHSTORE support available in Redis 6.2.0. Thanks @AvitalFine Redis. #1526
* Added LPUSHX support for lists available in Redis 4.0.0. Thanks @chayim. #1559
* Added support for QUIT available in Redis 1.0.0. Thanks @chayim. #1558
* Added support for COMMAND COUNT available in Redis 2.8.13. Thanks @chayim. #1554.
* Added CREATECONSUMER support for XGROUP available in Redis 6.2.0. Thanks @AvitalFineRedis. #1553
* Including slowly complexity in INFO if available. Thanks @ian28223 #1489.
* Added support for STRALGO available in Redis 6.0.0. Thanks @AvitalFineRedis. #1528
* Addes support for ZMSCORE available in Redis 6.2.0. Thanks @2014BDuck and @jiekun.zhu. #1437
* Support MINID and LIMIT on XADD available in Redis 6.2.0. Thanks @AvitalFineRedis. #1548
* Added sentinel commands FLUSHCONFIG, CKQUORUM, FAILOVER, and RESET available in Redis 2.8.12. Thanks @otherpirate. #834
* Migrated Version instead of StrictVersion for Python 3.10. Thanks @tirkarthi. #1552
* Added retry mechanism with backoff. Thanks @nbraun-amazon. #1494
* Migrated commands to a mixin. Thanks @chayim. #1534
* Added support for ZUNION, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1522
* Added support for CLIENT LIST with ID, available in Redis 6.2.0. Thanks @chayim. #1505
* Added support for MINID and LIMIT with xtrim, available in Reds 6.2.0. Thanks @chayim. #1508
* Implemented LMOVE and BLMOVE commands, available in Redis 6.2.0. Thanks @chayim. #1504
* Added GET argument to SET command, available in Redis 6.2.0. Thanks @2014BDuck. #1412
* Documentation fixes. Thanks @enjoy-binbin @jonher937. #1496 #1532
* Added support for XAUTOCLAIM, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1529
* Added IDLE support for XPENDING, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1523
* Add a count parameter to lpop/rpop, available in Redis 6.2.0. Thanks @wavenator. #1487
* Added a (pypy) trove classifier for Python 3.9. Thanks @D3X. #1535
* Added ZINTER support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1520
* Added ZINTER support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1520
* Added ZDIFF and ZDIFFSTORE support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1518
* Added ZRANGESTORE support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1521
* Added LT and GT support for ZADD, available in Redis 6.2.0. Thanks @chayim. #1509
* Added ZRANDMEMBER support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1519
* Added GETDEL support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1514
* Added CLIENT KILL laddr filter, available in Redis 6.2.0. Thanks @chayim. #1506
* Added CLIENT UNPAUSE, available in Redis 6.2.0. Thanks @chayim. #1512
* Added NOMKSTREAM support for XADD, available in Redis 6.2.0. Thanks @chayim. #1507
* Added HRANDFIELD support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1513
* Added CLIENT INFO support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1517
* Added GETEX support, available in Redis 6.2.0. Thanks @AvitalFineRedis. #1515
* Added support for COPY command, available in Redis 6.2.0. Thanks @malinaa96. #1492
* Provide a development and testing environment via docker. Thanks @abrookins. #1365
* Added support for the LPOS command available in Redis 6.0.6. Thanks @aparcar #1353/#1354
* Added support for the ACL LOG command available in Redis 6. Thanks @2014BDuck. #1307
* Added support for ABSTTL option of the RESTORE command available in Redis 5.0. Thanks @charettes. #1423
* Drop account-defaults-redis.patch merged upstream
* Add account-defaults-redis.patch which fixes failing tests by taking into
consideration redis defaults, not overwriting them (gh#andymccurdy/redis-
py#1499).
* Skipp two tests because of gh#andymccurdy/redis-py#1459.
* update to 3.5.3
* Restore try/except clauses to **del** methods. These will be removed in 4.0
when more explicit resource management if enforced. #1339
* Update the master_address when Sentinels promote a new master. #847
* Update SentinelConnectionPool to not forcefully disconnect other in-use
connections which can negatively affect threaded applications. #1345 3.5.2
* Tune the locking in ConnectionPool.get_connection so that the lock is not
held while waiting for the socket to establish and validate the TCP
connection. 3.5.1
* Fix for HSET argument validation to allow any non-None key. Thanks
@AleksMat, #1337, #1341 3.5.0
* Removed exception trapping from **del** methods. redis-py objects that hold
various resources implement **del** cleanup methods to release those
resources when the object goes out of scope. This provides a fallback for
when these objects aren't explicitly closed by user code. Prior to this
change any errors encountered in closing these resources would be hidden
from the user. Thanks @jdufresne. #1281
* Expanded support for connection strings specifying a username connecting to
pre-v6 servers. #1274
* Optimized Lock's blocking_timeout and sleep. If the lock cannot be acquired
and the sleep value would cause the loop to sleep beyond blocking_timeout,
fail immediately. Thanks @clslgrnc. #1263
* Added support for passing Python memoryviews to Redis command args that
expect strings or bytes. The memoryview instance is sent directly to the
socket such that there are zero copies made of the underlying data during
command packing. Thanks @Cody-G. #1265, #1285
* HSET command now can accept multiple pairs. HMSET has been marked as
deprecated now. Thanks to @laixintao #1271
* Don't manually DISCARD when encountering an ExecAbortError. Thanks
@nickgaya, #1300/#1301
* Reset the watched state of pipelines after calling exec. This saves a
roundtrip to the server by not having to call UNWATCH within
Pipeline.reset(). Thanks @nickgaya, #1299/#1302
* Added the KEEPTTL option for the SET command. Thanks @laixintao #1304/#1280
* Added the MEMORY STATS command. #1268
* Lock.extend() now has a new option, `replace_ttl`. When False (the default),
Lock.extend() adds the `additional_time` to the lock's existing TTL. When
replace_ttl=True, the lock's existing TTL is replaced with the value of
`additional_time`.
* Add testing and support for PyPy.
* downgrade requires for redis to recommends
* Better error handling Changes in python-retrying:
* Switch package to modern Python Stack on SLE-15
* Add %{?sle15_python_module_pythons}
* require setuptools
* Switch to pyproject macros.
* Stop using greedy globs in %files.
* Update to version 1.3.4
* Added Greg Roodt as maintainer
* Formatted code with black
* Updated repository references
* Improve summary.
* Remove superfluous devel dependency for noarch package
* Initial package Changes in python-semver:
* update to 3.0.2:
* :pr:`418`: Replace :class:`~collection.OrderedDict` with :class:`dict`.
* The dict datatype is ordered since Python 3.7. As we do not support Python
3.6 anymore, it can be considered safe to avoid
:class:`~collection.OrderedDict`.
* :pr:`431`: Clarify version policy for the different semver versions (v2, v3,
>v3) and the supported Python versions.
* :gh:`432`: Improve external doc links to Python and Pydantic.
* :pr:`417`: Amend GitHub Actions to check against MacOS.
* remove obsolete setup-remove-asterisk.patch
* update to version 3.0.1:
* Remove incorrect dependencies from build-system section of pyproject.toml by
@mgorny in #405
* correct typo in function description of next_version by @treee111 in #406
* Improve GitHub Action by @tomschr in #408
* Add CITATION.cff for citation by @tomschr in #409
* Add Version class to **all** export. Fix #410 by @Soneji in #411
* Configure docformatter by @tomschr in #412
* Prepare version 3.0.1 by @tomschr in #413
* update to version 3.0.0:
* Bugfixes
* :gh:`291`: Disallow negative numbers in VersionInfo arguments for `major`,
`minor`, and `patch`.
* :gh:`310`: Rework API documentation. Follow a more "semi-manual" attempt and
add auto directives into :file:`docs/api.rst`.
* :gh:`344`: Allow empty string, a string with a prefix, or `None` as token in
:meth:`~semver.version.Version.bump_build` and
:meth:`~semver.version.Version.bump_prerelease`.
* :pr:`384`: General cleanup, reformat files:
* Reformat source code with black again as some config options did accidentely exclude the semver source code. Mostly remove some includes/excludes in the black config.
* Integrate concurrency in GH Action
* Ignore Python files on project dirs in .gitignore
* Remove unused patterns in MANIFEST.in
* Use `extend-exclude` for flake in :file:`setup.cfg`` and adapt list.
* Use `skip_install=True` in :file:`tox.ini` for black
* :pr:`393`: Fix command :command:`python -m semver` to avoid the error
"invalid choice"
* :pr:`396`: Calling :meth:`~semver.version.Version.parse` on a derived class
will show correct type of derived class.
* Deprecations
* :gh:`169`: Deprecate CLI functions not imported from `semver.cli`.
* :gh:`234`: In :file:`setup.py` simplified file and remove `Tox` and `Clean`
classes
* :gh:`284`: Deprecate the use of :meth:`~Version.isvalid`. Rename
:meth:`~semver.version.Version.isvalid` to
:meth:`~semver.version.Version.is_valid` for consistency reasons with
:meth:`~semver.version.Version.is_compatible`.
* :pr:`402`: Keep :func:`semver.compare <semver._deprecated.compare>`.
Although it breaks consistency with module level functions, it seems it's a
much needed/used function. It's still unclear if we should deprecate this
function or not (that's why we use :py:exc:`PendingDeprecationWarning`). As
we don't have a uniform initializer yet, this function stays in the
:file:`_deprecated.py` file for the time being until we find a better
solution. See :gh:`258` for details.
* Features
* Remove :file:`semver.py`
* Create :file:`src/semver/__init__.py`
* Create :file:`src/semver/cli.py` for all CLI methods
* Create :file:`src/semver/_deprecated.py` for the `deprecated` decorator and
other deprecated functions
* Create :file:`src/semver/__main__.py` to allow calling the CLI using
:command:`python -m semver`
* Create :file:`src/semver/_types.py` to hold type aliases
* Create :file:`src/semver/version.py` to hold the :class:`Version` class (old
name :class:`VersionInfo`) and its utility functions
* Create :file:`src/semver/__about__.py` for all the metadata variables
* :gh:`213`: Add typing information
* :gh:`284`: Implement :meth:`~semver.version.Version.is_compatible` to make
"is self compatible with X".
* :gh:`305`: Rename :class:`~semver.version.VersionInfo` to
:class:`~semver.version.Version` but keep an alias for compatibility
* add setup-remove-asterisk.patch to fix build error
* update to version 3.0.0-dev.4:
* Bug Fixes:
* :gh:`374`: Correct Towncrier's config entries in the :file:`pyproject.toml`
file. The old entries `[[tool.towncrier.type]]` are deprecated and need to
be replaced by `[tool.towncrier.fragment.<TYPE>]`.
* Deprecations:
* :gh:`372`: Deprecate support for Python 3.6. Python 3.6 reached its end of
life and isn't supported anymore. At the time of writing (Dec 2022), the
lowest version is 3.7. Although the `poll <https://github.com/python-
semver/python-semver/discussions/371>`_ didn't cast many votes, the
majority agree to remove support for Python 3.6.
* Improved Documentation:
* :gh:`335`: Add new section "Converting versions between PyPI and semver" the
limitations and possible use cases to convert from one into the other
versioning scheme.
* :gh:`340`: Describe how to get version from a file
* :gh:`343`: Describe combining Pydantic with semver in the "Advanced topic"
section.
* :gh:`350`: Restructure usage section. Create subdirectory "usage/" and
splitted all section into different files.
* :gh:`351`: Introduce new topics for:
* "Migration to semver3"
* "Advanced topics"
* Features:
* :pr:`359`: Add optional parameter `optional_minor_and_patch` in
:meth:`.Version.parse` to allow optional minor and patch parts.
* :pr:`362`: Make :meth:`.Version.match` accept a bare version string as match
expression, defaulting to equality testing.
* :gh:`364`: Enhance :file:`pyproject.toml` to make it possible to use the
:command:`pyproject-build` command from the build module. For more
information, see :ref:`build-semver`.
* :gh:`365`: Improve :file:`pyproject.toml`.
* Use setuptools, add metadata. Taken approach from `A Practical Guide to
Setuptools and Pyproject.toml <https://godatadriven.com/blog/a-practical-
guide-to-setuptools-and-pyproject-toml/>`_.
* Doc: Describe building of semver
* Remove :file:`.travis.yml` in :file:`MANIFEST.in` (not needed anymore)
* Distinguish between Python 3.6 and others in :file:`tox.ini`
* Add skip_missing_interpreters option for :file:`tox.ini`
* GH Action: Upgrade setuptools and setuptools-scm and test against
3.11.0-rc.2
* Trivial/Internal Changes:
* :gh:`378`: Fix some typos in Towncrier configuration
* switch to the tagged version rather than a gh branch tarball
* fix support for Python 3.10 with update to development version:
* update to revision g4d2df08:
* Changes for the upcoming release can be found in:
* the `"changelog.d" directory <https://github.com/python-
semver/python-semver/tree/master/changelog.d>`_:
* in our repository.:
* update to version 3.0.0-dev.2:
* Deprecations:
* :gh:`169`: Deprecate CLI functions not imported from `semver.cli`.
* Features:
* :gh:`169`: Create semver package and split code among different modules in
the packages.
