openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- 2 participants
- 22491 discussions
SUSE-RU-2024:4322-1: moderate: Recommended update for nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 16 Dec '24
by OPENSUSE-UPDATES 16 Dec '24
16 Dec '24
# Recommended update for nvidia-open-driver-G06-signed
Announcement ID: SUSE-RU-2024:4322-1
Release Date: 2024-12-16T09:07:00Z
Rating: moderate
References:
* bsc#1233332
* bsc#1233673
Affected Products:
* openSUSE Leap 15.4
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for nvidia-open-driver-G06-signed fixes the following issues:
* For CUDA update version to 565.57.01
* Add 'dummy' firmware package on SLE to work around update issues. On SLE,
the firmware is installed directly from an NVIDIA-hosted repo.
* Improve handling of conflicts between different flavors (gfx vs. CUDA)
(bsc#1233332).
* Update to 550.135 (bsc#1233673)
* fixes wrong logic for checking supported architectures
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4322=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4322=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4322=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4322=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4322=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4322=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4322=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4322=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4322=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4322=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4322=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4322=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4322=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4322=1
## Package List:
* openSUSE Leap 15.4 (x86_64)
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150400.12-150400.9.76.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* Public Cloud Module 15-SP4 (x86_64)
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150400.12-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150400.12-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* SUSE Manager Proxy 4.3 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Manager Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233332
* https://bugzilla.suse.com/show_bug.cgi?id=1233673
1
0
openSUSE-SU-2024:0408-1: moderate: Security update for python-Django
by opensuse-security@opensuse.org 14 Dec '24
by opensuse-security@opensuse.org 14 Dec '24
14 Dec '24
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0408-1
Rating: moderate
References: #1234232
Cross-References: CVE-2024-53907
CVSS scores:
CVE-2024-53907 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-Django fixes the following issues:
- CVE-2024-53907: Fixed potential denial-of-service in
django.utils.html.strip_tags() (boo#1234232).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-408=1
Package List:
References:
https://www.suse.com/security/cve/CVE-2024-53907.html
https://bugzilla.suse.com/1234232
1
0
openSUSE-RU-2024:0407-1: moderate: Recommended update for orthanc-ohif
by maintenance@opensuse.org 14 Dec '24
by maintenance@opensuse.org 14 Dec '24
14 Dec '24
openSUSE Recommended Update: Recommended update for orthanc-ohif
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0407-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for orthanc-ohif fixes the following issues:
Version 1.4:
* Updated OHIF to 3.9.1
* The default value for the "DataSource" configuration is now
"dicom-web" instead of "dicom-json" since "dicom-web" is usually more
optimized.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-407=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
orthanc-ohif-1.4-bp156.2.6.1
References:
1
0
SUSE-RU-2024:4310-1: moderate: Recommended update for nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 13 Dec '24
by OPENSUSE-UPDATES 13 Dec '24
13 Dec '24
# Recommended update for nvidia-open-driver-G06-signed
Announcement ID: SUSE-RU-2024:4310-1
Release Date: 2024-12-13T14:20:45Z
Rating: moderate
References:
* bsc#1229716
* bsc#1230368
* bsc#1230779
* bsc#1232057
* bsc#1233332
* bsc#1233673
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has six fixes can now be installed.
## Description:
This update for nvidia-open-driver-G06-signed fixes the following issues:
* resolve self conflicts of -cuda KMP during update by adding obsoletes to
older versions (boo#1233332)
Update to 550.135 (boo#1232057 boo#1233673):
* fixes wrong logic for checking supported architectures
* Fixed a bug which could cause applications using GBM to crash when running
with nvidia-drm.modeset=0.
* cuda-flavor provide also nvidia-open-driver-G06-kmp-$flavor = %version to
workaround broken cuda-drivers
* For CUDA update version to 560.35.03
* cuda-flavor
* provide nvidia-open-driver-G06-kmp = %version to workaround broken cuda-
drivers
* latest change hardcoded to 555.42.06; we no longer need this for 560
* nv-prefer-signed-open-driver:
* added specific versions of cuda-drivers/cuda-drivers-xxx as preconditions
for requiring specific version of nvidia-compute-G06
* nv-prefer-signed-open-driver:
* no longer require a specific version of nvidia-open-driver-G06-signed-cuda-
kmp, so it can select the correct open driver KMP matching the cuda-runtime
version
* cuda-flavor:
* added nvidia-compute-G06 = %version to preconditions for requiring kernel-
firmware-nvidia-gspx-G06, since nvidia-compute-utils-G06 does not have a
version-specific requires on nvidia-compute-G06
* cuda-flavor:
* require kernel-firmware-nvidia-gspx-G06 instead of kernel-firmware-nvidia-
gspx-G06-cuda (which provides also kernel-firmware-nvidia-gspx-G06)
* trigger removal of driver modules also on kernel-firmware-nvidia-gspx-G06
* no longer hard-require kernel firmware package, but install it automatically
once nvidia-compute-utils-G06 gets installed
* trigger removal of driver modules with non-existing or wrong firmware when
(new) firmware gets installed
* Update to 550.120 (bsc#1230779)
* Fixed a bug that could cause kernel crashes upon attempting KMS operations
through DRM when nvidia_drm was loaded with modeset=0.
* CUDA build: removed entries from pci_ids-555.42.06 since this is doing more
harm than benefit (bsc#1230368)
* For CUDA (preamble file):
* added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version
which is needed for 'zypper install <package> = <version>'
* added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor =
%version useful for containers
* reverted CUDA update version to 560.x.y due to changes in CUDA repository
with CUDA 12.6/560.x.y drivers
* For CUDA update version to 560.35.03
* Update to 550.107.02 (bsc#1229716)
* For CUDA update version to 560.28.03
* better summary and description for KMP
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4310=1 openSUSE-SLE-15.6-2024-4310=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4310=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4310=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-azure-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150600.3.20.2
* openSUSE Leap 15.6 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nv-prefer-signed-open-driver-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-debugsource-550.135-150600.3.20.2
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-default-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-default-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* openSUSE Leap 15.6 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k6.4.0_150600.21-150600.3.20.2
* Basesystem Module 15-SP6 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nv-prefer-signed-open-driver-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-debugsource-550.135-150600.3.20.2
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-default-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-default-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* Basesystem Module 15-SP6 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k6.4.0_150600.21-150600.3.20.2
* Public Cloud Module 15-SP6 (x86_64)
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-azure-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150600.3.20.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229716
* https://bugzilla.suse.com/show_bug.cgi?id=1230368
* https://bugzilla.suse.com/show_bug.cgi?id=1230779
* https://bugzilla.suse.com/show_bug.cgi?id=1232057
* https://bugzilla.suse.com/show_bug.cgi?id=1233332
* https://bugzilla.suse.com/show_bug.cgi?id=1233673
1
0
13 Dec '24
# Recommended update for fence-agents
Announcement ID: SUSE-RU-2024:4312-1
Release Date: 2024-12-13T14:31:28Z
Rating: moderate
References:
* jsc#PED-11661
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature can now be installed.
## Description:
This update for fence-agents fixes the following issue:
* eaton SSH Fence Agent (jsc#PED-11661)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4312=1 SUSE-2024-4312=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4312=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* fence-agents-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debuginfo-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-devel-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debugsource-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-amt_ws-4.13.1+git.1704296072.32469f29-150600.3.12.2
* openSUSE Leap 15.6 (noarch)
* fence-agents-azure-arm-4.13.1+git.1704296072.32469f29-150600.3.12.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* fence-agents-devel-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debuginfo-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debugsource-4.13.1+git.1704296072.32469f29-150600.3.12.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch)
* fence-agents-azure-arm-4.13.1+git.1704296072.32469f29-150600.3.12.2
## References:
* https://jira.suse.com/browse/PED-11661
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4313-1
Release Date: 2024-12-13T15:20:18Z
Rating: important
References:
* bsc#1154353
* bsc#1198778
* bsc#1218644
* bsc#1220927
* bsc#1231939
* bsc#1231940
* bsc#1231958
* bsc#1231962
* bsc#1231991
* bsc#1231992
* bsc#1231995
* bsc#1232006
* bsc#1232163
* bsc#1232172
* bsc#1232224
* bsc#1232436
* bsc#1232860
* bsc#1232907
* bsc#1232919
* bsc#1232928
* bsc#1233070
* bsc#1233117
* bsc#1233293
* bsc#1233453
* bsc#1233456
* bsc#1233468
* bsc#1233479
* bsc#1233490
* bsc#1233491
* bsc#1233555
* bsc#1233557
* jsc#SLE-8100
Cross-References:
* CVE-2022-48985
* CVE-2022-49006
* CVE-2022-49010
* CVE-2022-49011
* CVE-2022-49019
* CVE-2022-49021
* CVE-2022-49022
* CVE-2022-49029
* CVE-2022-49031
* CVE-2022-49032
* CVE-2023-52524
* CVE-2024-49925
* CVE-2024-50089
* CVE-2024-50115
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50154
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50264
* CVE-2024-50267
* CVE-2024-50279
* CVE-2024-50290
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53061
* CVE-2024-53063
CVSS scores:
* CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49006 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49010 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves 27 vulnerabilities, contains one feature and has four
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070)
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus
(bsc#1233479).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233490).
* CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
The following non-security bugs were fixed:
* Update config files (bsc#1218644).
* e1000e: Correct NVM checksum verification flow (jsc#SLE-8100).
* e1000e: Correct NVM checksum verification flow (jsc#SLE-8100).
* e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
* e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
* ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198778).
* ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1198778).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* net: ena: Add capabilities field with support for ENI stats capability
(bsc#1198778).
* net: ena: Add debug prints for invalid req_id resets (bsc#1198778).
* net: ena: Change ENI stats support check to use capabilities field
(bsc#1198778).
* net: ena: Change return value of ena_calc_io_queue_size() to void
(bsc#1198778).
* net: ena: Change the name of bad_csum variable (bsc#1198778).
* net: ena: Extract recurring driver reset code into a function (bsc#1198778).
* net: ena: Flush XDP packets on error (bsc#1198778).
* net: ena: Improve error logging in driver (bsc#1198778).