* Remove :file:`semver.py`
* Create :file:`src/semver/__init__.py`
* Create :file:`src/semver/cli.py` for all CLI methods
* Create :file:`src/semver/_deprecated.py` for the `deprecated` decorator and
other deprecated functions
* Create :file:`src/semver/__main__.py` to allow calling the CLI using
:command:`python -m semver`
* Create :file:`src/semver/_types.py` to hold type aliases
* Create :file:`src/semver/version.py` to hold the :class:`Version` class (old
name :class:`VersionInfo`) and its utility functions
* Create :file:`src/semver/__about__.py` for all the metadata variables
* :gh:`305`: Rename :class:`VersionInfo` to :class:`Version` but keep an alias
for compatibility
* Improved Documentation:
* :gh:`304`: Several improvements in documentation:
* Reorganize API documentation.
* Add migration chapter from semver2 to semver3.
* Distinguish between changlog for version 2 and 3
* :gh:`305`: Add note about :class:`Version` rename.
* Trivial/Internal Changes:
* :gh:`169`: Adapted infrastructure code to the new project layout.
* Replace :file:`setup.py` with :file:`setup.cfg` because the
:file:`setup.cfg` is easier to use
* Adapt documentation code snippets where needed
* Adapt tests
* Changed the `deprecated` to hardcode the `semver` package name in the
warning. Increase coverage to 100% for all non-deprecated APIs
* :gh:`304`: Support PEP-561 :file:`py.typed`. According to the mentioned PEP:
"Package maintainers who wish to support type checking of their code MUST
add a marker file named :file:`py.typed` to their package supporting
typing." Add package_data to :file:`setup.cfg` to include this marker in
dist and whl file.
* update to version 3.0.0-dev.1:
* Deprecations:
* :pr:`290`: For semver 3.0.0-alpha0:
* Remove anything related to Python2
* In :file:`tox.ini` and :file:`.travis.yml` Remove targets py27, py34, py35,
and pypy. Add py38, py39, and nightly (allow to fail)
* In :file:`setup.py` simplified file and remove `Tox` and `Clean` classes
* Remove old Python versions (2.7, 3.4, 3.5, and pypy) from Travis
* :gh:`234`: In :file:`setup.py` simplified file and remove `Tox` and `Clean`
classes
* Features:
* :pr:`290`: Create semver 3.0.0-alpha0
* Update :file:`README.rst`, mention maintenance branch `maint/v2`.
* Remove old code mainly used for Python2 compatibility, adjusted code to
support Python3 features.
* Split test suite into separate files under :file:`tests/` directory
* Adjust and update :file:`setup.py`. Requires Python >=3.6.* Extract metadata
directly from source (affects all the `__version__`, `__author__` etc.
variables)
* :gh:`270`: Configure Towncrier (:pr:`273`:)
* Add :file:`changelog.d/.gitignore` to keep this directory
* Create :file:`changelog.d/README.rst` with some descriptions
* Add :file:`changelog.d/_template.rst` as Towncrier template
* Add `[tool.towncrier]` section in :file:`pyproject.toml`
* Add "changelog" target into :file:`tox.ini`. Use it like :command:`tox -e
changelog -- CMD` whereas `CMD` is a Towncrier command. The default
:command:`tox -e changelog` calls Towncrier to create a draft of the
changelog file and output it to stdout.
* Update documentation and add include a new section "Changelog" included from
:file:`changelog.d/README.rst`.
* :gh:`276`: Document how to create a sublass from :class:`VersionInfo` class
* :gh:`213`: Add typing information
* Bug Fixes:
* :gh:`291`: Disallow negative numbers in VersionInfo arguments for `major`,
`minor`, and `patch`.
* Improved Documentation:
* :pr:`290`: Several improvements in the documentation:
* New layout to distinguish from the semver2 development line.
* Create new logo.
* Remove any occurances of Python2.
* Describe changelog process with Towncrier.
* Update the release process.
* Trivial/Internal Changes:
* :pr:`290`: Add supported Python versions to :command:`black`.
* PR #62. Support custom default names for pre and build Changes in python-
sshtunnel:
* Require update-alternatives for the scriptlets.
* Switch build system from setuptools to pyproject.toml
* Add python-pip and python-wheel to BuildRequires
* Replace %python_build with %pyproject_wheel
* Replace %python_install with %pyproject_install
* Limit Python files matched in %files section
* Use %sle15_python_module_pythons
* do not require python-mock for build
* update to 0.4.0:
* Change the daemon mod flag for all tunnel threads (is not fully backward compatible) to prevent unexpected hangs (`#219`_) + Add docker based end to end functinal tests for Mongo/Postgres/MySQL
* Add docker based end to end hangs tests
* Fix host key directory detection
* Unify default ssh config folder to `~/.ssh`
* Increase open connection timeout to 10 secods
* Change default with context behavior to use `.stop(force=True)` on exit
* Remove useless `daemon_forward_servers = True` hack for hangs prevention
* Set transport keepalive to 5 second by default
* Set default transport timeout to 0.1
* Deprecate and remove `block_on_close` option
* Fix "deadlocks" / "tunneling hangs"
* Add `.stop(force=True)` for force close active connections
* Fixes bug with orphan thread for a tunnel that is DOWN
* Support IPv6 without proxy command. Use built-in paramiko create socket logic. The logic tries to use ipv6 socket family first, then ipv4 socket family.
Changes in python-strictyaml:
* require setuptools
* update to 1.7.3:
* REFACTOR : Fix pipeline.
* TOOLING : Improvements to pyenv multi-environment tester.
* FEATURE : Upgraded package to use pyproject.toml files
* REFACTOR : Fixed linter errors.
* TOOLING : Build wheel and sdist that both work.
* Add %{?sle15_python_module_pythons}
* Update to 1.6.2 No relevant code changes. see details changelog:
https://hitchdev.com/strictyaml/changelog/#latest
* update to 1.6.1 too many changes to be listed here see detailed changelog:
https://hitchdev.com/strictyaml/changelog/
* update to 1.4.4
* Add support for NaN and infinity representations
* Optional keys in mappings and set value to None
* Support underscores in int and decimal
* NullNone - parse 'null' as None like YAML 1.2 does.
* Bundle last propertly working ruamel.yaml version in with strictyaml.
* version update to 1.0.6
* BUGFIX : Fix accidental python 2 breakage.
* BUGFIX : Accidental misrecognition of boolean values as numbers - cause of
#85.
* BUGFIX : Fix for #86 - handle changing multiline strings.
* BUGFIX: handle deprecated collections import in the parser (#82)
* Update to 1.0.5:
* BUGFIX : Fixed python 2 bug introduced when fixing #72.
* FEATURE : Include tests / stories in package.
* BUG: issue #72. Now setitem uses schema.
* Expand %description.
* Initial spec for v1.0.3 Changes in python-sure:
* Switch build system from setuptools to pyproject.toml
* Add python-pip and python-wheel to BuildRequires
* Replace %python_build with %pyproject_wheel
* Replace %python_install with %pyproject_install
* update to 2.0.1:
* Fixes CI build (Github Actions)
* Fixes broken tests
* Housekeeping: Licensing
* Disable nosetests for testing leaving only pytest as supported test-runner
for now
* Add %{?sle15_python_module_pythons}
* Remove mock from BuildRequires.
* Rebase python-sure-no-mock.patch to remove one missed import.
* do not require mock for build nor runtime
* added patches fix https://github.com/gabrielfalcao/sure/pull/161
* python-sure-no-mock.patch
* Update to 2.0.0
* No longer patch the builtin dir() function, which fixes pytest in some cases
such as projects using gevent.
* switch to pytest
* Version update to 1.4.11:
* Reading the version dynamically was causing import errors that caused error
when installing package. Refs #144
Changes in python-vcrpy: \- Update to 6.0.1 * BREAKING: Fix issue with httpx
support (thanks @parkerhancock) in #784. * BREAKING: Drop support for `boto`
(vcrpy still supports boto3, but is dropping the deprecated `boto` support in
this release. (thanks @jairhenrique) * Fix compatibility issue with Python 3.12
(thanks @hartwork) * Drop simplejson (fixes some compatibility issues) (thanks
@jairhenrique) * Run CI on Python 3.12 and PyPy 3.9-3.10 (thanks @mgorny) *
Various linting and docs improvements (thanks @jairhenrique) * Tornado fixes
(thanks @graingert)
* version update to 5.1.0
* Use ruff for linting (instead of current flake8/isort/pyflakes) - thanks
@jairhenrique
* Enable rule B (flake8-bugbear) on ruff - thanks @jairhenrique
* Configure read the docs V2 - thanks @jairhenrique
* Fix typo in docs - thanks @quasimik
* Make json.loads of Python >=3.6 decode bytes by itself - thanks @hartwork
* Fix body matcher for chunked requests (fixes #734) - thanks @hartwork
* Fix query param filter for aiohttp (fixes #517) - thanks @hartwork and
@salomvary
* Remove unnecessary dependency on six. - thanks @charettes
* build(deps): update sphinx requirement from <7 to <8 - thanks @jairhenrique
* Add action to validate docs - thanks @jairhenrique
* Add editorconfig file - thanks @jairhenrique
* Drop iscoroutinefunction fallback function for unsupported python thanks
@jairhenrique
* for changelog for older releases refer to
https://github.com/kevin1024/vcrpy/releases
* six is not required
* Use sle15_python_module_pythons
* Restrict urllib3 < 2 -- gh#kevin1024/vcrpy#688
* Update to version 4.2.1
* Fix a bug where the first request in a redirect chain was not being recorded
with aiohttp
* Various typos and small fixes, thanks @jairhenrique, @timgates42
* Update to 4.1.1:
* Fix HTTPX support for versions greater than 0.15 (thanks @jairhenrique)
* Include a trailing newline on json cassettes (thanks @AaronRobson)
* Update to 4.1.0:
* Add support for httpx!! (thanks @herdigiorgi)
* Add the new allow_playback_repeats option (thanks @tysonholub)
* Several aiohttp improvements (cookie support, multiple headers with same
key) (Thanks @pauloromeira)
* Use enums for record modes (thanks @aaronbannin)
* Bugfix: Do not redirect on 304 in aiohttp (Thanks @royjs)
* Bugfix: Fix test suite by switching to mockbin (thanks @jairhenrique)
* Remove patch 0001-Revert-v4.0.x-Remove-legacy-python-and-add-python3.8.patch
as we dropped py2 integration support on Tumbleweed
* Added patch 0001-Revert-v4.0.x-Remove-legacy-python-and-add-python3.8.patch
* Enable python2 again since it breaks many packages
* Fix locale on Leap
* update to version 4.0.2
* Remove Python2 support
* Add Python 3.8 TravisCI support
* Correct mock imports
Changes in python-xmltodict: \- Clean up the SPEC file.
* add sle15_python_module_pythons
* update to 0.13.0:
* Add install info to readme for openSUSE. (#205)
* Support defaultdict for namespace mapping (#211)
* parse(generator) is now possible (#212)
* Processing comments on parsing from xml to dict (connected to #109) (#221)
* Add expand_iter kw to unparse to expand iterables (#213)
* Fixed some typos
* Add support for python3.8
* Drop Jython/Python 2 and add Python 3.9/3.10.
* Drop OrderedDict in Python >= 3.7
* Do not use len() to determine if a sequence is empty
* Add more namespace attribute tests
* Fix encoding issue in setup.py
* Add patch skip-tests-expat-245.patch:
* Do not run tests that make no sense with a current Expat.
Changes in python-asgiref:
First package shipment.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1639=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1639=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1639=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1639=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1639=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1639=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-Twisted-http2-22.10.0-150400.5.17.4
* python311-isodate-0.6.1-150400.12.7.2
* python311-lexicon-2.0.1-150400.10.7.1
* python311-sortedcontainers-2.4.0-150400.8.7.4
* python311-opentelemetry-semantic-conventions-0.44b0-150400.9.3.1
* python311-requests-oauthlib-1.3.1-150400.12.7.1
* python311-fakeredis-2.21.0-150400.9.3.4
* python311-paramiko-3.4.0-150400.13.10.4
* python311-scp-0.14.5-150400.12.7.4
* python311-tabulate-0.9.0-150400.11.7.4
* python311-chardet-5.2.0-150400.13.7.2
* python311-pydash-6.0.2-150400.9.4.1
* python311-service_identity-23.1.0-150400.8.7.1
* python311-opencensus-ext-threading-0.1.2-150400.10.6.1
* python311-oauthlib-3.2.2-150400.12.7.4
* python311-httpretty-1.1.4-150400.11.4.1
* python311-opencensus-0.11.4-150400.10.6.3
* python311-antlr4-python3-runtime-4.13.1-150400.10.4.1
* python311-Twisted-tls-22.10.0-150400.5.17.4
* python311-PyGithub-1.57-150400.10.4.4
* python311-fixedint-0.2.0-150400.9.3.1
* python-paramiko-doc-3.4.0-150400.13.10.4
* python-tqdm-bash-completion-4.66.1-150400.9.7.4
* python311-typing_extensions-4.5.0-150400.3.9.1
* python311-Twisted-22.10.0-150400.5.17.4
* python311-semver-3.0.2-150400.10.4.1
* python311-Deprecated-1.2.14-150400.10.7.2
* python311-opentelemetry-test-utils-0.44b0-150400.9.3.1
* python311-pyparsing-3.0.9-150400.5.7.4
* python311-vcrpy-6.0.1-150400.7.4.4
* python311-sshtunnel-0.4.0-150400.5.4.4
* python311-xmltodict-0.13.0-150400.12.4.1
* python311-zipp-3.15.0-150400.10.7.1
* python311-opentelemetry-api-1.23.0-150400.10.7.1
* python311-websocket-client-1.5.1-150400.13.7.1
* python311-httplib2-0.22.0-150400.10.4.1
* python311-strictyaml-1.7.3-150400.9.3.4
* python311-Automat-22.10.0-150400.3.7.2
* python311-Twisted-conch-22.10.0-150400.5.17.4
* python311-javaproperties-0.8.1-150400.10.4.4
* python311-wheel-0.40.0-150400.13.7.4
* python311-blinker-1.6.2-150400.12.7.4
* python311-decorator-5.1.1-150400.12.7.4
* python311-tqdm-4.66.1-150400.9.7.4
* python311-hyperlink-21.0.0-150400.12.7.4
* python311-Pygments-2.15.1-150400.7.7.4
* python311-Twisted-conch_nacl-22.10.0-150400.5.17.4
* python311-distro-1.9.0-150400.12.4.1
* python311-Twisted-all_non_platform-22.10.0-150400.5.17.4
* python311-aiosignal-1.3.1-150400.9.7.2
* python311-humanfriendly-10.0-150400.13.7.4
* python311-incremental-22.10.0-150400.3.7.2
* python311-marshmallow-3.20.2-150400.9.7.1
* python311-pkginfo-1.9.6-150400.7.7.1
* python311-portalocker-2.7.0-150400.10.7.4
* python311-async_timeout-4.0.2-150400.10.7.2
* python311-Twisted-contextvars-22.10.0-150400.5.17.4
* python311-Twisted-serial-22.10.0-150400.5.17.4
* python311-invoke-2.1.2-150400.10.7.4
* python311-asgiref-3.6.0-150400.9.7.3
* python311-pip-22.3.1-150400.17.16.4
* python311-PyJWT-2.8.0-150400.8.7.2
* python311-fluidity-sm-0.2.0-150400.10.7.2
* python311-redis-5.0.1-150400.12.4.4
* python311-constantly-15.1.0-150400.12.7.2
* python311-pycomposefile-0.0.30-150400.9.3.1
* python311-importlib-metadata-6.8.0-150400.10.9.2
* python311-retrying-1.3.4-150400.12.4.1
* python311-opentelemetry-sdk-1.23.0-150400.9.3.1
* python311-avro-1.11.3-150400.10.4.1
* python311-knack-0.11.0-150400.10.4.4
* python311-pathspec-0.11.1-150400.9.7.2
* python311-opencensus-context-0.1.3-150400.10.6.1
* python311-Fabric-3.2.2-150400.10.4.1
* python311-sure-2.0.1-150400.12.4.4
* python311-docker-7.0.0-150400.8.4.4
* python311-argcomplete-3.3.0-150400.12.12.2
* python311-jsondiff-2.0.0-150400.10.4.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-multidict-6.0.4-150400.7.7.4
* python311-aiohttp-debuginfo-3.9.3-150400.10.18.4
* python-zope.interface-debugsource-6.0-150400.12.7.4
* python311-frozenlist-debuginfo-1.3.3-150400.9.7.2
* python311-psutil-debuginfo-5.9.5-150400.6.9.4
* python-frozenlist-debugsource-1.3.3-150400.9.7.2
* python311-aiohttp-3.9.3-150400.10.18.4
* python311-zope.interface-6.0-150400.12.7.4
* python311-wrapt-1.15.0-150400.12.7.1
* python-multidict-debugsource-6.0.4-150400.7.7.4
* python-yarl-debugsource-1.9.2-150400.8.7.4
* python-psutil-debugsource-5.9.5-150400.6.9.4
* python311-yarl-debuginfo-1.9.2-150400.8.7.4
* python311-frozenlist-1.3.3-150400.9.7.2
* python-wrapt-debugsource-1.15.0-150400.12.7.1
* python311-zope.interface-debuginfo-6.0-150400.12.7.4
* python-aiohttp-debugsource-3.9.3-150400.10.18.4
* python311-multidict-debuginfo-6.0.4-150400.7.7.4
* python311-yarl-1.9.2-150400.8.7.4
* python311-wrapt-debuginfo-1.15.0-150400.12.7.1
* python311-psutil-5.9.5-150400.6.9.4
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-multidict-6.0.4-150400.7.7.4
* python311-aiohttp-debuginfo-3.9.3-150400.10.18.4
* python-zope.interface-debugsource-6.0-150400.12.7.4
* python311-frozenlist-debuginfo-1.3.3-150400.9.7.2
* python311-psutil-debuginfo-5.9.5-150400.6.9.4
* python-frozenlist-debugsource-1.3.3-150400.9.7.2
* python311-aiohttp-3.9.3-150400.10.18.4
* python311-zope.interface-6.0-150400.12.7.4
* python311-wrapt-1.15.0-150400.12.7.1
* python-multidict-debugsource-6.0.4-150400.7.7.4
* python-yarl-debugsource-1.9.2-150400.8.7.4
* python-psutil-debugsource-5.9.5-150400.6.9.4
* python311-yarl-debuginfo-1.9.2-150400.8.7.4
* python311-frozenlist-1.3.3-150400.9.7.2
* python-wrapt-debugsource-1.15.0-150400.12.7.1
* python311-zope.interface-debuginfo-6.0-150400.12.7.4
* python-aiohttp-debugsource-3.9.3-150400.10.18.4
* python311-multidict-debuginfo-6.0.4-150400.7.7.4
* python311-yarl-1.9.2-150400.8.7.4
* python311-wrapt-debuginfo-1.15.0-150400.12.7.1
* python311-psutil-5.9.5-150400.6.9.4
* openSUSE Leap 15.5 (noarch)
* python311-Twisted-http2-22.10.0-150400.5.17.4
* python311-isodate-0.6.1-150400.12.7.2
* python311-lexicon-2.0.1-150400.10.7.1
* python311-sortedcontainers-2.4.0-150400.8.7.4
* python311-requests-oauthlib-1.3.1-150400.12.7.1
* python311-paramiko-3.4.0-150400.13.10.4
* python311-scp-0.14.5-150400.12.7.4
* python311-tabulate-0.9.0-150400.11.7.4
* python311-chardet-5.2.0-150400.13.7.2
* python311-service_identity-23.1.0-150400.8.7.1
* python311-oauthlib-3.2.2-150400.12.7.4
* python-paramiko-doc-3.4.0-150400.13.10.4
* python311-Twisted-tls-22.10.0-150400.5.17.4
* python-tqdm-bash-completion-4.66.1-150400.9.7.4
* python311-typing_extensions-4.5.0-150400.3.9.1
* python311-Twisted-22.10.0-150400.5.17.4
* python311-Deprecated-1.2.14-150400.10.7.2
* python311-pyparsing-3.0.9-150400.5.7.4
* python311-zipp-3.15.0-150400.10.7.1
* python311-opentelemetry-api-1.23.0-150400.10.7.1
* python311-websocket-client-1.5.1-150400.13.7.1
* python311-Automat-22.10.0-150400.3.7.2
* python311-Twisted-conch-22.10.0-150400.5.17.4
* python311-wheel-0.40.0-150400.13.7.4
* python311-blinker-1.6.2-150400.12.7.4
* python311-decorator-5.1.1-150400.12.7.4
* python311-tqdm-4.66.1-150400.9.7.4
* python311-hyperlink-21.0.0-150400.12.7.4
* python311-Pygments-2.15.1-150400.7.7.4
* python311-Twisted-conch_nacl-22.10.0-150400.5.17.4
* python311-distro-1.9.0-150400.12.4.1
* python311-Twisted-all_non_platform-22.10.0-150400.5.17.4
* python311-aiosignal-1.3.1-150400.9.7.2
* python311-humanfriendly-10.0-150400.13.7.4
* python311-incremental-22.10.0-150400.3.7.2
* python311-pkginfo-1.9.6-150400.7.7.1
* python311-portalocker-2.7.0-150400.10.7.4
* python311-async_timeout-4.0.2-150400.10.7.2
* python311-Twisted-contextvars-22.10.0-150400.5.17.4
* python311-Twisted-serial-22.10.0-150400.5.17.4
* python311-invoke-2.1.2-150400.10.7.4
* python311-pip-22.3.1-150400.17.16.4
* python311-PyJWT-2.8.0-150400.8.7.2
* python311-fluidity-sm-0.2.0-150400.10.7.2
* python311-constantly-15.1.0-150400.12.7.2
* python311-importlib-metadata-6.8.0-150400.10.9.2
* python311-pathspec-0.11.1-150400.9.7.2
* python311-argcomplete-3.3.0-150400.12.12.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python311-multidict-6.0.4-150400.7.7.4
* python311-aiohttp-debuginfo-3.9.3-150400.10.18.4
* python-zope.interface-debugsource-6.0-150400.12.7.4
* python311-frozenlist-debuginfo-1.3.3-150400.9.7.2
* python311-psutil-debuginfo-5.9.5-150400.6.9.4
* python-frozenlist-debugsource-1.3.3-150400.9.7.2
* python311-aiohttp-3.9.3-150400.10.18.4
* python311-zope.interface-6.0-150400.12.7.4
* python311-wrapt-1.15.0-150400.12.7.1
* python-multidict-debugsource-6.0.4-150400.7.7.4
* python-yarl-debugsource-1.9.2-150400.8.7.4
* python-psutil-debugsource-5.9.5-150400.6.9.4
* python311-yarl-debuginfo-1.9.2-150400.8.7.4
* python311-frozenlist-1.3.3-150400.9.7.2
* python-wrapt-debugsource-1.15.0-150400.12.7.1
* python311-zope.interface-debuginfo-6.0-150400.12.7.4
* python-aiohttp-debugsource-3.9.3-150400.10.18.4
* python311-multidict-debuginfo-6.0.4-150400.7.7.4
* python311-yarl-1.9.2-150400.8.7.4
* python311-wrapt-debuginfo-1.15.0-150400.12.7.1
* python311-psutil-5.9.5-150400.6.9.4
* openSUSE Leap 15.6 (noarch)
* python311-Twisted-http2-22.10.0-150400.5.17.4
* python311-isodate-0.6.1-150400.12.7.2
* python311-lexicon-2.0.1-150400.10.7.1
* python311-sortedcontainers-2.4.0-150400.8.7.4
* python311-requests-oauthlib-1.3.1-150400.12.7.1
* python311-paramiko-3.4.0-150400.13.10.4
* python311-scp-0.14.5-150400.12.7.4
* python311-tabulate-0.9.0-150400.11.7.4
* python311-chardet-5.2.0-150400.13.7.2
* python311-service_identity-23.1.0-150400.8.7.1
* python311-oauthlib-3.2.2-150400.12.7.4
* python-paramiko-doc-3.4.0-150400.13.10.4
* python311-Twisted-tls-22.10.0-150400.5.17.4
* python-tqdm-bash-completion-4.66.1-150400.9.7.4
* python311-Twisted-22.10.0-150400.5.17.4
* python311-Deprecated-1.2.14-150400.10.7.2
* python311-pyparsing-3.0.9-150400.5.7.4
* python311-opentelemetry-api-1.23.0-150400.10.7.1
* python311-websocket-client-1.5.1-150400.13.7.1
* python311-Automat-22.10.0-150400.3.7.2
* python311-Twisted-conch-22.10.0-150400.5.17.4
* python311-blinker-1.6.2-150400.12.7.4
* python311-decorator-5.1.1-150400.12.7.4
* python311-tqdm-4.66.1-150400.9.7.4
* python311-hyperlink-21.0.0-150400.12.7.4
* python311-Pygments-2.15.1-150400.7.7.4
* python311-Twisted-conch_nacl-22.10.0-150400.5.17.4
* python311-humanfriendly-10.0-150400.13.7.4
* python311-Twisted-all_non_platform-22.10.0-150400.5.17.4
* python311-aiosignal-1.3.1-150400.9.7.2
* python311-incremental-22.10.0-150400.3.7.2
* python311-marshmallow-3.20.2-150400.9.7.1
* python311-pkginfo-1.9.6-150400.7.7.1
* python311-portalocker-2.7.0-150400.10.7.4
* python311-async_timeout-4.0.2-150400.10.7.2
* python311-Twisted-contextvars-22.10.0-150400.5.17.4
* python311-Twisted-serial-22.10.0-150400.5.17.4
* python311-invoke-2.1.2-150400.10.7.4
* python311-asgiref-3.6.0-150400.9.7.3
* python311-pip-22.3.1-150400.17.16.4
* python311-PyJWT-2.8.0-150400.8.7.2
* python311-fluidity-sm-0.2.0-150400.10.7.2
* python311-constantly-15.1.0-150400.12.7.2