* net: ena: Move reset completion print to the reset function (bsc#1198778).
* net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198778).
* net: ena: Remove module param and change message severity (bsc#1198778).
* net: ena: Remove redundant return code check (bsc#1198778).
* net: ena: Remove unused code (bsc#1198778).
* net: ena: Set tx_info->xdpf value to NULL (bsc#1198778).
* net: ena: Update XDP verdict upon failure (bsc#1198778).
* net: ena: Use bitmask to indicate packet redirection (bsc#1198778).
* net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198778).
* net: ena: add device distinct log prefix to files (bsc#1198778).
* net: ena: add jiffies of last napi call to stats (bsc#1198778).
* net: ena: aggregate doorbell common operations into a function
(bsc#1198778).
* net: ena: aggregate stats increase into a function (bsc#1198778).
* net: ena: fix DMA mapping function issues in XDP (bsc#1198778).
* net: ena: fix coding style nits (bsc#1198778).
* net: ena: fix inaccurate print type (bsc#1198778).
* net: ena: introduce XDP redirect implementation (bsc#1198778).
* net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198778).
* net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198778).
* net: ena: re-organize code to improve readability (bsc#1198778).
* net: ena: remove extra words from comments (bsc#1198778).
* net: ena: store values in their appropriate variables types (bsc#1198778).
* net: ena: use build_skb() in RX path (bsc#1198778).
* net: ena: use constant value for net_device allocation (bsc#1198778).
* net: ena: use xdp_frame in XDP TX flow (bsc#1198778).
* net: ena: use xdp_return_frame() to free xdp frames (bsc#1198778).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* tools headers: Grab copy of linux/const.h, needed by linux/bits.h
(bsc#1154353).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4313=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4313=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4313=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4313=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4313=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4313=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4313=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4313=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (noarch)
* kernel-docs-html-5.3.18-150300.59.185.1
* kernel-source-vanilla-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* kernel-macros-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.185.1
* kernel-debug-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-debugsource-5.3.18-150300.59.185.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-devel-5.3.18-150300.59.185.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.185.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-kvmsmall-devel-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-rebuild-5.3.18-150300.59.185.1.150300.18.109.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* cluster-md-kmp-default-5.3.18-150300.59.185.1
* ocfs2-kmp-default-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-5.3.18-150300.59.185.1
* kernel-default-livepatch-5.3.18-150300.59.185.1
* kernel-default-extra-5.3.18-150300.59.185.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-qa-5.3.18-150300.59.185.1
* dlm-kmp-default-5.3.18-150300.59.185.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.185.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-default-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-optional-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.185.1
* kernel-livepatch-SLE15-SP3_Update_51-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_185-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kselftests-kmp-preempt-5.3.18-150300.59.185.1
* kernel-preempt-optional-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* reiserfs-kmp-preempt-5.3.18-150300.59.185.1
* ocfs2-kmp-preempt-5.3.18-150300.59.185.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* cluster-md-kmp-preempt-5.3.18-150300.59.185.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-preempt-5.3.18-150300.59.185.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* dlm-kmp-preempt-5.3.18-150300.59.185.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-extra-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.185.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64)
* dtb-xilinx-5.3.18-150300.59.185.1
* dtb-altera-5.3.18-150300.59.185.1
* dtb-zte-5.3.18-150300.59.185.1
* dtb-sprd-5.3.18-150300.59.185.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-extra-5.3.18-150300.59.185.1
* dtb-al-5.3.18-150300.59.185.1
* dtb-broadcom-5.3.18-150300.59.185.1
* kernel-64kb-optional-5.3.18-150300.59.185.1
* dtb-apm-5.3.18-150300.59.185.1
* dtb-exynos-5.3.18-150300.59.185.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.185.1
* ocfs2-kmp-64kb-5.3.18-150300.59.185.1
* reiserfs-kmp-64kb-5.3.18-150300.59.185.1
* dtb-rockchip-5.3.18-150300.59.185.1
* kselftests-kmp-64kb-5.3.18-150300.59.185.1
* dtb-marvell-5.3.18-150300.59.185.1
* gfs2-kmp-64kb-5.3.18-150300.59.185.1
* dtb-freescale-5.3.18-150300.59.185.1
* dtb-amlogic-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* dtb-nvidia-5.3.18-150300.59.185.1
* dtb-hisilicon-5.3.18-150300.59.185.1
* dtb-amd-5.3.18-150300.59.185.1
* dtb-qcom-5.3.18-150300.59.185.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.185.1
* dtb-renesas-5.3.18-150300.59.185.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-lg-5.3.18-150300.59.185.1
* dlm-kmp-64kb-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* dtb-mediatek-5.3.18-150300.59.185.1
* dtb-socionext-5.3.18-150300.59.185.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-allwinner-5.3.18-150300.59.185.1
* dtb-cavium-5.3.18-150300.59.185.1
* cluster-md-kmp-64kb-5.3.18-150300.59.185.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-arm-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-default-livepatch-devel-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-livepatch-5.3.18-150300.59.185.1
* kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* ocfs2-kmp-default-5.3.18-150300.59.185.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* dlm-kmp-default-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-5.3.18-150300.59.185.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* cluster-md-kmp-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-default-5.3.18-150300.59.185.1
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-default-5.3.18-150300.59.185.1
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48985.html
* https://www.suse.com/security/cve/CVE-2022-49006.html
* https://www.suse.com/security/cve/CVE-2022-49010.html
* https://www.suse.com/security/cve/CVE-2022-49011.html
* https://www.suse.com/security/cve/CVE-2022-49019.html
* https://www.suse.com/security/cve/CVE-2022-49021.html
* https://www.suse.com/security/cve/CVE-2022-49022.html
* https://www.suse.com/security/cve/CVE-2022-49029.html
* https://www.suse.com/security/cve/CVE-2022-49031.html
* https://www.suse.com/security/cve/CVE-2022-49032.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1198778
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1231939
* https://bugzilla.suse.com/show_bug.cgi?id=1231940
* https://bugzilla.suse.com/show_bug.cgi?id=1231958
* https://bugzilla.suse.com/show_bug.cgi?id=1231962
* https://bugzilla.suse.com/show_bug.cgi?id=1231991
* https://bugzilla.suse.com/show_bug.cgi?id=1231992
* https://bugzilla.suse.com/show_bug.cgi?id=1231995
* https://bugzilla.suse.com/show_bug.cgi?id=1232006
* https://bugzilla.suse.com/show_bug.cgi?id=1232163
* https://bugzilla.suse.com/show_bug.cgi?id=1232172
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://jira.suse.com/browse/SLE-8100
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4316-1
Release Date: 2024-12-13T15:24:05Z
Rating: important
References:
* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232201
* bsc#1232207
* bsc#1232208
* bsc#1232224
* bsc#1232258
* bsc#1232264
* bsc#1232272
* bsc#1232318
* bsc#1232335
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232704
* bsc#1232757
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943
Cross-References:
* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49868
* CVE-2024-49884
* CVE-2024-49888
* CVE-2024-49899
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138
CVSS scores:
* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 228 vulnerabilities, contains four features and has 44
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).
The following non-security bugs were fixed:
* ACPI: CPPC: Fix _CPC register setting issue (git-fixes).
* ALSA: 6fire: Release resources at card release (git-fixes).
* ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).
* ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).
* ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* ALSA: hda: Show the codec quirk info at probing (stable-fixes).
* ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* ASoC: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* ASoC: SOF: Wire up buffer flags (bsc#1233305).
* ASoC: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* ASoC: SOF: align topology header file with sof topology header
(bsc#1233305).
* ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* ASoC: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* ASoC: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* ASoC: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).
* ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* HID: core: zero-initialize the report buffer (git-fixes).
* HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* HID: multitouch: Add support for B2402FVA track point (stable-fixes).
* HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* HID: wacom: fix when get product name maybe null pointer (git-fixes).
* Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* Input: xpad - add support for MSI Claw A1M (git-fixes).
* Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* Input: xpad - fix support for some third-party controllers (git-fixes).
* Input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* Input: xpad - spelling fixes for "Xbox" (git-fixes).
* KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).
* KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* Move kabi netfilter fix into patches.kabi
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* NFS: remove revoked delegation from server's delegation list (git-fixes).
* PCI: Add T_PVPERL macro (git-fixes).
* PCI: Fix reset_method_store() memory leak (git-fixes).
* PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* PCI: rockchip-ep: Fix address translation unit programming (git-fixes).
* RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* RDMA/hns: Add mutex_destroy() (git-fixes)
* RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* RDMA/hns: Use macro instead of magic number (git-fixes)
* RDMA/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* RDMA/rxe: Fix the qp flush warnings in req (git-fixes)
* RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* SUNRPC: Remove BUG_ON call sites (git-fixes).
* USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* USB: chaoskey: fail open after removal (git-fixes).
* USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* USB: serial: option: add Quectel RG650V (stable-fixes).
* USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4316=1 openSUSE-SLE-15.6-2024-4316=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4316=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64)
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* gfs2-kmp-azure-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kselftests-kmp-azure-6.4.0-150600.8.20.1
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-optional-6.4.0-150600.8.20.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* dlm-kmp-azure-6.4.0-150600.8.20.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-6.4.0-150600.8.20.1
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4314-1
Release Date: 2024-12-13T15:23:19Z
Rating: important
References:
* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232079
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232149
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232199
* bsc#1232201
* bsc#1232207
* bsc#1232224
* bsc#1232258
* bsc#1232259
* bsc#1232264
* bsc#1232272
* bsc#1232305
* bsc#1232307
* bsc#1232318
* bsc#1232335
* bsc#1232337
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232501
* bsc#1232502
* bsc#1232704
* bsc#1232757
* bsc#1232819
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943
Cross-References:
* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49852
* CVE-2024-49866
* CVE-2024-49868
* CVE-2024-49881
* CVE-2024-49883
* CVE-2024-49884
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49897
* CVE-2024-49899
* CVE-2024-49901
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49959
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50015
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50080
* CVE-2024-50081
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138
CVSS scores:
* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6
An update that solves 241 vulnerabilities, contains four features and has 43
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in
efc_nport_vport_del() (bsc#1232819).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma
hardware format translation (bsc#1232352).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (bsc#1232307).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when
partially writing (bsc#1232079).
* CVE-2024-50080: ublk: do not allow user copy for unprivileged device
(bsc#1232502).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).
The following non-security bugs were fixed:
* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* alsa: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* alsa: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* alsa: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* alsa: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* alsa: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* alsa: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* alsa: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* alsa: hda: Show the codec quirk info at probing (stable-fixes).
* alsa: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* alsa: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* alsa: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* alsa: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* alsa: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* alsa: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* alsa: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* alsa: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* alsa: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* alsa: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* asoc: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* asoc: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* asoc: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* asoc: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* asoc: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* asoc: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* asoc: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* asoc: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* asoc: SOF: Wire up buffer flags (bsc#1233305).
* asoc: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* asoc: SOF: align topology header file with sof topology header
(bsc#1233305).
* asoc: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* asoc: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* asoc: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* asoc: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* asoc: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* asoc: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* asoc: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* asoc: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* asoc: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* asoc: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* asoc: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* asoc: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* asoc: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* asoc: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* asoc: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* asoc: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* asoc: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* asoc: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* asoc: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: fsl_micfil: Add sample rate constraint (stable-fixes).
* asoc: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* asoc: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* asoc: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* asoc: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* asoc: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* asoc: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* asoc: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* input: xpad - add support for MSI Claw A1M (git-fixes).
* input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* input: xpad - fix support for some third-party controllers (git-fixes).
* input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* input: xpad - spelling fixes for "Xbox" (git-fixes).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* kvm: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* kvm: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* kvm: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* kvm: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: bttv: use audio defaults for winfast2000 (git-fixes).
* media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfs: remove revoked delegation from server's delegation list (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rdma/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* sunrpc: Remove BUG_ON call sites (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4314=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4314=1
* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-4314=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* kernel-rt_debug-debugsource-6.4.0-150600.10.20.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-vdso-6.4.0-150600.10.20.1
* kernel-rt-devel-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-6.4.0-150600.10.20.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-debugsource-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1
* reiserfs-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1
* dlm-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-optional-6.4.0-150600.10.20.1
* kernel-rt-extra-6.4.0-150600.10.20.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-vdso-6.4.0-150600.10.20.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.20.1
* kernel-syms-rt-6.4.0-150600.10.20.1
* kernel-rt-debuginfo-6.4.0-150600.10.20.1
* kselftests-kmp-rt-6.4.0-150600.10.20.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* gfs2-kmp-rt-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.20.1
* kernel-source-rt-6.4.0-150600.10.20.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-6.4.0-150600.10.20.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_20-rt-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-debugsource-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1
* gfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-6.4.0-150600.10.20.1
* dlm-kmp-rt-6.4.0-150600.10.20.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-devel-6.4.0-150600.10.20.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1
* kernel-syms-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-6.4.0-150600.10.20.1
* kernel-rt-debuginfo-6.4.0-150600.10.20.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.20.1
* kernel-source-rt-6.4.0-150600.10.20.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-6.4.0-150600.10.20.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50015.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50080.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232079
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232502
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4315-1
Release Date: 2024-12-13T15:23:51Z
Rating: important
References:
* bsc#1082555
* bsc#1194869
* bsc#1218644
* bsc#1220382
* bsc#1221309
* bsc#1221333
* bsc#1222364
* bsc#1222590
* bsc#1223202
* bsc#1223656
* bsc#1223848
* bsc#1223919
* bsc#1223942
* bsc#1224518
* bsc#1224526
* bsc#1224574
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225812
* bsc#1226560
* bsc#1226592
* bsc#1226631
* bsc#1226748
* bsc#1226872
* bsc#1227853
* bsc#1228410
* bsc#1228430
* bsc#1228486
* bsc#1228650
* bsc#1228857
* bsc#1229312
* bsc#1229429
* bsc#1229585
* bsc#1229752
* bsc#1229808
* bsc#1230055
* bsc#1230220
* bsc#1230231
* bsc#1230270
* bsc#1230558
* bsc#1230827
* bsc#1230918
* bsc#1231083
* bsc#1231089
* bsc#1231098
* bsc#1231101
* bsc#1231108
* bsc#1231111
* bsc#1231132
* bsc#1231135
* bsc#1231138
* bsc#1231169
* bsc#1231178
* bsc#1231180
* bsc#1231181
* bsc#1231187
* bsc#1231202
* bsc#1231434
* bsc#1231441
* bsc#1231452
* bsc#1231465
* bsc#1231474
* bsc#1231481
* bsc#1231537
* bsc#1231541
* bsc#1231646
* bsc#1231849
* bsc#1231856
* bsc#1231858
* bsc#1231859
* bsc#1231864
* bsc#1231904
* bsc#1231916
* bsc#1231920
* bsc#1231923
* bsc#1231930
* bsc#1231931
* bsc#1231947
* bsc#1231952
* bsc#1231953
* bsc#1231959
* bsc#1231978
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232027
* bsc#1232028
* bsc#1232047
* bsc#1232048
* bsc#1232050
* bsc#1232056
* bsc#1232076
* bsc#1232080
* bsc#1232094
* bsc#1232096
* bsc#1232098
* bsc#1232111
* bsc#1232126
* bsc#1232134
* bsc#1232135
* bsc#1232141
* bsc#1232142
* bsc#1232147
* bsc#1232152
* bsc#1232159
* bsc#1232162
* bsc#1232165
* bsc#1232180
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232195
* bsc#1232198
* bsc#1232201
* bsc#1232218
* bsc#1232224
* bsc#1232232
* bsc#1232254
* bsc#1232255
* bsc#1232264
* bsc#1232272
* bsc#1232279
* bsc#1232287
* bsc#1232293
* bsc#1232312
* bsc#1232317
* bsc#1232318
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232339
* bsc#1232349
* bsc#1232357
* bsc#1232359
* bsc#1232362
* bsc#1232364
* bsc#1232370
* bsc#1232371
* bsc#1232378
* bsc#1232385
* bsc#1232387
* bsc#1232394
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232483
* bsc#1232500
* bsc#1232503
* bsc#1232504
* bsc#1232507
* bsc#1232520
* bsc#1232552
* bsc#1232757
* bsc#1232819
* bsc#1232860
* bsc#1232870
* bsc#1232873
* bsc#1232877
* bsc#1232878
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232919
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233035
* bsc#1233049
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233117
* bsc#1233123
* bsc#1233125
* bsc#1233129
* bsc#1233130
* bsc#1233134
* bsc#1233135
* bsc#1233150
* bsc#1233189
* bsc#1233191
* bsc#1233197
* bsc#1233205
* bsc#1233206
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233214
* bsc#1233216
* bsc#1233238
* bsc#1233241
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233350
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233528
* bsc#1233548
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233570
* bsc#1233577
* bsc#1233580
* bsc#1233977
* bsc#1234012
* bsc#1234025
* bsc#1234085
* bsc#1234093
* bsc#1234098
* bsc#1234108
Cross-References:
* CVE-2021-47594
* CVE-2022-48674
* CVE-2022-48979
* CVE-2022-48982
* CVE-2022-48983
* CVE-2022-48989
* CVE-2022-48990
* CVE-2023-52915
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26782
* CVE-2024-26906
* CVE-2024-26953
* CVE-2024-35888
* CVE-2024-35937
* CVE-2024-35980
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36953
* CVE-2024-36954
* CVE-2024-38577
* CVE-2024-38589
* CVE-2024-38615
* CVE-2024-40997
* CVE-2024-41016
* CVE-2024-41023
* CVE-2024-41049
* CVE-2024-42131
* CVE-2024-43817
* CVE-2024-43897
* CVE-2024-44932
* CVE-2024-44964
* CVE-2024-44995
* CVE-2024-46681
* CVE-2024-46800
* CVE-2024-46802
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46807
* CVE-2024-46810
* CVE-2024-46812
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46835
* CVE-2024-46842
* CVE-2024-46853
* CVE-2024-46859
* CVE-2024-46864
* CVE-2024-46871
* CVE-2024-47663
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47679
* CVE-2024-47682
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47701
* CVE-2024-47709
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47718
* CVE-2024-47723
* CVE-2024-47728
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47742
* CVE-2024-47745
* CVE-2024-47749
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49855
* CVE-2024-49861
* CVE-2024-49863
* CVE-2024-49868
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49879
* CVE-2024-49884
* CVE-2024-49891
* CVE-2024-49900
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49905
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49921
* CVE-2024-49924
* CVE-2024-49925
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49938
* CVE-2024-49945
* CVE-2024-49947
* CVE-2024-49950
* CVE-2024-49957
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49968
* CVE-2024-49981
* CVE-2024-49983
* CVE-2024-49985
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50013
* CVE-2024-50017
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50031
* CVE-2024-50044
* CVE-2024-50062
* CVE-2024-50067
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50082
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50138
* CVE-2024-50141
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50160
* CVE-2024-50167
* CVE-2024-50171
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50215
* CVE-2024-50218
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50249
* CVE-2024-50255
* CVE-2024-50259
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53052
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53079
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53104
* CVE-2024-53110
CVSS scores:
* CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48979 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48990 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50259 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5
An update that solves 230 vulnerabilities and has 33 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).
* CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
* CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
* CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
reset (bsc#1230220).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
remap_file_pages() (bsc#1232135).
* CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
(bsc#1232187).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
module unload (bsc#1232877).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
(bsc#1232884).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).
* CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
(bsc#1233056).
* CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber
(bsc#1233107).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50195: posix-clock: Fix missing timespec64 check in
pc_clock_settime() (bsc#1233103).
* CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
(bsc#1233113).
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
(bsc#1233205).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
nsim_nexthop_bucket_activity_write() (bsc#1233214).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
write (bsc#1233548).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
* CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
sync state (bsc#1233580).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
The following non-security bugs were fixed:
* Drop OCFS2 patch causing a regression (bsc#1233255)
* Fix regression on AMDGPU driver (bsc#1233134)
* Removed the duplicated check of static_assert(sizeof(struct work_struct) >=
sizeof(struct rcu_head)).