* python311-importlib-metadata-6.8.0-150400.10.9.2
* python311-pathspec-0.11.1-150400.9.7.2
* python311-argcomplete-3.3.0-150400.12.12.2
* Public Cloud Module 15-SP4 (noarch)
* python311-isodate-0.6.1-150400.12.7.2
* python311-lexicon-2.0.1-150400.10.7.1
* python311-sortedcontainers-2.4.0-150400.8.7.4
* python311-opentelemetry-semantic-conventions-0.44b0-150400.9.3.1
* python311-requests-oauthlib-1.3.1-150400.12.7.1
* python311-fakeredis-2.21.0-150400.9.3.4
* python311-paramiko-3.4.0-150400.13.10.4
* python311-scp-0.14.5-150400.12.7.4
* python311-tabulate-0.9.0-150400.11.7.4
* python311-chardet-5.2.0-150400.13.7.2
* python311-pydash-6.0.2-150400.9.4.1
* python311-service_identity-23.1.0-150400.8.7.1
* python311-opencensus-0.11.4-150400.10.6.3
* python311-oauthlib-3.2.2-150400.12.7.4
* python311-httpretty-1.1.4-150400.11.4.1
* python311-opencensus-ext-threading-0.1.2-150400.10.6.1
* python311-antlr4-python3-runtime-4.13.1-150400.10.4.1
* python311-Twisted-tls-22.10.0-150400.5.17.4
* python311-PyGithub-1.57-150400.10.4.4
* python311-fixedint-0.2.0-150400.9.3.1
* python311-typing_extensions-4.5.0-150400.3.9.1
* python311-Twisted-22.10.0-150400.5.17.4
* python311-semver-3.0.2-150400.10.4.1
* python311-Deprecated-1.2.14-150400.10.7.2
* python311-opentelemetry-test-utils-0.44b0-150400.9.3.1
* python311-pyparsing-3.0.9-150400.5.7.4
* python311-vcrpy-6.0.1-150400.7.4.4
* python311-sshtunnel-0.4.0-150400.5.4.4
* python311-xmltodict-0.13.0-150400.12.4.1
* python311-zipp-3.15.0-150400.10.7.1
* python311-opentelemetry-api-1.23.0-150400.10.7.1
* python311-websocket-client-1.5.1-150400.13.7.1
* python311-httplib2-0.22.0-150400.10.4.1
* python311-strictyaml-1.7.3-150400.9.3.4
* python311-Automat-22.10.0-150400.3.7.2
* python311-javaproperties-0.8.1-150400.10.4.4
* python311-wheel-0.40.0-150400.13.7.4
* python311-blinker-1.6.2-150400.12.7.4
* python311-decorator-5.1.1-150400.12.7.4
* python311-tqdm-4.66.1-150400.9.7.4
* python311-hyperlink-21.0.0-150400.12.7.4
* python311-Pygments-2.15.1-150400.7.7.4
* python311-humanfriendly-10.0-150400.13.7.4
* python311-distro-1.9.0-150400.12.4.1
* python311-aiosignal-1.3.1-150400.9.7.2
* python311-incremental-22.10.0-150400.3.7.2
* python311-marshmallow-3.20.2-150400.9.7.1
* python311-pkginfo-1.9.6-150400.7.7.1
* python311-portalocker-2.7.0-150400.10.7.4
* python311-async_timeout-4.0.2-150400.10.7.2
* python311-invoke-2.1.2-150400.10.7.4
* python311-pip-22.3.1-150400.17.16.4
* python311-redis-5.0.1-150400.12.4.4
* python311-asgiref-3.6.0-150400.9.7.3
* python311-PyJWT-2.8.0-150400.8.7.2
* python311-fluidity-sm-0.2.0-150400.10.7.2
* python311-constantly-15.1.0-150400.12.7.2
* python311-pycomposefile-0.0.30-150400.9.3.1
* python311-importlib-metadata-6.8.0-150400.10.9.2
* python311-retrying-1.3.4-150400.12.4.1
* python311-opentelemetry-sdk-1.23.0-150400.9.3.1
* python311-avro-1.11.3-150400.10.4.1
* python311-knack-0.11.0-150400.10.4.4
* python311-pathspec-0.11.1-150400.9.7.2
* python311-opencensus-context-0.1.3-150400.10.6.1
* python311-Fabric-3.2.2-150400.10.4.1
* python311-sure-2.0.1-150400.12.4.4
* python311-docker-7.0.0-150400.8.4.4
* python311-argcomplete-3.3.0-150400.12.12.2
* python311-jsondiff-2.0.0-150400.10.4.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-frozenlist-1.3.3-150400.9.7.2
* python311-multidict-6.0.4-150400.7.7.4
* python311-aiohttp-3.9.3-150400.10.18.4
* python311-zope.interface-6.0-150400.12.7.4
* python311-wrapt-1.15.0-150400.12.7.1
* python311-yarl-1.9.2-150400.8.7.4
* python311-psutil-5.9.5-150400.6.9.4
* Public Cloud Module 15-SP5 (noarch)
* python311-opentelemetry-semantic-conventions-0.44b0-150400.9.3.1
* python311-fakeredis-2.21.0-150400.9.3.4
* python311-chardet-5.2.0-150400.13.7.2
* python311-pydash-6.0.2-150400.9.4.1
* python311-opencensus-ext-threading-0.1.2-150400.10.6.1
* python311-opencensus-0.11.4-150400.10.6.3
* python311-httpretty-1.1.4-150400.11.4.1
* python311-fixedint-0.2.0-150400.9.3.1
* python311-antlr4-python3-runtime-4.13.1-150400.10.4.1
* python311-PyGithub-1.57-150400.10.4.4
* python311-semver-3.0.2-150400.10.4.1
* python311-opentelemetry-test-utils-0.44b0-150400.9.3.1
* python311-vcrpy-6.0.1-150400.7.4.4
* python311-sshtunnel-0.4.0-150400.5.4.4
* python311-xmltodict-0.13.0-150400.12.4.1
* python311-opentelemetry-api-1.23.0-150400.10.7.1
* python311-httplib2-0.22.0-150400.10.4.1
* python311-strictyaml-1.7.3-150400.9.3.4
* python311-javaproperties-0.8.1-150400.10.4.4
* python311-distro-1.9.0-150400.12.4.1
* python311-marshmallow-3.20.2-150400.9.7.1
* python311-redis-5.0.1-150400.12.4.4
* python311-asgiref-3.6.0-150400.9.7.3
* python311-pycomposefile-0.0.30-150400.9.3.1
* python311-retrying-1.3.4-150400.12.4.1
* python311-opentelemetry-sdk-1.23.0-150400.9.3.1
* python311-avro-1.11.3-150400.10.4.1
* python311-knack-0.11.0-150400.10.4.4
* python311-opencensus-context-0.1.3-150400.10.6.1
* python311-Fabric-3.2.2-150400.10.4.1
* python311-sure-2.0.1-150400.12.4.4
* python311-docker-7.0.0-150400.8.4.4
* python311-jsondiff-2.0.0-150400.10.4.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-multidict-6.0.4-150400.7.7.4
* python311-aiohttp-debuginfo-3.9.3-150400.10.18.4
* python-zope.interface-debugsource-6.0-150400.12.7.4
* python311-frozenlist-debuginfo-1.3.3-150400.9.7.2
* python311-psutil-debuginfo-5.9.5-150400.6.9.4
* python-frozenlist-debugsource-1.3.3-150400.9.7.2
* python311-aiohttp-3.9.3-150400.10.18.4
* python311-zope.interface-6.0-150400.12.7.4
* python311-wrapt-1.15.0-150400.12.7.1
* python-multidict-debugsource-6.0.4-150400.7.7.4
* python-yarl-debugsource-1.9.2-150400.8.7.4
* python-psutil-debugsource-5.9.5-150400.6.9.4
* python311-yarl-debuginfo-1.9.2-150400.8.7.4
* python311-frozenlist-1.3.3-150400.9.7.2
* python-wrapt-debugsource-1.15.0-150400.12.7.1
* python311-zope.interface-debuginfo-6.0-150400.12.7.4
* python-aiohttp-debugsource-3.9.3-150400.10.18.4
* python311-multidict-debuginfo-6.0.4-150400.7.7.4
* python311-yarl-1.9.2-150400.8.7.4
* python311-wrapt-debuginfo-1.15.0-150400.12.7.1
* python311-psutil-5.9.5-150400.6.9.4
* Python 3 Module 15-SP5 (noarch)
* python311-Twisted-http2-22.10.0-150400.5.17.4
* python311-isodate-0.6.1-150400.12.7.2
* python311-lexicon-2.0.1-150400.10.7.1
* python311-sortedcontainers-2.4.0-150400.8.7.4
* python311-requests-oauthlib-1.3.1-150400.12.7.1
* python311-paramiko-3.4.0-150400.13.10.4
* python311-scp-0.14.5-150400.12.7.4
* python311-tabulate-0.9.0-150400.11.7.4
* python311-chardet-5.2.0-150400.13.7.2
* python311-service_identity-23.1.0-150400.8.7.1
* python311-oauthlib-3.2.2-150400.12.7.4
* python-paramiko-doc-3.4.0-150400.13.10.4
* python311-Twisted-tls-22.10.0-150400.5.17.4
* python-tqdm-bash-completion-4.66.1-150400.9.7.4
* python311-typing_extensions-4.5.0-150400.3.9.1
* python311-Twisted-22.10.0-150400.5.17.4
* python311-Deprecated-1.2.14-150400.10.7.2
* python311-pyparsing-3.0.9-150400.5.7.4
* python311-zipp-3.15.0-150400.10.7.1
* python311-opentelemetry-api-1.23.0-150400.10.7.1
* python311-websocket-client-1.5.1-150400.13.7.1
* python311-Automat-22.10.0-150400.3.7.2
* python311-Twisted-conch-22.10.0-150400.5.17.4
* python311-wheel-0.40.0-150400.13.7.4
* python311-blinker-1.6.2-150400.12.7.4
* python311-decorator-5.1.1-150400.12.7.4
* python311-tqdm-4.66.1-150400.9.7.4
* python311-hyperlink-21.0.0-150400.12.7.4
* python311-Pygments-2.15.1-150400.7.7.4
* python311-Twisted-conch_nacl-22.10.0-150400.5.17.4
* python311-distro-1.9.0-150400.12.4.1
* python311-Twisted-all_non_platform-22.10.0-150400.5.17.4
* python311-aiosignal-1.3.1-150400.9.7.2
* python311-humanfriendly-10.0-150400.13.7.4
* python311-incremental-22.10.0-150400.3.7.2
* python311-pkginfo-1.9.6-150400.7.7.1
* python311-portalocker-2.7.0-150400.10.7.4
* python311-async_timeout-4.0.2-150400.10.7.2
* python311-Twisted-contextvars-22.10.0-150400.5.17.4
* python311-Twisted-serial-22.10.0-150400.5.17.4
* python311-invoke-2.1.2-150400.10.7.4
* python311-pip-22.3.1-150400.17.16.4
* python311-PyJWT-2.8.0-150400.8.7.2
* python311-fluidity-sm-0.2.0-150400.10.7.2
* python311-constantly-15.1.0-150400.12.7.2
* python311-importlib-metadata-6.8.0-150400.10.9.2
* python311-pathspec-0.11.1-150400.9.7.2
* python311-argcomplete-3.3.0-150400.12.12.2
## References:
* https://www.suse.com/security/cve/CVE-2023-28858.html
* https://www.suse.com/security/cve/CVE-2023-28859.html
* https://bugzilla.suse.com/show_bug.cgi?id=1209571
* https://bugzilla.suse.com/show_bug.cgi?id=1209811
* https://bugzilla.suse.com/show_bug.cgi?id=1209812
* https://bugzilla.suse.com/show_bug.cgi?id=1216606
* https://bugzilla.suse.com/show_bug.cgi?id=1222880
* https://bugzilla.suse.com/show_bug.cgi?id=761162
1
0
SUSE-SU-2024:1641-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 14 May '24
by OPENSUSE-SECURITY-UPDATES 14 May '24
14 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1641-1
Rating: important
References:
* bsc#1192145
* bsc#1209657
* bsc#1215221
* bsc#1216223
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1219104
* bsc#1219126
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220703
* bsc#1220761
* bsc#1220883
* bsc#1221044
* bsc#1221061
* bsc#1221088
* bsc#1221293
* bsc#1221299
* bsc#1221612
* bsc#1221725
* bsc#1221830
* bsc#1222117
* bsc#1222422
* bsc#1222430
* bsc#1222435
* bsc#1222482
* bsc#1222503
* bsc#1222536
* bsc#1222559
* bsc#1222585
* bsc#1222618
* bsc#1222624
* bsc#1222660
* bsc#1222662
* bsc#1222664
* bsc#1222666
* bsc#1222669
* bsc#1222671
* bsc#1222703
* bsc#1222704
* bsc#1222706
* bsc#1222709
* bsc#1222721
* bsc#1222726
* bsc#1222773
* bsc#1222776
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222796
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1223016
* bsc#1223187
* bsc#1223380
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223479
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223522
* bsc#1223523
* bsc#1223705
* bsc#1223824
Cross-References:
* CVE-2021-47047
* CVE-2021-47181
* CVE-2021-47182
* CVE-2021-47183
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47189
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2023-0160
* CVE-2023-4881
* CVE-2023-52476
* CVE-2023-52500
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52607
* CVE-2023-52616
* CVE-2023-52628
* CVE-2023-6270
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-25742
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26614
* CVE-2024-26642
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26704
* CVE-2024-26727
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26773
* CVE-2024-26792
* CVE-2024-26816
* CVE-2024-26898
* CVE-2024-26903
* CVE-2024-27043
* CVE-2024-27389
CVSS scores:
* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 90 vulnerabilities and has three security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-26816: Ignore relocations in .notes section when building with
CONFIG_XEN_PV=y (bsc#1222624).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already
gets read (bsc#1222536).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len
in ext4 (bsc#1222422).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).
* CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
renaming (bsc#1221088).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem
that could lead to potential information disclosure or a denial of service
(bsc#1215221).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
(bsc#1222878)
* CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).
* CVE-2021-47189: Fixed denial of service due to memory ordering issues
between normal and ordered work functions in btrfs (bsc#1222706).
* CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer
(bsc#1222669).
* CVE-2021-47183: Fixed a null pointer dereference during link down processing
in scsi lpfc (bsc#1192145, bsc#1222664).
* CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling
(bsc#1222662).
* CVE-2021-47181: Fixed a null pointer dereference caused by calling
platform_get_resource() (bsc#1222660).
The following non-security bugs were fixed:
* Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
* ibmvfc: make 'max_sectors' a module option (bsc#1216223).
* scsi: Update max_hw_sectors on rescan (bsc#1216223).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1641=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1641=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1641=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1641=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1641=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1641=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1641=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1641=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1641=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1641=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1641=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1641=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1641=1
## Package List:
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150400.24.119.1
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
* kernel-default-livepatch-5.14.21-150400.24.119.1
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* gfs2-kmp-default-5.14.21-150400.24.119.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1
* ocfs2-kmp-default-5.14.21-150400.24.119.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1
* cluster-md-kmp-default-5.14.21-150400.24.119.1
* dlm-kmp-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-extra-5.14.21-150400.24.119.1
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-syms-5.14.21-150400.24.119.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-source-vanilla-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-docs-html-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debuginfo-5.14.21-150400.24.119.1
* kernel-debug-livepatch-devel-5.14.21-150400.24.119.1
* kernel-debug-debugsource-5.14.21-150400.24.119.1
* kernel-debug-devel-5.14.21-150400.24.119.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.119.1
* kernel-kvmsmall-devel-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.119.1
* kernel-default-base-rebuild-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.119.1
* ocfs2-kmp-default-5.14.21-150400.24.119.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* cluster-md-kmp-default-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* kernel-default-extra-5.14.21-150400.24.119.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-qa-5.14.21-150400.24.119.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* kernel-default-livepatch-5.14.21-150400.24.119.1
* dlm-kmp-default-5.14.21-150400.24.119.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.119.1
* kernel-default-optional-5.14.21-150400.24.119.1
* kselftests-kmp-default-5.14.21-150400.24.119.1
* gfs2-kmp-default-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-default-livepatch-devel-5.14.21-150400.24.119.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64)
* dtb-nvidia-5.14.21-150400.24.119.1
* dtb-rockchip-5.14.21-150400.24.119.1
* kselftests-kmp-64kb-5.14.21-150400.24.119.1
* dtb-freescale-5.14.21-150400.24.119.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-apm-5.14.21-150400.24.119.1
* ocfs2-kmp-64kb-5.14.21-150400.24.119.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.119.1
* dtb-mediatek-5.14.21-150400.24.119.1
* dtb-amazon-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* dlm-kmp-64kb-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* gfs2-kmp-64kb-5.14.21-150400.24.119.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-arm-5.14.21-150400.24.119.1
* dtb-marvell-5.14.21-150400.24.119.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-renesas-5.14.21-150400.24.119.1
* reiserfs-kmp-64kb-5.14.21-150400.24.119.1
* dtb-altera-5.14.21-150400.24.119.1
* dtb-lg-5.14.21-150400.24.119.1
* dtb-socionext-5.14.21-150400.24.119.1
* dtb-xilinx-5.14.21-150400.24.119.1
* cluster-md-kmp-64kb-5.14.21-150400.24.119.1
* dtb-amlogic-5.14.21-150400.24.119.1
* dtb-hisilicon-5.14.21-150400.24.119.1
* dtb-broadcom-5.14.21-150400.24.119.1
* dtb-amd-5.14.21-150400.24.119.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-exynos-5.14.21-150400.24.119.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.119.1
* dtb-cavium-5.14.21-150400.24.119.1
* dtb-apple-5.14.21-150400.24.119.1
* dtb-qcom-5.14.21-150400.24.119.1
* dtb-sprd-5.14.21-150400.24.119.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-optional-5.14.21-150400.24.119.1
* kernel-64kb-devel-5.14.21-150400.24.119.1
* dtb-allwinner-5.14.21-150400.24.119.1
* kernel-64kb-extra-5.14.21-150400.24.119.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47181.html
* https://www.suse.com/security/cve/CVE-2021-47182.html
* https://www.suse.com/security/cve/CVE-2021-47183.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47189.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-4881.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-25742.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26727.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221725
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222536
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222660
* https://bugzilla.suse.com/show_bug.cgi?id=1222662
* https://bugzilla.suse.com/show_bug.cgi?id=1222664
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222706
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
1
0
SUSE-SU-2024:1642-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 14 May '24
by OPENSUSE-SECURITY-UPDATES 14 May '24
14 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1642-1
Rating: important
References:
* bsc#1190576
* bsc#1192145
* bsc#1200313
* bsc#1201489
* bsc#1203906
* bsc#1203935
* bsc#1204614
* bsc#1211592
* bsc#1218562
* bsc#1218917
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220513
* bsc#1220755
* bsc#1220854
* bsc#1221113
* bsc#1221299
* bsc#1221543
* bsc#1221545
* bsc#1222449
* bsc#1222482
* bsc#1222503
* bsc#1222559
* bsc#1222585
* bsc#1222624
* bsc#1222666
* bsc#1222669
* bsc#1222709
* bsc#1222790
* bsc#1222792
* bsc#1222829
* bsc#1222876
* bsc#1222878
* bsc#1222881
* bsc#1222883
* bsc#1222894
* bsc#1222976
* bsc#1223016
* bsc#1223057
* bsc#1223111
* bsc#1223187
* bsc#1223202
* bsc#1223475
* bsc#1223482
* bsc#1223509
* bsc#1223513
* bsc#1223522
* bsc#1223824
* bsc#1223921
* bsc#1223923
* bsc#1223931
* bsc#1223941
* bsc#1223948
* bsc#1223952
* bsc#1223963
Cross-References:
* CVE-2021-46955
* CVE-2021-47041
* CVE-2021-47074
* CVE-2021-47113
* CVE-2021-47131
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47194
* CVE-2021-47198
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47212
* CVE-2021-47216
* CVE-2022-48631
* CVE-2022-48638
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48654
* CVE-2022-48672
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48693
* CVE-2022-48695
* CVE-2022-48701
* CVE-2022-48702
* CVE-2023-2860
* CVE-2023-6270
* CVE-2024-0639
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26744
* CVE-2024-26816
* CVE-2024-26840
* CVE-2024-26852
* CVE-2024-26862
* CVE-2024-26898
* CVE-2024-26903
* CVE-2024-26906
* CVE-2024-27043
CVSS scores:
* CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47074 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47131 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48686 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves 48 vulnerabilities and has eight security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
* CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second
ref (bsc#1221543).
* CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up
(bsc#1221545).
* CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
ip6_route_mpath_notify() (bsc#1223057).
* CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
fragmenting IPv4 packets (bsc#1220513).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries
== 0 and eh_depth > 0 (bsc#1223475).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault()
(bsc#1223202).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2021-47041: Don't set sk_user_data without write_lock (bsc#1220755).
* CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
* CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid
parameter in rdma/srpt (bsc#1222449).
The following non-security bugs were fixed:
* dm rq: do not queue request to blk-mq during DM suspend (bsc#1221113).
* dm: rearrange core declarations for extended use from dm-zone.c
(bsc#1221113).
* net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
* tls: Fix context leak on tls_device_down (bsc#1221545).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1642=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1642=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-1642=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1642=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1642=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1642=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1642=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1642=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1642=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1642=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* openSUSE Leap 15.3 (noarch)
* kernel-macros-5.3.18-150300.59.161.1
* kernel-docs-html-5.3.18-150300.59.161.2
* kernel-devel-5.3.18-150300.59.161.1
* kernel-source-vanilla-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.161.1
* kernel-debug-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-debug-livepatch-devel-5.3.18-150300.59.161.1
* kernel-kvmsmall-devel-5.3.18-150300.59.161.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-debug-debuginfo-5.3.18-150300.59.161.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.161.1
* kernel-debug-devel-5.3.18-150300.59.161.1
* kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.161.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.161.1
* kernel-debug-debugsource-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* gfs2-kmp-default-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-livepatch-devel-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-base-rebuild-5.3.18-150300.59.161.1.150300.18.94.1
* ocfs2-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-default-5.3.18-150300.59.161.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-optional-5.3.18-150300.59.161.1
* kernel-default-extra-5.3.18-150300.59.161.1
* kernel-default-livepatch-5.3.18-150300.59.161.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.161.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.161.1
* dlm-kmp-default-5.3.18-150300.59.161.1
* kselftests-kmp-default-5.3.18-150300.59.161.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* kernel-obs-qa-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.161.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
* kernel-livepatch-SLE15-SP3_Update_44-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_161-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kernel-preempt-livepatch-devel-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* kernel-preempt-optional-5.3.18-150300.59.161.1
* ocfs2-kmp-preempt-5.3.18-150300.59.161.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* gfs2-kmp-preempt-5.3.18-150300.59.161.1
* kernel-preempt-extra-5.3.18-150300.59.161.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.161.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-preempt-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kselftests-kmp-preempt-5.3.18-150300.59.161.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.161.1
* reiserfs-kmp-preempt-5.3.18-150300.59.161.1
* dlm-kmp-preempt-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.161.1
* kernel-zfcpdump-debugsource-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64)
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-optional-5.3.18-150300.59.161.1
* ocfs2-kmp-64kb-5.3.18-150300.59.161.1
* dlm-kmp-64kb-5.3.18-150300.59.161.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-64kb-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* dtb-nvidia-5.3.18-150300.59.161.1
* dtb-socionext-5.3.18-150300.59.161.1
* dtb-amd-5.3.18-150300.59.161.1
* dtb-altera-5.3.18-150300.59.161.1
* dtb-arm-5.3.18-150300.59.161.1
* dtb-qcom-5.3.18-150300.59.161.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.161.1
* dtb-lg-5.3.18-150300.59.161.1
* dtb-al-5.3.18-150300.59.161.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* dtb-hisilicon-5.3.18-150300.59.161.1
* reiserfs-kmp-64kb-5.3.18-150300.59.161.1
* kselftests-kmp-64kb-5.3.18-150300.59.161.1
* dtb-xilinx-5.3.18-150300.59.161.1
* kernel-64kb-livepatch-devel-5.3.18-150300.59.161.1
* dtb-zte-5.3.18-150300.59.161.1
* dtb-freescale-5.3.18-150300.59.161.1
* dtb-allwinner-5.3.18-150300.59.161.1
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* gfs2-kmp-64kb-5.3.18-150300.59.161.1
* dtb-cavium-5.3.18-150300.59.161.1
* dtb-sprd-5.3.18-150300.59.161.1
* dtb-rockchip-5.3.18-150300.59.161.1
* kernel-64kb-extra-5.3.18-150300.59.161.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.161.1
* dtb-amlogic-5.3.18-150300.59.161.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* dtb-renesas-5.3.18-150300.59.161.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.161.1
* dtb-broadcom-5.3.18-150300.59.161.1
* dtb-apm-5.3.18-150300.59.161.1
* dtb-mediatek-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* dtb-exynos-5.3.18-150300.59.161.1
* dtb-marvell-5.3.18-150300.59.161.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-livepatch-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* dlm-kmp-default-5.3.18-150300.59.161.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* gfs2-kmp-default-5.3.18-150300.59.161.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.161.1
* cluster-md-kmp-default-5.3.18-150300.59.161.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.161.1
* ocfs2-kmp-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-default-5.3.18-150300.59.161.1
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.161.1
* kernel-zfcpdump-debugsource-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-debugsource-5.3.18-150300.59.161.1
* kernel-64kb-devel-5.3.18-150300.59.161.1
* kernel-64kb-debuginfo-5.3.18-150300.59.161.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-default-5.3.18-150300.59.161.1
* kernel-preempt-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-devel-5.3.18-150300.59.161.1
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-preempt-debugsource-5.3.18-150300.59.161.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-devel-5.3.18-150300.59.161.1
* kernel-syms-5.3.18-150300.59.161.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-5.3.18-150300.59.161.1
* reiserfs-kmp-default-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.161.1
* kernel-obs-build-debugsource-5.3.18-150300.59.161.1
* kernel-preempt-debuginfo-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-devel-5.3.18-150300.59.161.1
* kernel-macros-5.3.18-150300.59.161.1
* kernel-source-5.3.18-150300.59.161.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.161.2
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.161.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.161.1.150300.18.94.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.161.1
* kernel-default-debuginfo-5.3.18-150300.59.161.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46955.html
* https://www.suse.com/security/cve/CVE-2021-47041.html
* https://www.suse.com/security/cve/CVE-2021-47074.html
* https://www.suse.com/security/cve/CVE-2021-47113.html