* Removed unnecessary white-space change in kernel/bpf/syscall.c
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
(git-fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed
with "suse_" to make it more obvious its a downstream thing.
* add bugreference to a hv_netvsc patch (bsc#1232413).
* add commit message for the kABI patch
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
* alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
* arm64: Force position-independent veneers (git-fixes).
* arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
* asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
* asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
* block: Avoid leaking hctx->nr_active counter on batched completion
(bsc#1231923).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
* bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
(git-fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: Wait for FLR to complete during probe (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* chtls: fix tp->rcv_tstamp initialization (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
VLA (stable-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: Fix skb truesize underestimation (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Fix filter input checks to prevent config with invalid values (git-
fixes).
* i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* i40e: Restore VF MSI-X state during PCI reset (git-fixes).
* i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
* i40e: take into account XDP Tx queues when stopping rings (git-fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* iavf: Fix promiscuous mode configuration flow messages (git-fixes).
* iavf: Introduce new state machines for flow director (git-fixes).
* iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
fixes).
* iavf: fix FDIR rule fields masks validation (git-fixes).
* iavf: in iavf_down, disable queues when removing the driver (git-fixes).
* iavf: initialize waitqueues before starting watchdog_task (git-fixes).
* iavf: send VLAN offloading caps once after VFR (git-fixes).
* iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
fixes).
* ibmvnic: Do partial reset on login failure (bsc#1233150).
* ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
* ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).
* ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).
* ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
* ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
* ice: Fix NULL pointer deref during VF reset (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix link_down_on_close message (git-fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
* ice: avoid executing commands on other ports when driving sync (git-fixes).
* ice: change q_index variable type to s16 to store -1 value (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix over-shifted variable (git-fixes).
* ice: fix receive buffer size miscalculation (git-fixes).
* ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
fixes).
* ice: reset first in crash dump kernels (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
fixes).
* idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: distinguish vports by the dev_port attribute (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igc: Check VLAN EtherType mask (git-fixes).
* igc: Check VLAN TCI mask (git-fixes).
* igc: Fix hicredit calculation (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove temporary workaround (git-fixes).
* igc: Report VLAN EtherType matching back to user (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
* input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(git-fixes).
* input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
fixes).
* input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: fix crash with empty VF macvlan list (git-fixes).
* ixgbe: fix timestamp configuration code (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
* kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
(stable-fixes).
* media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Allow 0 for total host VFs (git-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
* net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
* net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
* net/mlx5: Drain health before unregistering devlink (git-fixes).
* net/mlx5: E-switch, register event handler before arming the event (git-
fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix fw tracer first block check (git-fixes).
* net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
* net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
(git-fixes).
* net/mlx5: Skip clock update work when device is in error state (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
* net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
(git-fixes).
* net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
* net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
* net/mlx5: fs, lock FTE when checking if active (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
* net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
* net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer for
representors (git-fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
by representors (git-fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not offload internal port if filter device is out device (git-
fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
(git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Fix pedit endianness (git-fixes).
* net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
* net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
* net/mlx5e: Reduce the size of icosq_str (git-fixes).
* net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
* net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
fixes).
* net/mlx5e: fix double free of encap_header (git-fixes).
* net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
fixes).
* net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
* qed: avoid truncating work queue length (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add clear_hem return value to log (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* rdma/hns: Remove unnecessary QP type checks (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* sfc: Check firmware supports Ethernet PTP filter (git-fixes).
* sfc: do not unregister flow_indr if it was never registered (git-fixes).
* sfc: fix a double-free bug in efx_probe_filters (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
* tun: prevent negative ifindex (git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* vdpa/mlx5: preserve CVQ vringh index (git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* x86/kvm: fix is_stale_page_fault() (bsc#1221333).
* xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
* xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-4315=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4315=1 openSUSE-SLE-15.5-2024-4315=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4315=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4315=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1
## Package List:
* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-extra-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* kernel-rt-optional-5.14.21-150500.13.79.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* kselftests-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47594.html
* https://www.suse.com/security/cve/CVE-2022-48674.html
* https://www.suse.com/security/cve/CVE-2022-48979.html
* https://www.suse.com/security/cve/CVE-2022-48982.html
* https://www.suse.com/security/cve/CVE-2022-48983.html
* https://www.suse.com/security/cve/CVE-2022-48989.html
* https://www.suse.com/security/cve/CVE-2022-48990.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-38615.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1221333
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1223919
* https://bugzilla.suse.com/show_bug.cgi?id=1223942
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1226560
* https://bugzilla.suse.com/show_bug.cgi?id=1226592
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231180
* https://bugzilla.suse.com/show_bug.cgi?id=1231181
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231646
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231923
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231959
* https://bugzilla.suse.com/show_bug.cgi?id=1231978
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232027
* https://bugzilla.suse.com/show_bug.cgi?id=1232028
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232293
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233134
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233150
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233214
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233528
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
1
0
13 Dec '24
# Recommended update for hawk2
Announcement ID: SUSE-RU-2024:4309-1
Release Date: 2024-12-13T08:22:09Z
Rating: moderate
References:
* bsc#1232760
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP2
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for hawk2 fixes the following issues:
* Fixed executable external commands (bsc#1232760)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4309=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4309=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1232760
1
0
13 Dec '24
# Recommended update for go1.23-openssl
Announcement ID: SUSE-RU-2024:4307-1
Release Date: 2024-12-13T07:45:54Z
Rating: moderate
References:
* bsc#1233306
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go1.23-openssl fixes the following issues:
* Write three digit version to file VERSION which sets go env GOVERSION. Fixes
bsc#1233306.
* Go toolchain file VERSION sets the immutable value for go env GOVERSION
* go1.x-openssl toolchains have used a bespoke fourth digit to represent the
upstream patch set release number, e.g. go1.22.9-1-openssl-fips. This digit
has not been needed.
* Some Go applications including helm break when this fourth digit is present
in VERSION, with error: go.mod requires go >= 1.22.0 (running go 1.22;
GOTOOLCHAIN=local)
* Keep the fourth digit in the packaging for now, it will be dropped in the
next toolchain version update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4307=1 openSUSE-SLE-15.6-2024-4307=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4307=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.23-openssl-debuginfo-1.23.2.2-150600.13.6.1
* go1.23-openssl-1.23.2.2-150600.13.6.1
* go1.23-openssl-doc-1.23.2.2-150600.13.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-race-1.23.2.2-150600.13.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-race-1.23.2.2-150600.13.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150600.13.6.1
* go1.23-openssl-1.23.2.2-150600.13.6.1
* go1.23-openssl-doc-1.23.2.2-150600.13.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233306
1
0
13 Dec '24
# Recommended update for go1.22-openssl
Announcement ID: SUSE-RU-2024:4308-1
Release Date: 2024-12-13T07:46:02Z
Rating: moderate
References:
* bsc#1233306
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go1.22-openssl fixes the following issues:
* Write three digit version to file VERSION which sets go env GOVERSION. Fixes
bsc#1233306.
* Go toolchain file VERSION sets the immutable value for go env GOVERSION
* go1.x-openssl toolchains have used a bespoke fourth digit to represent the
upstream patch set release number, e.g. go1.22.9-1-openssl-fips. This digit
has not been needed.
* Some Go applications including helm break when this fourth digit is present
in VERSION, with error: go.mod requires go >= 1.22.0 (running go 1.22;
GOTOOLCHAIN=local)
* Keep the fourth digit in the packaging for now, it will be dropped in the
next toolchain version update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4308=1 SUSE-2024-4308=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4308=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.22-openssl-1.22.7.1-150600.13.5.1
* go1.22-openssl-doc-1.22.7.1-150600.13.5.1
* go1.22-openssl-debuginfo-1.22.7.1-150600.13.5.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-race-1.22.7.1-150600.13.5.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-1.22.7.1-150600.13.5.1
* go1.22-openssl-doc-1.22.7.1-150600.13.5.1
* go1.22-openssl-debuginfo-1.22.7.1-150600.13.5.1
* go1.22-openssl-race-1.22.7.1-150600.13.5.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233306
1
0
12 Dec '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:4303-1
Release Date: 2024-12-12T12:50:24Z
Rating: moderate
References:
* bsc#1231208
* bsc#1231230
* bsc#1231499
* bsc#1231698
* bsc#1232522
Cross-References:
* CVE-2024-9341
* CVE-2024-9407
* CVE-2024-9675
* CVE-2024-9676
CVSS scores:
* CVE-2024-9341 ( SUSE ): 5.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
* CVE-2024-9675 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
* CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-9675 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-9676 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for buildah fixes the following issues:
Security issues fixed:
* CVE-2024-9675: cache arbitrary directory mount (bsc#1231499)
* CVE-2024-9407: Improper Input Validation in bind-propagation Option of
Dockerfile RUN --mount Instruction (bsc#1231208)
* CVE-2024-9676: symlink traversal vulnerability in the containers/storage
library can cause denial of service (bsc#1231698)
* CVE-2024-9341: FIPS Crypto-Policy Directory Mounting Issue in
containers/common Go Library (bsc#1231230)
Non-security issue fixed:
* default to slirp4netns on SLE instead of pasta (bsc#1232522)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4303=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4303=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4303=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4303=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4303=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* buildah-1.35.4-150300.8.28.3
## References:
* https://www.suse.com/security/cve/CVE-2024-9341.html
* https://www.suse.com/security/cve/CVE-2024-9407.html
* https://www.suse.com/security/cve/CVE-2024-9675.html
* https://www.suse.com/security/cve/CVE-2024-9676.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231208
* https://bugzilla.suse.com/show_bug.cgi?id=1231230
* https://bugzilla.suse.com/show_bug.cgi?id=1231499
* https://bugzilla.suse.com/show_bug.cgi?id=1231698
* https://bugzilla.suse.com/show_bug.cgi?id=1232522
1
0
# Security update for qemu
Announcement ID: SUSE-SU-2024:4304-1
Release Date: 2024-12-12T13:22:09Z
Rating: important
References:
* bsc#1229007
* bsc#1230834
* bsc#1230915
Cross-References:
* CVE-2024-7409
* CVE-2024-8354
* CVE-2024-8612
CVSS scores:
* CVE-2024-7409 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8612 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-8612 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU
NBD Server during socket closure (bsc#1229007)
* CVE-2024-8354: Fixed assertion failure in usb_ep_get() in usb (bsc#1230834)
* CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4304=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4304=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4304=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4304=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4304=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4304=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4304=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4304=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4304=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-block-gluster-6.2.0-150400.37.37.3
* qemu-audio-jack-6.2.0-150400.37.37.3
* qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ivshmem-tools-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-jack-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-arm-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-accel-qtest-6.2.0-150400.37.37.3
* qemu-block-gluster-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-linux-user-debuginfo-6.2.0-150400.37.37.2
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-block-nfs-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-block-nfs-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* qemu-extra-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-smartcard-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-block-dmg-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* qemu-linux-user-debugsource-6.2.0-150400.37.37.2
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-oss-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-vhost-user-gpu-6.2.0-150400.37.37.3
* qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-dmg-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-oss-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-linux-user-6.2.0-150400.37.37.2
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-extra-6.2.0-150400.37.37.3
* qemu-accel-qtest-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* openSUSE Leap 15.4 (s390x x86_64 i586)
* qemu-kvm-6.2.0-150400.37.37.3
* openSUSE Leap 15.4 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-microvm-6.2.0-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Manager Proxy 4.3 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Proxy 4.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Retail Branch Server 4.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le x86_64)
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
## References:
* https://www.suse.com/security/cve/CVE-2024-7409.html
* https://www.suse.com/security/cve/CVE-2024-8354.html
* https://www.suse.com/security/cve/CVE-2024-8612.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229007
* https://bugzilla.suse.com/show_bug.cgi?id=1230834
* https://bugzilla.suse.com/show_bug.cgi?id=1230915
1
0
SUSE-RU-2024:4305-1: moderate: Recommended update for sles-ltss-release
by OPENSUSE-UPDATES 12 Dec '24
by OPENSUSE-UPDATES 12 Dec '24
12 Dec '24
# Recommended update for sles-ltss-release
Announcement ID: SUSE-RU-2024:4305-1
Release Date: 2024-12-12T14:00:36Z
Rating: moderate
References:
* jsc#MSC-887
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
An update that contains one feature can now be installed.
## Description:
This update for sles-ltss-release fixes the following issue:
* Set product lifecycle.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4305=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2024-4305=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* sles-ltss-release-15.5-150500.16.4.4
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* sles-ltss-release-15.5-150500.16.4.4
## References:
* https://jira.suse.com/browse/MSC-887
1
0
12 Dec '24
# Security update for java-1_8_0-ibm
Announcement ID: SUSE-SU-2024:4306-1
Release Date: 2024-12-12T14:31:37Z
Rating: moderate
References:
* bsc#1225470
* bsc#1231702
* bsc#1231711
* bsc#1231716
* bsc#1231719
* bsc#1232064
Cross-References:
* CVE-2024-21208
* CVE-2024-21210
* CVE-2024-21217
* CVE-2024-21235
* CVE-2024-3933
CVSS scores:
* CVE-2024-21208 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21210 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21217 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21235 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-3933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
Affected Products:
* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves five vulnerabilities and has one security fix can now be
installed.
## Description:
This update for java-1_8_0-ibm fixes the following issues:
Updated to Java 8.0 Service Refresh 8 Fix Pack 35 with Oracle October 15 2024
CPU (bsc#1232064): \- CVE-2024-21208: Fixed partial DoS in component Networking
(bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed unauthorized update, insert
or delete access to some of Oracle Java SE accessible data in component Hotspot
(bsc#1231711,JDK-8328544) \- CVE-2024-21217: Fixed partial DoS in component
Serialization (bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized
read/write access to data in component Hotspot (bsc#1231719,JDK-8332644)
Other issues fixed in past releases: \- CVE-2024-3933: Fixed evaluate constant
byteLenNode of arrayCopyChild (bsc#1225470)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4306=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4306=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4306=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4306=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4306=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4306=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4306=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4306=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4306=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4306=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4306=1
## Package List:
* Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Enterprise Storage 7.1 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Enterprise Storage 7.1 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (x86_64)
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21208.html
* https://www.suse.com/security/cve/CVE-2024-21210.html
* https://www.suse.com/security/cve/CVE-2024-21217.html
* https://www.suse.com/security/cve/CVE-2024-21235.html
* https://www.suse.com/security/cve/CVE-2024-3933.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225470
* https://bugzilla.suse.com/show_bug.cgi?id=1231702
* https://bugzilla.suse.com/show_bug.cgi?id=1231711
* https://bugzilla.suse.com/show_bug.cgi?id=1231716
* https://bugzilla.suse.com/show_bug.cgi?id=1231719
* https://bugzilla.suse.com/show_bug.cgi?id=1232064
1
0
openSUSE-SU-2024:0405-1: important: Security update for chromium
by opensuse-security@opensuse.org 12 Dec '24
by opensuse-security@opensuse.org 12 Dec '24
12 Dec '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0405-1
Rating: important
References: #1234118
Cross-References: CVE-2024-12053
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for chromium fixes the following issues:
Chromium 131.0.6778.108 (stable released 2024-12-04) (boo#1234118)
- CVE-2024-12053: Type Confusion in V8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-405=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-131.0.6778.108-bp156.2.59.1
chromium-131.0.6778.108-bp156.2.59.1
References:
https://www.suse.com/security/cve/CVE-2024-12053.html
https://bugzilla.suse.com/1234118
1
0
SUSE-SU-2024:4299-1: moderate: Security update for govulncheck-vulndb
by OPENSUSE-UPDATES 12 Dec '24
by OPENSUSE-UPDATES 12 Dec '24
12 Dec '24
# Security update for govulncheck-vulndb
Announcement ID: SUSE-SU-2024:4299-1
Release Date: 2024-12-12T08:10:04Z
Rating: moderate
References:
* jsc#PED-11136
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that contains one feature can now be installed.
## Description:
This update for govulncheck-vulndb fixes the following issues:
* Update to version 0.0.20241209T183251 2024-12-09T18:32:51Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3284
* GO-2024-3286
* GO-2024-3287
* GO-2024-3288
* GO-2024-3289
* GO-2024-3290
* GO-2024-3291
* GO-2024-3292
* GO-2024-3294
* GO-2024-3296
* GO-2024-3299
* GO-2024-3300
* GO-2024-3302
* GO-2024-3303
* GO-2024-3304
* GO-2024-3305
* GO-2024-3307
* GO-2024-3308
* GO-2024-3310
* GO-2024-3311
* GO-2024-3312
* GO-2024-3313
* Update to version 0.0.20241121T195252 2024-11-21T19:52:52Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3279
* GO-2024-3280
* GO-2024-3281
* GO-2024-3282
* GO-2024-3283
* Update to version 0.0.20241120T172248 2024-11-20T17:22:48Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3140
* GO-2024-3259
* GO-2024-3265
* Update to version 0.0.20241119T173509 2024-11-19T17:35:09Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2022-0646
* GO-2024-3267
* GO-2024-3269
* GO-2024-3271
* GO-2024-3272
* GO-2024-3273
* GO-2024-3274
* GO-2024-3275
* GO-2024-3277
* GO-2024-3278
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4299=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4299=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4299=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4299=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* SUSE Package Hub 15 15-SP5 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* SUSE Package Hub 15 15-SP6 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
## References:
* https://jira.suse.com/browse/PED-11136
1
0
12 Dec '24
# Security update for nodejs20
Announcement ID: SUSE-SU-2024:4300-1
Release Date: 2024-12-12T08:10:17Z
Rating: moderate
References:
* bsc#1233856
Cross-References:
* CVE-2024-21538
CVSS scores:
* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for nodejs20 fixes the following issues:
* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)
Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in
Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New
option for vm.createContext() to create a context with a freezable globalThis *
buffer: optimize createFromString \- Changes in 20.17.0: * module: support
require()ing synchronous ESM graphs * path: add matchesGlob method * stream:
expose DuplexPair API \- Changes in 20.16.0: * process: add
process.getBuiltinModule(id) * inspector: fix disable async hooks on
Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4300=1 SUSE-2024-4300=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4300=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* npm20-20.18.1-150500.11.15.1
* nodejs20-debugsource-20.18.1-150500.11.15.1
* nodejs20-20.18.1-150500.11.15.1
* nodejs20-debuginfo-20.18.1-150500.11.15.1
* nodejs20-devel-20.18.1-150500.11.15.1
* corepack20-20.18.1-150500.11.15.1
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.18.1-150500.11.15.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* npm20-20.18.1-150500.11.15.1
* nodejs20-debugsource-20.18.1-150500.11.15.1
* nodejs20-20.18.1-150500.11.15.1
* nodejs20-debuginfo-20.18.1-150500.11.15.1
* nodejs20-devel-20.18.1-150500.11.15.1
* Web and Scripting Module 15-SP5 (noarch)
* nodejs20-docs-20.18.1-150500.11.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856
1
0
12 Dec '24
# Security update for nodejs18
Announcement ID: SUSE-SU-2024:4301-1
Release Date: 2024-12-12T08:10:45Z
Rating: moderate
References:
* bsc#1233856
Cross-References:
* CVE-2024-21538
CVSS scores:
* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for nodejs18 fixes the following issues:
* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)
Other fixes: \- Update to 18.20.5 * esm: mark import attributes and JSON module
as stable * deps: \+ upgrade npm to 10.8.2 \+ update simdutf to 5.6.0 \+ update
brotli to 1.1.0 \+ update ada to 2.8.0 \+ update acorn to 8.13.0 \+ update
acorn-walk to 8.3.4 \+ update c-ares to 1.29.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4301=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4301=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4301=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* corepack18-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* nodejs18-debugsource-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* openSUSE Leap 15.4 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* corepack18-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* nodejs18-debugsource-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* openSUSE Leap 15.5 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nodejs18-debugsource-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* Web and Scripting Module 15-SP5 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856
1
0
# Security update for socat
Announcement ID: SUSE-SU-2024:4302-1
Release Date: 2024-12-12T08:51:18Z
Rating: moderate
References:
* bsc#1225462
Cross-References:
* CVE-2024-54661
CVSS scores:
* CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for socat fixes the following issues:
* CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp
directory (bsc#1225462)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4302=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4302=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4302=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4302=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4302=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* socat-extra-1.8.0.0-150400.14.6.1
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-54661.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225462
1
0
# Security update for socat
Announcement ID: SUSE-SU-2024:4295-1
Release Date: 2024-12-11T14:41:01Z
Rating: moderate
References:
* bsc#1225462
Cross-References:
* CVE-2024-54661
CVSS scores:
* CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for socat fixes the following issues:
* CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp
directory in socat readline.sh (bsc#1225462)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4295=1 openSUSE-SLE-15.6-2024-4295=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4295=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* socat-extra-1.8.0.0-150600.20.6.1
* socat-1.8.0.0-150600.20.6.1
* socat-debugsource-1.8.0.0-150600.20.6.1
* socat-debuginfo-1.8.0.0-150600.20.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150600.20.6.1