* https://www.suse.com/security/cve/CVE-2021-47131.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26744.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1203906
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1204614
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220513
* https://bugzilla.suse.com/show_bug.cgi?id=1220755
* https://bugzilla.suse.com/show_bug.cgi?id=1220854
* https://bugzilla.suse.com/show_bug.cgi?id=1221113
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221543
* https://bugzilla.suse.com/show_bug.cgi?id=1221545
* https://bugzilla.suse.com/show_bug.cgi?id=1222449
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
1
0
SUSE-SU-2024:1644-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 14 May '24
by OPENSUSE-SECURITY-UPDATES 14 May '24
14 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1644-1
Rating: important
References:
* bsc#1141539
* bsc#1190576
* bsc#1192145
* bsc#1192837
* bsc#1193629
* bsc#1196869
* bsc#1200313
* bsc#1201308
* bsc#1201489
* bsc#1203906
* bsc#1203935
* bsc#1204614
* bsc#1207361
* bsc#1211592
* bsc#1213573
* bsc#1217339
* bsc#1217408
* bsc#1218562
* bsc#1218917
* bsc#1219104
* bsc#1219126
* bsc#1219141
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220569
* bsc#1220761
* bsc#1221042
* bsc#1221044
* bsc#1221080
* bsc#1221084
* bsc#1221088
* bsc#1221299
* bsc#1221612
* bsc#1221617
* bsc#1221645
* bsc#1221825
* bsc#1222294
* bsc#1222307
* bsc#1222357
* bsc#1222368
* bsc#1222379
* bsc#1222385
* bsc#1222424
* bsc#1222430
* bsc#1222435
* bsc#1222482
* bsc#1222559
* bsc#1222585
* bsc#1222613
* bsc#1222615
* bsc#1222618
* bsc#1222624
* bsc#1222666
* bsc#1222669
* bsc#1222671
* bsc#1222703
* bsc#1222704
* bsc#1222709
* bsc#1222710
* bsc#1222721
* bsc#1222726
* bsc#1222773
* bsc#1222776
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222793
* bsc#1222796
* bsc#1222812
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222870
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1222968
* bsc#1222976
* bsc#1223012
* bsc#1223014
* bsc#1223016
* bsc#1223024
* bsc#1223033
* bsc#1223034
* bsc#1223035
* bsc#1223036
* bsc#1223037
* bsc#1223041
* bsc#1223042
* bsc#1223051
* bsc#1223052
* bsc#1223056
* bsc#1223057
* bsc#1223058
* bsc#1223060
* bsc#1223061
* bsc#1223065
* bsc#1223066
* bsc#1223076
* bsc#1223078
* bsc#1223111
* bsc#1223115
* bsc#1223118
* bsc#1223119
* bsc#1223140
* bsc#1223187
* bsc#1223189
* bsc#1223190
* bsc#1223191
* bsc#1223196
* bsc#1223197
* bsc#1223198
* bsc#1223207
* bsc#1223275
* bsc#1223323
* bsc#1223360
* bsc#1223369
* bsc#1223380
* bsc#1223432
* bsc#1223473
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223478
* bsc#1223479
* bsc#1223481
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223490
* bsc#1223496
* bsc#1223498
* bsc#1223499
* bsc#1223501
* bsc#1223502
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223511
* bsc#1223512
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223520
* bsc#1223522
* bsc#1223523
* bsc#1223525
* bsc#1223536
* bsc#1223539
* bsc#1223574
* bsc#1223595
* bsc#1223598
* bsc#1223628
* bsc#1223634
* bsc#1223640
* bsc#1223643
* bsc#1223644
* bsc#1223645
* bsc#1223646
* bsc#1223648
* bsc#1223655
* bsc#1223657
* bsc#1223660
* bsc#1223661
* bsc#1223663
* bsc#1223664
* bsc#1223668
* bsc#1223670
* bsc#1223679
* bsc#1223686
* bsc#1223693
* bsc#1223705
* bsc#1223714
* bsc#1223735
* bsc#1223738
* bsc#1223745
* bsc#1223784
* bsc#1223785
* bsc#1223790
* bsc#1223816
* bsc#1223821
* bsc#1223822
* bsc#1223823
* bsc#1223824
* bsc#1223827
* bsc#1223834
* bsc#1223858
* bsc#1223875
* bsc#1223876
* bsc#1223877
* bsc#1223878
* bsc#1223879
* bsc#1223894
* bsc#1223921
* bsc#1223922
* bsc#1223923
* bsc#1223924
* bsc#1223929
* bsc#1223931
* bsc#1223932
* bsc#1223934
* bsc#1223941
* bsc#1223948
* bsc#1223949
* bsc#1223950
* bsc#1223951
* bsc#1223952
* bsc#1223953
* bsc#1223956
* bsc#1223957
* bsc#1223960
* bsc#1223962
* bsc#1223963
* bsc#1223964
* bsc#1223996
* jsc#PED-7167
Cross-References:
* CVE-2021-47047
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47214
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48632
* CVE-2022-48634
* CVE-2022-48636
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48639
* CVE-2022-48640
* CVE-2022-48642
* CVE-2022-48644
* CVE-2022-48646
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48652
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48658
* CVE-2022-48659
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2022-48671
* CVE-2022-48672
* CVE-2022-48673
* CVE-2022-48675
* CVE-2022-48686
* CVE-2022-48687
* CVE-2022-48688
* CVE-2022-48690
* CVE-2022-48692
* CVE-2022-48693
* CVE-2022-48694
* CVE-2022-48695
* CVE-2022-48697
* CVE-2022-48698
* CVE-2022-48699
* CVE-2022-48700
* CVE-2022-48701
* CVE-2022-48702
* CVE-2022-48703
* CVE-2022-48704
* CVE-2023-2860
* CVE-2023-52585
* CVE-2023-52589
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52593
* CVE-2023-52614
* CVE-2023-52616
* CVE-2023-52620
* CVE-2023-52635
* CVE-2023-52645
* CVE-2023-52646
* CVE-2023-52652
* CVE-2023-6270
* CVE-2024-0639
* CVE-2024-0841
* CVE-2024-2201
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26656
* CVE-2024-26671
* CVE-2024-26673
* CVE-2024-26675
* CVE-2024-26679
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26700
* CVE-2024-26702
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26772
* CVE-2024-26773
* CVE-2024-26783
* CVE-2024-26791
* CVE-2024-26792
* CVE-2024-26816
* CVE-2024-26817
* CVE-2024-26820
* CVE-2024-26825
* CVE-2024-26830
* CVE-2024-26833
* CVE-2024-26836
* CVE-2024-26840
* CVE-2024-26843
* CVE-2024-26852
* CVE-2024-26853
* CVE-2024-26855
* CVE-2024-26856
* CVE-2024-26857
* CVE-2024-26861
* CVE-2024-26862
* CVE-2024-26866
* CVE-2024-26872
* CVE-2024-26875
* CVE-2024-26876
* CVE-2024-26877
* CVE-2024-26878
* CVE-2024-26879
* CVE-2024-26881
* CVE-2024-26882
* CVE-2024-26883
* CVE-2024-26884
* CVE-2024-26885
* CVE-2024-26891
* CVE-2024-26893
* CVE-2024-26895
* CVE-2024-26896
* CVE-2024-26897
* CVE-2024-26898
* CVE-2024-26901
* CVE-2024-26903
* CVE-2024-26915
* CVE-2024-26917
* CVE-2024-26927
* CVE-2024-26933
* CVE-2024-26939
* CVE-2024-26948
* CVE-2024-26950
* CVE-2024-26951
* CVE-2024-26955
* CVE-2024-26956
* CVE-2024-26960
* CVE-2024-26965
* CVE-2024-26966
* CVE-2024-26969
* CVE-2024-26970
* CVE-2024-26972
* CVE-2024-26979
* CVE-2024-26981
* CVE-2024-26982
* CVE-2024-26993
* CVE-2024-27013
* CVE-2024-27014
* CVE-2024-27030
* CVE-2024-27038
* CVE-2024-27039
* CVE-2024-27041
* CVE-2024-27042
* CVE-2024-27043
* CVE-2024-27046
* CVE-2024-27056
* CVE-2024-27059
* CVE-2024-27062
* CVE-2024-27389
CVSS scores:
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48642 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48659 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48672 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48675 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48686 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48687 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48697 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-48698 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48700 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48701 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48702 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-2860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2860 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52585 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52589 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52593 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52614 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52620 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26820 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26840 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26875 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26877 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26939 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 190 vulnerabilities, contains one feature and has 41
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
* CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists
(bsc#1223822).
* CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure
(bsc#1223827).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in
amdgpu_discovery_reg_base_init() (bsc#1223823).
* CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in
amdgpu_dm_fini() (bsc#1223714).
* CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree()
(bsc#1223821).
* CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
* CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts
(bsc#1223790).
* CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS
(bsc#1223735).
* CVE-2024-27013: Fixed tun limit printing rate when illegal packet received
by tun device (bsc#1223745).
* CVE-2024-26993: Fixed fs/sysfs reference leak in
sysfs_break_active_protection() (bsc#1223693).
* CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value
of zero (bsc#1223634).
* CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table
arrays (bsc#1223644).
* CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table
arrays (bsc#1223645).
* CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table
arrays (bsc#1223646).
* CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table
arrays (bsc#1223648).
* CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
swapoff() (bsc#1223655).
* CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead
instead of empty list (bsc#1223660).
* CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead
of peer (bsc#1223661).
* CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in
dc_state_release (bsc#1223664).
* CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race
(bsc#1223679).
* CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch
(bsc#1223525).
* CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).
* CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent
kernel-infoleak (bsc#1223198).
* CVE-2024-26898: Fixed aoe potential use-after-free problem in
aoecmd_cfg_pkts (bsc#1223016).
* CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
* CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC
transport cleanup path (bsc#1223196).
* CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
(bsc#1223190).
* CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
(bsc#1223189).
* CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
(bsc#1223035).
* CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in
ip_tunnel_rcv() (bsc#1223034).
* CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08
devices (bsc#1223041).
* CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps
(bsc#1223066).
* CVE-2024-26878: Fixed quota for potential NULL pointer dereference
(bsc#1223060).
* CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe
(bsc#1223119).
* CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant
spi_controller_put call (bsc#1223024).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-26861: Fixed wireguard/receive annotate data-race around
receiving_counter.counter (bsc#1223076).
* CVE-2024-26857: Fixed geneve to make sure to pull inner header in
geneve_rx() (bsc#1223058).
* CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry
(bsc#1223052).
* CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).
* CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT
(bsc#1223061).
* CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in
ip6_route_mpath_notify() (bsc#1223057).
* CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
* CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for
workstations (bsc#1222968).
* CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
administratively set MAC (bsc#1223012).
* CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid
integer overflow (bsc#1222812).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names
(bsc#1222793).
* CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a
wrong zone index (bsc#1222615).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group
in ext4_mb_find_by_goal() (bsc#1222613).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference for RV
(bsc#1222870).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26679: Fixed inet read sk->sk_family once in inet_recv_error()
(bsc#1222385).
* CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
* CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization
(bsc#1222368).
* CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
* CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device()
(bsc#1223686).
* CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
(bsc#1223033).
* CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop]
(bsc#1222294).
* CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous
sets never used from userspace (bsc#1221825).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show
(bsc#1221617).
* CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in
wfx_set_mfp_ap() (bsc#1221042).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
renaming (bsc#1221088).
* CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
* CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in
amdgpu_ras_query_error_status_helper() (bsc#1221080).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails
(bsc#1223498).
* CVE-2022-48658: Fixed mm/slub to avoid a problem in
flush_cpu_slab()/__free_slab() task context (bsc#1223496).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at
nf_tables_addchain() (bsc#1223478).
* CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in
bond_rr_gen_slave_id (bsc#1223499).
* CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries
== 0 and eh_depth > 0 (bsc#1223475).
* CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in
hugetlb_mcopy_atomic_pte() (bsc#1222710).
* CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-
audio (bsc#1222869).
* CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus
(bsc#1222790).
* CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng
(bsc#1222888).
* CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
(bsc#1222878)
* CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within
drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
* CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).
* CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer
(bsc#1222669).
* CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync
(bsc#1222666).
The following non-security bugs were fixed:
* ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block
counter (stable-fixes).
* ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
(stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
* ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
* ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
fixes).
* ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
* ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
* ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
* ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
* ASoC: meson: axg-card: make links nonatomic (git-fixes).
* ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
* ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
* ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
* ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
* ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
* Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
* Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
* Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
* Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
fixes).
* Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: add quirk for broken address properties (git-fixes).
* Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
fixes).
* Bluetooth: btintel: Fixe build regression (git-fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
fixes).
* Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
* Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).
* Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
* Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
* HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
(git-fixes).
* HID: logitech-dj: allow mice to use all types of reports (git-fixes).
* HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
* Input: allocate keycode for Display refresh rate toggle (stable-fixes).
* Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails
(stable-fixes).
* NFC: trf7970a: disable all regulators on removal (git-fixes).
* PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
ltc#205888).
* RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
* Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
* Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default"
(stable-fixes).
* Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
* Revert "ice: Fix ice VF reset during iavf initialization (jsc#PED-376)."
(bsc#1223275)
* Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
* Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
* USB: UAS: return ENODEV when submit urbs fail with device not attached
(stable-fixes).
* USB: core: Add hub_get() and hub_put() routines (git-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
* USB: serial: add device ID for VeriFone adapter (stable-fixes).
* USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
* USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
fixes).
* USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
fixes).
* USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
* USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
* USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
* USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
fixes).
* USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
* USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
* USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
* nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).
* s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
* nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
* s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops
(jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
* ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
* ahci: asm1064: correct count of reported ports (stable-fixes).
* arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
* arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
* arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
fixes)
* arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
* arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
* arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
* ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
* batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
* clk: Get runtime PM before walking tree during disable_unused (git-fixes).
* clk: Initialize struct clk_core kref earlier (stable-fixes).
* clk: Mark 'all_lists' as const (stable-fixes).
* clk: Print an info line before disabling unused clocks (stable-fixes).
* clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
* clk: remove extra empty line (stable-fixes).
* comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
* dma: xilinx_dpdma: Fix locking (git-fixes).
* dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
* dmaengine: owl: fix register access functions (git-fixes).
* dmaengine: tegra186: Fix residual calculation (git-fixes).
* docs: Document the FAN_FS_ERROR event (stable-fixes).
* drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
* drm/amd/display: Do not recursively call manual trigger programming (stable-
fixes).
* drm/amd/display: Fix nanosec stat overflow (stable-fixes).
* drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
* drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
* drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
* drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
* drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
* drm/amdgpu: always force full reset for SOC21 (stable-fixes).
* drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
* drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
* drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
* drm/amdgpu: validate the parameters of bo mapping operations more clearly
(git-fixes).
* drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
* drm/ast: Fix soft lockup (git-fixes).
* drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
fixes).
* drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
fixes).
* drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
* drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
* drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
* drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
* drm/panel: ili9341: Respect deferred probe (git-fixes).
* drm/panel: ili9341: Use predefined error codes (git-fixes).
* drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
* drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
* drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
* drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
* drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
* drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
* drm: nv04: Fix out of bounds access (git-fixes).
* drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-
fixes).
* dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
* fbdev: fix incorrect address computation in deferred IO (git-fixes).
* fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
* fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
fixes).
* fuse: do not unhash root (bsc#1223951).
* fuse: fix root lookup with nonzero generation (bsc#1223950).
* hwmon: (amc6821) add of_match table (stable-fixes).
* i2c: pxa: hide unused icr_bits[] variable (git-fixes).
* i2c: smbus: fix NULL function pointer dereference (git-fixes).
* i40e: Fix VF MAC filter removal (git-fixes).
* idma64: Do not try to serve interrupts when device is powered off (git-
fixes).
* iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
* iio:imu: adis16475: Fix sync mode setting (git-fixes).
* init/main.c: Fix potential static_command_line memory overflow (git-fixes).
* ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).
* media: cec: core: remove length check of Timer Status (stable-fixes).
* media: sta2x11: fix irq handler cast (stable-fixes).
* mei: me: add arrow lake point H DID (stable-fixes).
* mei: me: add arrow lake point S DID (stable-fixes).
* mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
* mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
* mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
* mtd: diskonchip: work around ubsan link failure (stable-fixes).
* net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
* net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
* net: fix skb leak in __skb_tstamp_tx() (git-fixes).
* net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
* net: mld: fix reference count leak in mld_{query | report}_work() (git-
fixes).
* net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
* net: usb: ax88179_178a: avoid writing the mac address before first reading
(git-fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net: vlan: fix underflow for the real_dev refcnt (git-fixes).
* net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
(bsc#1223360).
* netfilter: br_netfilter: Drop dst references before setting (git-fixes).
* netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-
fixes).
* netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
fixes).
* nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
bsc#1217408).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nouveau: fix function cast warning (git-fixes).
* nouveau: fix instmem race condition around ptr stores (git-fixes).
* phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
* pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).
* platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-
fixes).
* platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi
Vi8 tablet (stable-fixes).
* powerpc/kasan: Do not instrument non-maskable or raw interrupts
(bsc#1223191).
* powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369
ltc#205888).
* powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc: Refactor verification of MSR_RI (bsc#1223191).
* printk: Add this_cpu_in_panic() (bsc#1223574).
* printk: Adjust mapping for 32bit seq macros (bsc#1223574).
* printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
* printk: Disable passing console lock owner completely during panic()
(bsc#1223574).
* printk: Drop console_sem during panic (bsc#1223574).
* printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
(bsc#1223574).
* printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
* printk: Wait for all reserved records with pr_flush() (bsc#1223574).
* printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
* printk: ringbuffer: Clarify special lpos values (bsc#1223574).
* printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
* printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
(bsc#1223574).
* printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
* printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
* pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
* ring-buffer: Only update pages_touched when a new page is touched (git-
fixes).
* ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent
environment (git-fixes).
* s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
* s390/decompressor: fix misaligned symbol build error (git-fixes
bsc#1223785).
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223878).
* s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
* s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
* s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223876).
* s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
* s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223595).
* serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
* serial: core: Provide port lock wrappers (stable-fixes).
* serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
* serial: mxs-auart: add spinlock around changing cts state (git-fixes).
* slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
* speakup: Avoid crash on very long word (git-fixes).
* speakup: Fix 8bit characters from direct synth (git-fixes).
* spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
(git-fixes).
* tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
* thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
* thunderbolt: Fix wake configurations after device unplug (stable-fixes).
* tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
fixes).
* tracing: Show size of requested perf buffer (git-fixes).
* usb: Disable USB3 LPM at shutdown (stable-fixes).
* usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
device (git-fixes).
* usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
* usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
fixes).
* usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error (stable-fixes).
* usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
* usb: ohci: Prevent missed ohci interrupts (git-fixes).
* usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).
* usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
* usb: typec: tcpm: Check for port partner validity before consuming it (git-
fixes).
* usb: typec: tcpm: unregister existing source caps before re-registration
(bsc#1220569).
* usb: typec: ucsi: Ack unsupported commands (stable-fixes).
* usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
* usb: typec: ucsi: Fix connector check on init (git-fixes).
* usb: udc: remove warning when queue disabled ep (stable-fixes).
* virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
* wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
* wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
fixes).
* wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
* wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
fixes).
* wifi: nl80211: do not free NULL coalescing rule (git-fixes).
* x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
* x86/bugs: Fix BHI documentation (git-fixes).
* x86/bugs: Fix BHI handling of RRSBA (git-fixes).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
* x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-
fixes).
* x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
fixes).
* x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
(jsc#PED-7167 git-fixes).
* x86/sev: Skip ROM range scans and validation for SEV-SNP guests
(jsc#PED-7167 git-fixes).
* xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1644=1 SUSE-2024-1644=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1644=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* reiserfs-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-debuginfo-5.14.21-150500.33.51.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* dlm-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-debugsource-5.14.21-150500.33.51.1
* kselftests-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-devel-5.14.21-150500.33.51.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.51.1
* cluster-md-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-extra-5.14.21-150500.33.51.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-optional-5.14.21-150500.33.51.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.51.1
* ocfs2-kmp-azure-5.14.21-150500.33.51.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1
* kernel-syms-azure-5.14.21-150500.33.51.1
* gfs2-kmp-azure-5.14.21-150500.33.51.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.51.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-vdso-5.14.21-150500.33.51.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.51.1
* kernel-devel-azure-5.14.21-150500.33.51.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.51.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-devel-5.14.21-150500.33.51.1
* kernel-azure-debugsource-5.14.21-150500.33.51.1
* kernel-azure-debuginfo-5.14.21-150500.33.51.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.51.1
* kernel-syms-azure-5.14.21-150500.33.51.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.51.1
* kernel-devel-azure-5.14.21-150500.33.51.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47214.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48632.html
* https://www.suse.com/security/cve/CVE-2022-48634.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48639.html
* https://www.suse.com/security/cve/CVE-2022-48640.html
* https://www.suse.com/security/cve/CVE-2022-48642.html
* https://www.suse.com/security/cve/CVE-2022-48644.html
* https://www.suse.com/security/cve/CVE-2022-48646.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48652.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48658.html
* https://www.suse.com/security/cve/CVE-2022-48659.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2022-48671.html
* https://www.suse.com/security/cve/CVE-2022-48672.html
* https://www.suse.com/security/cve/CVE-2022-48673.html
* https://www.suse.com/security/cve/CVE-2022-48675.html
* https://www.suse.com/security/cve/CVE-2022-48686.html
* https://www.suse.com/security/cve/CVE-2022-48687.html
* https://www.suse.com/security/cve/CVE-2022-48688.html
* https://www.suse.com/security/cve/CVE-2022-48690.html
* https://www.suse.com/security/cve/CVE-2022-48692.html
* https://www.suse.com/security/cve/CVE-2022-48693.html
* https://www.suse.com/security/cve/CVE-2022-48694.html
* https://www.suse.com/security/cve/CVE-2022-48695.html
* https://www.suse.com/security/cve/CVE-2022-48697.html
* https://www.suse.com/security/cve/CVE-2022-48698.html
* https://www.suse.com/security/cve/CVE-2022-48699.html
* https://www.suse.com/security/cve/CVE-2022-48700.html
* https://www.suse.com/security/cve/CVE-2022-48701.html
* https://www.suse.com/security/cve/CVE-2022-48702.html
* https://www.suse.com/security/cve/CVE-2022-48703.html
* https://www.suse.com/security/cve/CVE-2022-48704.html
* https://www.suse.com/security/cve/CVE-2023-2860.html
* https://www.suse.com/security/cve/CVE-2023-52585.html
* https://www.suse.com/security/cve/CVE-2023-52589.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52593.html
* https://www.suse.com/security/cve/CVE-2023-52614.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52620.html
* https://www.suse.com/security/cve/CVE-2023-52635.html
* https://www.suse.com/security/cve/CVE-2023-52645.html
* https://www.suse.com/security/cve/CVE-2023-52646.html
* https://www.suse.com/security/cve/CVE-2023-52652.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26656.html
* https://www.suse.com/security/cve/CVE-2024-26671.html
* https://www.suse.com/security/cve/CVE-2024-26673.html