* socat-debugsource-1.8.0.0-150600.20.6.1
* socat-debuginfo-1.8.0.0-150600.20.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-54661.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225462
1
0
openSUSE-RU-2024:0403-1: moderate: Recommended update for kanidm
by maintenance@opensuse.org 11 Dec '24
by maintenance@opensuse.org 11 Dec '24
11 Dec '24
openSUSE Recommended Update: Recommended update for kanidm
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0403-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for kanidm fixes the following issues:
Update to version 1.4.4~git0.c3dbf83:
- Check DNS on replication loop start not at task start (#3243)
- Work around systemd race condition (#3262)
- Clear invalid tokens from unix resolver (#3256)
- Allow OAuth2 loopback redirects if the path matches (#3252)
- Correctly display domain name on login (#3254)
- Display account_id during success/deny paths in unixd (#3253)
- s/idm_people_self_write_mail/idm_people_self_mail_write/g (#3250)
- handle missing map_group setting in config (#3242)
- owncloud: Add SameSite=Lax config for cross-domain auth (#3245)
- Yaleman/issue3229 (#3239)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-403=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
kanidm-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-clients-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-docs-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-server-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-unixd-clients-1.4.4~git0.c3dbf83-bp156.13.1
References:
1
0
11 Dec '24
# Security update for python-Django
Announcement ID: SUSE-SU-2024:4285-1
Release Date: 2024-12-11T08:30:27Z
Rating: critical
References:
* bsc#1234231
* bsc#1234232
Cross-References:
* CVE-2024-53907
* CVE-2024-53908
CVSS scores:
* CVE-2024-53907 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53908 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-53908 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for python-Django fixes the following issues:
* CVE-2024-53907: Fixed denial-of-service in django.utils.html.strip_tags()
(bsc#1234232)
* CVE-2024-53908: Fixed SQL injection in HasKey(lhs, rhs) on Oracle
(bsc#1234231)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4285=1 openSUSE-SLE-15.6-2024-4285=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4285=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.12.1
* SUSE Package Hub 15 15-SP6 (noarch)
* python311-Django-4.2.11-150600.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-53907.html
* https://www.suse.com/security/cve/CVE-2024-53908.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234231
* https://bugzilla.suse.com/show_bug.cgi?id=1234232
1
0
11 Dec '24
# Security update for nodejs20
Announcement ID: SUSE-SU-2024:4286-1
Release Date: 2024-12-11T08:30:46Z
Rating: moderate
References:
* bsc#1233856
Cross-References:
* CVE-2024-21538
CVSS scores:
* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* Web and Scripting Module 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for nodejs20 fixes the following issues:
* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)
Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in
Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New
option for vm.createContext() to create a context with a freezable globalThis *
buffer: optimize createFromString \- Changes in 20.17.0: * module: support
require()ing synchronous ESM graphs * path: add matchesGlob method * stream:
expose DuplexPair API \- Changes in 20.16.0: * process: add
process.getBuiltinModule(id) * inspector: fix disable async hooks on
Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4286=1 openSUSE-SLE-15.6-2024-4286=1
* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4286=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* nodejs20-debugsource-20.18.1-150600.3.6.1
* nodejs20-devel-20.18.1-150600.3.6.1
* nodejs20-20.18.1-150600.3.6.1
* nodejs20-debuginfo-20.18.1-150600.3.6.1
* corepack20-20.18.1-150600.3.6.1
* npm20-20.18.1-150600.3.6.1
* openSUSE Leap 15.6 (noarch)
* nodejs20-docs-20.18.1-150600.3.6.1
* Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* nodejs20-debugsource-20.18.1-150600.3.6.1
* nodejs20-devel-20.18.1-150600.3.6.1
* nodejs20-20.18.1-150600.3.6.1
* nodejs20-debuginfo-20.18.1-150600.3.6.1
* npm20-20.18.1-150600.3.6.1
* Web and Scripting Module 15-SP6 (noarch)
* nodejs20-docs-20.18.1-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:4288-1
Release Date: 2024-12-11T08:31:36Z
Rating: moderate
References:
* bsc#1234068
Cross-References:
* CVE-2024-11053
CVSS scores:
* CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-11053: Fixed password leak used for the first host to the followed-
to host under certain circumstances (bsc#1234068)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4288=1 openSUSE-SLE-15.6-2024-4288=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4288=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* curl-8.6.0-150600.4.15.1
* libcurl-devel-8.6.0-150600.4.15.1
* libcurl4-debuginfo-8.6.0-150600.4.15.1
* libcurl4-8.6.0-150600.4.15.1
* curl-debuginfo-8.6.0-150600.4.15.1
* curl-debugsource-8.6.0-150600.4.15.1
* openSUSE Leap 15.6 (x86_64)
* libcurl4-32bit-8.6.0-150600.4.15.1
* libcurl-devel-32bit-8.6.0-150600.4.15.1
* libcurl4-32bit-debuginfo-8.6.0-150600.4.15.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcurl4-64bit-debuginfo-8.6.0-150600.4.15.1
* libcurl4-64bit-8.6.0-150600.4.15.1
* libcurl-devel-64bit-8.6.0-150600.4.15.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* curl-8.6.0-150600.4.15.1
* libcurl-devel-8.6.0-150600.4.15.1
* libcurl4-debuginfo-8.6.0-150600.4.15.1
* libcurl4-8.6.0-150600.4.15.1
* curl-debuginfo-8.6.0-150600.4.15.1
* curl-debugsource-8.6.0-150600.4.15.1
* Basesystem Module 15-SP6 (x86_64)
* libcurl4-32bit-8.6.0-150600.4.15.1
* libcurl4-32bit-debuginfo-8.6.0-150600.4.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-11053.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234068
1
0
SUSE-RU-2024:4289-1: moderate: Recommended update for python-rpm-macros
by OPENSUSE-UPDATES 11 Dec '24
by OPENSUSE-UPDATES 11 Dec '24
11 Dec '24
# Recommended update for python-rpm-macros
Announcement ID: SUSE-RU-2024:4289-1
Release Date: 2024-12-11T09:47:57Z
Rating: moderate
References:
* bsc#1233151
* bsc#1233774
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for python-rpm-macros fixes the following issue:
* Update to version 20241120 (bsc#1233151)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4289=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4289=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4289=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4289=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4289=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4289=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4289=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4289=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4289=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4289=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4289=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4289=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4289=1
## Package List:
* Basesystem Module 15-SP5 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* Basesystem Module 15-SP6 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Manager Proxy 4.3 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Manager Server 4.3 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* openSUSE Leap 15.4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* openSUSE Leap 15.5 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* openSUSE Leap 15.6 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233151
* https://bugzilla.suse.com/show_bug.cgi?id=1233774
1
0
11 Dec '24
# Security update for libsoup2
Announcement ID: SUSE-SU-2024:4290-1
Release Date: 2024-12-11T11:10:48Z
Rating: important
References:
* bsc#1233285
* bsc#1233287
* bsc#1233292
Cross-References:
* CVE-2024-52530
* CVE-2024-52531
* CVE-2024-52532
CVSS scores:
* CVE-2024-52530 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-52532 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup2 fixes the following issues:
* CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from
the ends of header names (bsc#1233285)
* CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in
soup_header_parse_param_list_strict (bsc#1233292)
* CVE-2024-52532: Fixed infinite loop while reading websocket data
(bsc#1233287)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4290=1 openSUSE-SLE-15.6-2024-4290=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4290=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.3.1
* libsoup-2_4-1-2.74.3-150600.4.3.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.3.1
* libsoup2-debugsource-2.74.3-150600.4.3.1
* libsoup2-devel-2.74.3-150600.4.3.1
* openSUSE Leap 15.6 (x86_64)
* libsoup2-devel-32bit-2.74.3-150600.4.3.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.3.1
* libsoup-2_4-1-32bit-2.74.3-150600.4.3.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-2.74.3-150600.4.3.1
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.3.1
* libsoup2-devel-64bit-2.74.3-150600.4.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.3.1
* libsoup-2_4-1-2.74.3-150600.4.3.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.3.1
* libsoup2-debugsource-2.74.3-150600.4.3.1
* libsoup2-devel-2.74.3-150600.4.3.1
* Basesystem Module 15-SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52530.html
* https://www.suse.com/security/cve/CVE-2024-52531.html
* https://www.suse.com/security/cve/CVE-2024-52532.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233285
* https://bugzilla.suse.com/show_bug.cgi?id=1233287
* https://bugzilla.suse.com/show_bug.cgi?id=1233292
1
0
11 Dec '24
# Security update for python312
Announcement ID: SUSE-SU-2024:4291-1
Release Date: 2024-12-11T11:24:51Z
Rating: important
References:
* bsc#1231795
* bsc#1234290
Cross-References:
* CVE-2024-12254
CVSS scores:
* CVE-2024-12254 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-12254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-12254 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for python312 fixes the following issues:
* CVE-2024-12254: Fixed unbounded memory buffering in
SelectorSocketTransport.writelines() (bsc#1234290)
Other fixes: \- Updated to version 3.12.8 \- Remove -IVendor/ from python-config
(bsc#1231795)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4291=1 openSUSE-SLE-15.6-2024-4291=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4291=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python312-doc-devhelp-3.12.8-150600.3.12.1
* python312-tools-3.12.8-150600.3.12.1
* libpython3_12-1_0-debuginfo-3.12.8-150600.3.12.1
* python312-dbm-debuginfo-3.12.8-150600.3.12.1
* python312-tk-3.12.8-150600.3.12.1
* python312-idle-3.12.8-150600.3.12.1
* python312-base-3.12.8-150600.3.12.1
* python312-curses-3.12.8-150600.3.12.1
* python312-testsuite-debuginfo-3.12.8-150600.3.12.1
* python312-debugsource-3.12.8-150600.3.12.1
* libpython3_12-1_0-3.12.8-150600.3.12.1
* python312-tk-debuginfo-3.12.8-150600.3.12.1
* python312-testsuite-3.12.8-150600.3.12.1
* python312-3.12.8-150600.3.12.1
* python312-curses-debuginfo-3.12.8-150600.3.12.1
* python312-doc-3.12.8-150600.3.12.1
* python312-base-debuginfo-3.12.8-150600.3.12.1
* python312-dbm-3.12.8-150600.3.12.1
* python312-debuginfo-3.12.8-150600.3.12.1
* python312-devel-3.12.8-150600.3.12.1
* python312-core-debugsource-3.12.8-150600.3.12.1
* openSUSE Leap 15.6 (x86_64)
* python312-32bit-3.12.8-150600.3.12.1
* libpython3_12-1_0-32bit-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-32bit-3.12.8-150600.3.12.1
* python312-base-32bit-debuginfo-3.12.8-150600.3.12.1
* python312-32bit-debuginfo-3.12.8-150600.3.12.1
* python312-base-32bit-3.12.8-150600.3.12.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* python312-64bit-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-64bit-debuginfo-3.12.8-150600.3.12.1
* python312-64bit-3.12.8-150600.3.12.1
* python312-base-64bit-3.12.8-150600.3.12.1
* python312-base-64bit-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-64bit-3.12.8-150600.3.12.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python312-dbm-debuginfo-3.12.8-150600.3.12.1
* python312-tk-debuginfo-3.12.8-150600.3.12.1
* python312-3.12.8-150600.3.12.1
* python312-curses-debuginfo-3.12.8-150600.3.12.1
* python312-debugsource-3.12.8-150600.3.12.1
* python312-tools-3.12.8-150600.3.12.1
* python312-tk-3.12.8-150600.3.12.1
* python312-devel-3.12.8-150600.3.12.1
* python312-curses-3.12.8-150600.3.12.1
* python312-base-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-3.12.8-150600.3.12.1
* python312-idle-3.12.8-150600.3.12.1
* python312-dbm-3.12.8-150600.3.12.1
* python312-debuginfo-3.12.8-150600.3.12.1
* python312-core-debugsource-3.12.8-150600.3.12.1
* python312-base-3.12.8-150600.3.12.1
* libpython3_12-1_0-debuginfo-3.12.8-150600.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-12254.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231795
* https://bugzilla.suse.com/show_bug.cgi?id=1234290
1
0
11 Dec '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:4292-1
Release Date: 2024-12-11T11:41:37Z
Rating: important
References:
* bsc#1233631
* bsc#1233632
Cross-References:
* CVE-2024-44308
* CVE-2024-44309
CVSS scores:
* CVE-2024-44308 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-44309 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-44309 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-44309 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
* CVE-2024-44308: Fixed processing maliciously crafted web content that may
lead to arbitrary code execution (bsc#1233631)
* CVE-2024-44309: Fixed data isolation bypass vulnerability (bsc#1233632)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4292=1 openSUSE-SLE-15.6-2024-4292=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4292=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4292=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4292=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* WebKitGTK-6.0-lang-2.46.3-150600.12.21.1
* WebKitGTK-4.0-lang-2.46.3-150600.12.21.1
* WebKitGTK-4.1-lang-2.46.3-150600.12.21.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* webkit2gtk3-soup2-devel-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150600.12.21.1
* webkit2gtk4-minibrowser-2.46.3-150600.12.21.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk-4_0-injected-bundles-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_0-2.46.3-150600.12.21.1
* webkit-jsc-4.1-2.46.3-150600.12.21.1
* webkit2gtk4-devel-2.46.3-150600.12.21.1
* webkit-jsc-4-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-minibrowser-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* webkit-jsc-4.1-debuginfo-2.46.3-150600.12.21.1
* webkit-jsc-6.0-2.46.3-150600.12.21.1
* webkit-jsc-4-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-debugsource-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-6_0-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-2.46.3-150600.12.21.1
* webkit2gtk3-minibrowser-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150600.12.21.1
* webkit-jsc-6.0-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_1-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-2.46.3-150600.12.21.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk3-devel-2.46.3-150600.12.21.1
* webkit2gtk4-debugsource-2.46.3-150600.12.21.1
* webkit2gtk4-minibrowser-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit-6_0-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-2.46.3-150600.12.21.1
* webkit2gtk3-minibrowser-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_0-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_1-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-2.46.3-150600.12.21.1
* webkit2gtk3-debugsource-2.46.3-150600.12.21.1
* openSUSE Leap 15.6 (x86_64)
* libwebkit2gtk-4_0-37-32bit-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-32bit-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-32bit-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-32bit-2.46.3-150600.12.21.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-64bit-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-64bit-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-64bit-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-64bit-2.46.3-150600.12.21.1
* Basesystem Module 15-SP6 (noarch)
* WebKitGTK-4.0-lang-2.46.3-150600.12.21.1
* WebKitGTK-6.0-lang-2.46.3-150600.12.21.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* webkit2gtk-4_0-injected-bundles-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-devel-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_0-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_0-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-debugsource-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-2.46.3-150600.12.21.1
* webkit2gtk4-debugsource-2.46.3-150600.12.21.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* Desktop Applications Module 15-SP6 (noarch)
* WebKitGTK-4.1-lang-2.46.3-150600.12.21.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* webkit2gtk3-devel-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_1-2.46.3-150600.12.21.1
* webkit2gtk3-debugsource-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_1-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-WebKit-6_0-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-6_0-2.46.3-150600.12.21.1
* webkit2gtk4-devel-2.46.3-150600.12.21.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150600.12.21.1
* webkit2gtk4-debugsource-2.46.3-150600.12.21.1
## References:
* https://www.suse.com/security/cve/CVE-2024-44308.html
* https://www.suse.com/security/cve/CVE-2024-44309.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233631
* https://bugzilla.suse.com/show_bug.cgi?id=1233632
1
0
10 Dec '24
# Recommended update for guava
Announcement ID: SUSE-RU-2024:4280-1
Release Date: 2024-12-10T16:00:36Z
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module
An update that can now be installed.
## Description:
This update for guava, google-errorprone, checker-qual, j2objc-annotations fixes
the following issues:
guava was updated from version 33.1.0 to 33.2.1:
* Added some artifact aliases
* Changed how internet addresses are handled to preserve more information.
This might require code updates if you were relying on the old behavior
(consult the package changelog for more details).
* Fixed a compilation issue under Gradle.
* Fixed a potential crash when building ImmutableMap.
* Added new constants for HTTP headers (Ad-Auction-Allowed, Permissions-
Policy-Report-Only, and Sec-GPC).
google-errorprone, checker-qual, j2objc-annotations:
* google-errorprone-annotations, checker-qual, j2objc-annotations were added
to the Development Tools Module as they are required by this guava update
* google-errorprone-annotations package was updated from version 2.11.0 to
2.26.1 on SUSE Linux Enterprise 15 LTSS products, as it's required by this
guava update:
* Added new checks for common Java coding errors
* Improvement of existing checks
* Performance and infrastructure improvements
* Various bugs were fixed
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4280=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4280=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4280=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4280=1
* SUSE Manager Server 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4280=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4280=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4280=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4280=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4280=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4280=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4280=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4280=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4280=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4280=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4280=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4280=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4280=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* j2objc-annotations-javadoc-2.2-150200.5.5.2
* j2objc-annotations-2.2-150200.5.5.2
* google-errorprone-annotation-2.26.1-150200.5.8.1
* google-errorprone-type_annotations-2.26.1-150200.5.8.1
* guava-33.2.1-150200.3.13.2
* google-errorprone-docgen_processor-2.26.1-150200.5.8.1
* google-errorprone-parent-2.26.1-150200.5.8.1
* checker-qual-javadoc-3.22.0-150200.5.7.2
* checker-qual-3.22.0-150200.5.7.2
* guava-javadoc-33.2.1-150200.3.13.2
* google-errorprone-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-2.26.1-150200.5.8.1
* guava-testlib-33.2.1-150200.3.13.2
* openSUSE Leap 15.6 (noarch)
* j2objc-annotations-javadoc-2.2-150200.5.5.2
* j2objc-annotations-2.2-150200.5.5.2
* google-errorprone-annotation-2.26.1-150200.5.8.1
* google-errorprone-type_annotations-2.26.1-150200.5.8.1
* guava-33.2.1-150200.3.13.2
* google-errorprone-docgen_processor-2.26.1-150200.5.8.1
* google-errorprone-parent-2.26.1-150200.5.8.1
* checker-qual-javadoc-3.22.0-150200.5.7.2
* checker-qual-3.22.0-150200.5.7.2
* guava-javadoc-33.2.1-150200.3.13.2
* google-errorprone-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-2.26.1-150200.5.8.1
* guava-testlib-33.2.1-150200.3.13.2
* Development Tools Module 15-SP5 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* Development Tools Module 15-SP6 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Manager Server 4.3 Module (noarch)
* google-errorprone-annotations-2.26.1-150200.5.8.1
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Enterprise Storage 7.1 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
1
0
# Optional update for fuse3
Announcement ID: SUSE-OU-2024:4281-1
Release Date: 2024-12-10T16:02:11Z
Rating: moderate
References:
* jsc#MSC-894
* jsc#PED-10732
* jsc#PED-11018
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains three features can now be installed.