* https://www.suse.com/security/cve/CVE-2024-26675.html
* https://www.suse.com/security/cve/CVE-2024-26679.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26700.html
* https://www.suse.com/security/cve/CVE-2024-26702.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26772.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26783.html
* https://www.suse.com/security/cve/CVE-2024-26791.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26817.html
* https://www.suse.com/security/cve/CVE-2024-26820.html
* https://www.suse.com/security/cve/CVE-2024-26825.html
* https://www.suse.com/security/cve/CVE-2024-26830.html
* https://www.suse.com/security/cve/CVE-2024-26833.html
* https://www.suse.com/security/cve/CVE-2024-26836.html
* https://www.suse.com/security/cve/CVE-2024-26840.html
* https://www.suse.com/security/cve/CVE-2024-26843.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26853.html
* https://www.suse.com/security/cve/CVE-2024-26855.html
* https://www.suse.com/security/cve/CVE-2024-26856.html
* https://www.suse.com/security/cve/CVE-2024-26857.html
* https://www.suse.com/security/cve/CVE-2024-26861.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26866.html
* https://www.suse.com/security/cve/CVE-2024-26872.html
* https://www.suse.com/security/cve/CVE-2024-26875.html
* https://www.suse.com/security/cve/CVE-2024-26876.html
* https://www.suse.com/security/cve/CVE-2024-26877.html
* https://www.suse.com/security/cve/CVE-2024-26878.html
* https://www.suse.com/security/cve/CVE-2024-26879.html
* https://www.suse.com/security/cve/CVE-2024-26881.html
* https://www.suse.com/security/cve/CVE-2024-26882.html
* https://www.suse.com/security/cve/CVE-2024-26883.html
* https://www.suse.com/security/cve/CVE-2024-26884.html
* https://www.suse.com/security/cve/CVE-2024-26885.html
* https://www.suse.com/security/cve/CVE-2024-26891.html
* https://www.suse.com/security/cve/CVE-2024-26893.html
* https://www.suse.com/security/cve/CVE-2024-26895.html
* https://www.suse.com/security/cve/CVE-2024-26896.html
* https://www.suse.com/security/cve/CVE-2024-26897.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26901.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26915.html
* https://www.suse.com/security/cve/CVE-2024-26917.html
* https://www.suse.com/security/cve/CVE-2024-26927.html
* https://www.suse.com/security/cve/CVE-2024-26933.html
* https://www.suse.com/security/cve/CVE-2024-26939.html
* https://www.suse.com/security/cve/CVE-2024-26948.html
* https://www.suse.com/security/cve/CVE-2024-26950.html
* https://www.suse.com/security/cve/CVE-2024-26951.html
* https://www.suse.com/security/cve/CVE-2024-26955.html
* https://www.suse.com/security/cve/CVE-2024-26956.html
* https://www.suse.com/security/cve/CVE-2024-26960.html
* https://www.suse.com/security/cve/CVE-2024-26965.html
* https://www.suse.com/security/cve/CVE-2024-26966.html
* https://www.suse.com/security/cve/CVE-2024-26969.html
* https://www.suse.com/security/cve/CVE-2024-26970.html
* https://www.suse.com/security/cve/CVE-2024-26972.html
* https://www.suse.com/security/cve/CVE-2024-26979.html
* https://www.suse.com/security/cve/CVE-2024-26981.html
* https://www.suse.com/security/cve/CVE-2024-26982.html
* https://www.suse.com/security/cve/CVE-2024-26993.html
* https://www.suse.com/security/cve/CVE-2024-27013.html
* https://www.suse.com/security/cve/CVE-2024-27014.html
* https://www.suse.com/security/cve/CVE-2024-27030.html
* https://www.suse.com/security/cve/CVE-2024-27038.html
* https://www.suse.com/security/cve/CVE-2024-27039.html
* https://www.suse.com/security/cve/CVE-2024-27041.html
* https://www.suse.com/security/cve/CVE-2024-27042.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27046.html
* https://www.suse.com/security/cve/CVE-2024-27056.html
* https://www.suse.com/security/cve/CVE-2024-27059.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1141539
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1192837
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1196869
* https://bugzilla.suse.com/show_bug.cgi?id=1200313
* https://bugzilla.suse.com/show_bug.cgi?id=1201308
* https://bugzilla.suse.com/show_bug.cgi?id=1201489
* https://bugzilla.suse.com/show_bug.cgi?id=1203906
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1204614
* https://bugzilla.suse.com/show_bug.cgi?id=1207361
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1213573
* https://bugzilla.suse.com/show_bug.cgi?id=1217339
* https://bugzilla.suse.com/show_bug.cgi?id=1217408
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219141
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220569
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1221042
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221080
* https://bugzilla.suse.com/show_bug.cgi?id=1221084
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221617
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221825
* https://bugzilla.suse.com/show_bug.cgi?id=1222294
* https://bugzilla.suse.com/show_bug.cgi?id=1222307
* https://bugzilla.suse.com/show_bug.cgi?id=1222357
* https://bugzilla.suse.com/show_bug.cgi?id=1222368
* https://bugzilla.suse.com/show_bug.cgi?id=1222379
* https://bugzilla.suse.com/show_bug.cgi?id=1222385
* https://bugzilla.suse.com/show_bug.cgi?id=1222424
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222613
* https://bugzilla.suse.com/show_bug.cgi?id=1222615
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222710
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222793
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222812
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222870
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1222968
* https://bugzilla.suse.com/show_bug.cgi?id=1222976
* https://bugzilla.suse.com/show_bug.cgi?id=1223012
* https://bugzilla.suse.com/show_bug.cgi?id=1223014
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223024
* https://bugzilla.suse.com/show_bug.cgi?id=1223033
* https://bugzilla.suse.com/show_bug.cgi?id=1223034
* https://bugzilla.suse.com/show_bug.cgi?id=1223035
* https://bugzilla.suse.com/show_bug.cgi?id=1223036
* https://bugzilla.suse.com/show_bug.cgi?id=1223037
* https://bugzilla.suse.com/show_bug.cgi?id=1223041
* https://bugzilla.suse.com/show_bug.cgi?id=1223042
* https://bugzilla.suse.com/show_bug.cgi?id=1223051
* https://bugzilla.suse.com/show_bug.cgi?id=1223052
* https://bugzilla.suse.com/show_bug.cgi?id=1223056
* https://bugzilla.suse.com/show_bug.cgi?id=1223057
* https://bugzilla.suse.com/show_bug.cgi?id=1223058
* https://bugzilla.suse.com/show_bug.cgi?id=1223060
* https://bugzilla.suse.com/show_bug.cgi?id=1223061
* https://bugzilla.suse.com/show_bug.cgi?id=1223065
* https://bugzilla.suse.com/show_bug.cgi?id=1223066
* https://bugzilla.suse.com/show_bug.cgi?id=1223076
* https://bugzilla.suse.com/show_bug.cgi?id=1223078
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223115
* https://bugzilla.suse.com/show_bug.cgi?id=1223118
* https://bugzilla.suse.com/show_bug.cgi?id=1223119
* https://bugzilla.suse.com/show_bug.cgi?id=1223140
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223189
* https://bugzilla.suse.com/show_bug.cgi?id=1223190
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223196
* https://bugzilla.suse.com/show_bug.cgi?id=1223197
* https://bugzilla.suse.com/show_bug.cgi?id=1223198
* https://bugzilla.suse.com/show_bug.cgi?id=1223207
* https://bugzilla.suse.com/show_bug.cgi?id=1223275
* https://bugzilla.suse.com/show_bug.cgi?id=1223323
* https://bugzilla.suse.com/show_bug.cgi?id=1223360
* https://bugzilla.suse.com/show_bug.cgi?id=1223369
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223432
* https://bugzilla.suse.com/show_bug.cgi?id=1223473
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223478
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223481
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223490
* https://bugzilla.suse.com/show_bug.cgi?id=1223496
* https://bugzilla.suse.com/show_bug.cgi?id=1223498
* https://bugzilla.suse.com/show_bug.cgi?id=1223499
* https://bugzilla.suse.com/show_bug.cgi?id=1223501
* https://bugzilla.suse.com/show_bug.cgi?id=1223502
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223511
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223520
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223525
* https://bugzilla.suse.com/show_bug.cgi?id=1223536
* https://bugzilla.suse.com/show_bug.cgi?id=1223539
* https://bugzilla.suse.com/show_bug.cgi?id=1223574
* https://bugzilla.suse.com/show_bug.cgi?id=1223595
* https://bugzilla.suse.com/show_bug.cgi?id=1223598
* https://bugzilla.suse.com/show_bug.cgi?id=1223628
* https://bugzilla.suse.com/show_bug.cgi?id=1223634
* https://bugzilla.suse.com/show_bug.cgi?id=1223640
* https://bugzilla.suse.com/show_bug.cgi?id=1223643
* https://bugzilla.suse.com/show_bug.cgi?id=1223644
* https://bugzilla.suse.com/show_bug.cgi?id=1223645
* https://bugzilla.suse.com/show_bug.cgi?id=1223646
* https://bugzilla.suse.com/show_bug.cgi?id=1223648
* https://bugzilla.suse.com/show_bug.cgi?id=1223655
* https://bugzilla.suse.com/show_bug.cgi?id=1223657
* https://bugzilla.suse.com/show_bug.cgi?id=1223660
* https://bugzilla.suse.com/show_bug.cgi?id=1223661
* https://bugzilla.suse.com/show_bug.cgi?id=1223663
* https://bugzilla.suse.com/show_bug.cgi?id=1223664
* https://bugzilla.suse.com/show_bug.cgi?id=1223668
* https://bugzilla.suse.com/show_bug.cgi?id=1223670
* https://bugzilla.suse.com/show_bug.cgi?id=1223679
* https://bugzilla.suse.com/show_bug.cgi?id=1223686
* https://bugzilla.suse.com/show_bug.cgi?id=1223693
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223714
* https://bugzilla.suse.com/show_bug.cgi?id=1223735
* https://bugzilla.suse.com/show_bug.cgi?id=1223738
* https://bugzilla.suse.com/show_bug.cgi?id=1223745
* https://bugzilla.suse.com/show_bug.cgi?id=1223784
* https://bugzilla.suse.com/show_bug.cgi?id=1223785
* https://bugzilla.suse.com/show_bug.cgi?id=1223790
* https://bugzilla.suse.com/show_bug.cgi?id=1223816
* https://bugzilla.suse.com/show_bug.cgi?id=1223821
* https://bugzilla.suse.com/show_bug.cgi?id=1223822
* https://bugzilla.suse.com/show_bug.cgi?id=1223823
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
* https://bugzilla.suse.com/show_bug.cgi?id=1223827
* https://bugzilla.suse.com/show_bug.cgi?id=1223834
* https://bugzilla.suse.com/show_bug.cgi?id=1223858
* https://bugzilla.suse.com/show_bug.cgi?id=1223875
* https://bugzilla.suse.com/show_bug.cgi?id=1223876
* https://bugzilla.suse.com/show_bug.cgi?id=1223877
* https://bugzilla.suse.com/show_bug.cgi?id=1223878
* https://bugzilla.suse.com/show_bug.cgi?id=1223879
* https://bugzilla.suse.com/show_bug.cgi?id=1223894
* https://bugzilla.suse.com/show_bug.cgi?id=1223921
* https://bugzilla.suse.com/show_bug.cgi?id=1223922
* https://bugzilla.suse.com/show_bug.cgi?id=1223923
* https://bugzilla.suse.com/show_bug.cgi?id=1223924
* https://bugzilla.suse.com/show_bug.cgi?id=1223929
* https://bugzilla.suse.com/show_bug.cgi?id=1223931
* https://bugzilla.suse.com/show_bug.cgi?id=1223932
* https://bugzilla.suse.com/show_bug.cgi?id=1223934
* https://bugzilla.suse.com/show_bug.cgi?id=1223941
* https://bugzilla.suse.com/show_bug.cgi?id=1223948
* https://bugzilla.suse.com/show_bug.cgi?id=1223949
* https://bugzilla.suse.com/show_bug.cgi?id=1223950
* https://bugzilla.suse.com/show_bug.cgi?id=1223951
* https://bugzilla.suse.com/show_bug.cgi?id=1223952
* https://bugzilla.suse.com/show_bug.cgi?id=1223953
* https://bugzilla.suse.com/show_bug.cgi?id=1223956
* https://bugzilla.suse.com/show_bug.cgi?id=1223957
* https://bugzilla.suse.com/show_bug.cgi?id=1223960
* https://bugzilla.suse.com/show_bug.cgi?id=1223962
* https://bugzilla.suse.com/show_bug.cgi?id=1223963
* https://bugzilla.suse.com/show_bug.cgi?id=1223964
* https://bugzilla.suse.com/show_bug.cgi?id=1223996
* https://jira.suse.com/browse/PED-7167
1
0
SUSE-SU-2024:1647-1: important: Security update for the Linux Kernel
by OPENSUSE-SECURITY-UPDATES 14 May '24
by OPENSUSE-SECURITY-UPDATES 14 May '24
14 May '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1647-1
Rating: important
References:
* bsc#1190576
* bsc#1192145
* bsc#1192354
* bsc#1192837
* bsc#1193629
* bsc#1203906
* bsc#1203935
* bsc#1204614
* bsc#1206881
* bsc#1209657
* bsc#1215221
* bsc#1216223
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1219104
* bsc#1219126
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220703
* bsc#1220761
* bsc#1220883
* bsc#1221044
* bsc#1221061
* bsc#1221088
* bsc#1221293
* bsc#1221299
* bsc#1221612
* bsc#1221830
* bsc#1222117
* bsc#1222422
* bsc#1222430
* bsc#1222435
* bsc#1222482
* bsc#1222503
* bsc#1222536
* bsc#1222559
* bsc#1222585
* bsc#1222618
* bsc#1222624
* bsc#1222660
* bsc#1222662
* bsc#1222664
* bsc#1222666
* bsc#1222671
* bsc#1222703
* bsc#1222704
* bsc#1222706
* bsc#1222709
* bsc#1222721
* bsc#1222726
* bsc#1222773
* bsc#1222776
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222796
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1223016
* bsc#1223187
* bsc#1223380
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223479
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223522
* bsc#1223523
* bsc#1223705
* bsc#1223824
Cross-References:
* CVE-2021-47047
* CVE-2021-47181
* CVE-2021-47182
* CVE-2021-47183
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47189
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2023-0160
* CVE-2023-52476
* CVE-2023-52500
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52607
* CVE-2023-52616
* CVE-2023-52628
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26614
* CVE-2024-26642
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26704
* CVE-2024-26727
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26773
* CVE-2024-26792
* CVE-2024-26816
* CVE-2024-26898
* CVE-2024-26903
* CVE-2024-27043
* CVE-2024-27389
CVSS scores:
* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
An update that solves 87 vulnerabilities and has 12 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
* CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus
(bsc#1222790).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len
in ext4 (bsc#1222422).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
The following non-security bugs were fixed:
* Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
* ibmvfc: make 'max_sectors' a module option (bsc#1216223).
* scsi: Update max_hw_sectors on rescan (bsc#1216223).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1647=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1647=1
* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1647=1
* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1647=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1647=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1647=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.3 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.4 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* openSUSE Leap Micro 5.4 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
* kernel-rt-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* kernel-rt-debugsource-5.14.21-150400.15.79.1
* kernel-rt-debuginfo-5.14.21-150400.15.79.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* kernel-source-rt-5.14.21-150400.15.79.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47181.html
* https://www.suse.com/security/cve/CVE-2021-47182.html
* https://www.suse.com/security/cve/CVE-2021-47183.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47189.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26727.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1190576
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1192354
* https://bugzilla.suse.com/show_bug.cgi?id=1192837
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1203906
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1204614
* https://bugzilla.suse.com/show_bug.cgi?id=1206881
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222536
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222660
* https://bugzilla.suse.com/show_bug.cgi?id=1222662
* https://bugzilla.suse.com/show_bug.cgi?id=1222664
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222706
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223824
1
0