## Description:
This update for fuse3 provides missing -devel packages for SLE 15 SP4.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4281=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4281=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4281=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4281=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4281=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4281=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4281=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4281=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4281=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4281=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4281=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4281=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4281=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4281=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4281=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4281=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4281=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4281=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4281=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* fuse3-doc-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.6 (x86_64)
* libfuse3-3-32bit-3.10.5-150400.3.2.1
* libfuse3-3-32bit-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* fuse3-doc-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.4 (x86_64)
* libfuse3-3-32bit-3.10.5-150400.3.2.1
* libfuse3-3-32bit-debuginfo-3.10.5-150400.3.2.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libfuse3-3-64bit-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-64bit-3.10.5-150400.3.2.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* fuse3-doc-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.5 (x86_64)
* libfuse3-3-32bit-3.10.5-150400.3.2.1
* libfuse3-3-32bit-debuginfo-3.10.5-150400.3.2.1
## References:
* https://jira.suse.com/browse/MSC-894
* https://jira.suse.com/browse/PED-10732
* https://jira.suse.com/browse/PED-11018
1
0
SUSE-RU-2024:4279-1: moderate: Recommended update for nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 10 Dec '24
by OPENSUSE-UPDATES 10 Dec '24
10 Dec '24
# Recommended update for nvidia-open-driver-G06-signed
Announcement ID: SUSE-RU-2024:4279-1
Release Date: 2024-12-10T15:16:37Z
Rating: moderate
References:
* bsc#1229716
* bsc#1230368
* bsc#1230779
* bsc#1232057
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has four fixes can now be installed.
## Description:
This update for nvidia-open-driver-G06-signed fixes the following issues:
Update to 550.127.05 (boo#1232057)
* Fixed a bug which could cause applications using GBM to crash when running
with nvidia-drm.modeset=0.
* cuda-flavor
provide also nvidia-open-driver-G06-kmp-$flavor = %version to workaround broken
cuda-drivers
* For CUDA update version to 560.35.03
* cuda-flavor
* provide nvidia-open-driver-G06-kmp = %version to workaround broken cuda-
drivers
* nv-prefer-signed-open-driver
* added comments for requirements
* latest change hardcoded to 555.42.06; we no longer need this for 560
* nv-prefer-signed-open-driver:
* added specicic versions of cuda-drivers/cuda-drivers-xxx as preconditions
for requiring specific version of nvidia-compute-G06
* nv-prefer-signed-open-driver:
* no longer require a specific version of nvidia-open-driver-G06-signed-cuda-
kmp, so it can select the correct open driver KMP matching the cuda-runtime
version
* cuda-flavor:
* added nvidia-compute-G06 = %version to preconditions for requiring kernel-
firmware-nvidia-gspx-G06, since nvidia-compute-utils-G06 does not have a
version-specific requires on nvidia-compute-G06
* cuda-flavor:
* require kernel-firmware-nvidia-gspx-G06 instead of kernel-firmware-nvidia-
gspx-G06-cuda (which provides also kernel-firmware-nvidia-gspx-G06)
* trigger removal of driver modules also on kernel-firmware-nvidia-gspx-G06
* no longer hard-require kernel firmware package, but install it automatically
once nvidia-compute-utils-G06 gets installed
* trigger removal of driver modules with non-existing or wrong firmware when
(new) firmware gets installed
* Update to 550.120 (bsc#1230779)
* Fixed a bug that could cause kernel crashes upon attempting KMS operations
through DRM when nvidia_drm was loaded with modeset=0.
* CUDA build: removed entries from pci_ids-555.42.06 since this is doing more
harm than benefit (bsc#1230368)
* For CUDA (preamble file):
* added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version
which is needed for 'zypper install <package> = <version>'
* added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor =
%version useful for containers
* reverted CUDA update version to 560.x.y due to changes in CUDA repository
with CUDA 12.6/560.x.y drivers
* For CUDA update version to 560.35.03
* Update to 550.107.02 (bsc#1229716)
* For CUDA update version to 560.28.03
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4279=1 SUSE-2024-4279=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4279=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4279=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4279=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4279=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150500.3.61.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150500.3.61.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* openSUSE Leap Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150500.3.61.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150500.3.61.1
* Basesystem Module 15-SP5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* Public Cloud Module 15-SP5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150500.3.61.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229716
* https://bugzilla.suse.com/show_bug.cgi?id=1230368
* https://bugzilla.suse.com/show_bug.cgi?id=1230779
* https://bugzilla.suse.com/show_bug.cgi?id=1232057
1
0
10 Dec '24
# Feature update for python-pyvmomi
Announcement ID: SUSE-FU-2024:4271-1
Release Date: 2024-12-10T08:25:21Z
Rating: moderate
References:
* jsc#PED-11464
* jsc#PED-11697
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains two features can now be installed.
## Description:
This update for python-pyvmomi fixes the following issues:
* New implementation of package `python311-pyvmomi` to the Python 3 Module
(jsc#PED-11697, jsc#PED-11464)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4271=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4271=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-pyvmomi-8.0.3.0.1-150600.12.3.2
* Python 3 Module 15-SP6 (noarch)
* python311-pyvmomi-8.0.3.0.1-150600.12.3.2
## References:
* https://jira.suse.com/browse/PED-11464
* https://jira.suse.com/browse/PED-11697
1
0
SUSE-SU-2024:4276-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
by OPENSUSE-UPDATES 10 Dec '24
by OPENSUSE-UPDATES 10 Dec '24
10 Dec '24
# Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4276-1
Release Date: 2024-12-10T11:04:08Z
Rating: important
References:
* bsc#1225733
* bsc#1229553
Cross-References:
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_103 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4273=1 SUSE-2024-4274=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4273=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-4274=1
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4276=1 SUSE-SLE-
Module-Live-Patching-15-SP2-2024-4277=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-12-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_42-debugsource-16-150200.2.1
* kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-16-150200.2.1
* kernel-livepatch-5_3_18-150200_24_169-default-16-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_45-debugsource-12-150200.2.1
* kernel-livepatch-5_3_18-150200_24_178-default-12-150200.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4275-1: important: Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)
by OPENSUSE-UPDATES 10 Dec '24
by OPENSUSE-UPDATES 10 Dec '24
10 Dec '24
# Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4275-1
Release Date: 2024-12-10T09:42:22Z
Rating: important
References:
* bsc#1223683
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26923
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 14 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_122 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4275=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4275=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-6-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-6-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-6-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-6-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-6-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-6-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-RU-2024:4269-1: moderate: Recommended update for libnvme, nvme-cli
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Recommended update for libnvme, nvme-cli
Announcement ID: SUSE-RU-2024:4269-1
Release Date: 2024-12-09T16:34:42Z
Rating: moderate
References:
* bsc#1216982
* bsc#1226216
* bsc#1232616
* bsc#1234217
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has four fixes can now be installed.
## Description:
This update for libnvme, nvme-cli fixes the following issues:
* Version update (1.8+79.g69e7772)
* docs: update check-tls-key arguments (bsc#1216982, bsc#1226216).
* docs: update gen-tls-key arguments (bsc#1216982, bsc#1226216).
* docs: update TLS options (bsc#1216982, bsc#1226216).
* fabrics: add support to connect to accept a PSK command line and
configuration (bsc#1216982, bsc#1226216).
* fabrics: fix map error level in __nvmf_add_ctrl (bsc#1216982, bsc#1226216).
* fabrics: add ctrl connect interface (bsc#1216982, bsc#1226216).
* fabrics: use hex numbers when generating command line options (bsc#1216982,
bsc#1226216).
* fabrics: rename first argument for argument macros (bsc#1216982,
bsc#1226216).
* fabrics: do not attempt to import keys if tls is not enabled (bsc#1216982,
bsc#1226216).
* fabrics: skip namespace scan for fabric commands (bsc#1232616).
* json: move keystore operations out of the JSON parser (bsc#1216982,
bsc#1226216).
* json: do not escape strings when printing the configuration (bsc#1216982,
bsc#1226216).
* linux: do not do any keyring ops when no key is provided (bsc#1216982,
bsc#1226216).
* linux: do not return w/o OpenSSL support enabled (bsc#1216982, bsc#1226216).
* linux: fix derive_psk_digest OpenSSL 1.1 version (bsc#1216982, bsc#1226216).
* linux: fixup PSK HMAC type '0' handling (bsc#1216982, bsc#1226216).
* linux: handle key import correctly (bsc#1216982, bsc#1226216).
* linux: export keys to config (bsc#1216982, bsc#1226216).
* linux: only return the description of a key (bsc#1216982, bsc#1226216).
* linux: use ssize_t as return type for nvme_identity_len (bsc#1216982,
bsc#1226216).
* linux: reorder variable declarations (bsc#1216982 bsc#1226216 (bsc#1216982,
bsc#1226216).
* linux: Remove the use of OpenSSL Engine API.
* linux: add import/export function for TLS pre-shared keys (bsc#1216982,
bsc#1226216).
* netapp-smdev: remove redundant code (bsc#1234217).
* netapp-smdev: add verbose output (bsc#1234217).
* netapp-smdev-doc: add verbose details (bsc#1234217).
* netapp-ontapdev: fix JSON output for nsze and nuse (bsc#1234217).
* netapp-ontapdev: fix fw version handling (bsc#1234217).
* netapp-ontapdev-doc: add verbose details (bsc#1232616).
* netapp-ontapdev: add verbose output (bsc#1232616).
* nvme: use unsigned char for hmac and identity (bsc#1216982, bsc#1226216).
* nvme: add support to append TLS PSK to keyfile for check-tls-key
(bsc#1216982, bsc#1226216).
* nvme: return correct error code in append_keyfile (bsc#1216982,
bsc#1226216).
* nvme: add support to add derive TLS PSK to keyfile (bsc#1216982,
bsc#1226216).
* nvme: rename identity to version (bsc#1216982, bsc#1226216).
* nvme: set file permission for keyfile to owner only (bsc#1216982,
bsc#1226216).
* nvme: export tls keys honoring version and hmac (bsc#1216982, bsc#1226216).
* nvme-netapp: update err messages (bsc#1234217).
* nvmf-keys: add udev rule to import tls keys (bsc#1216982, bsc#1226216).
* test: add pre-shared key json tests (bsc#1216982, bsc#1226216).
* test: extend psk to test new 'versioned' API (bsc#1216982, bsc#1226216).
* test: add test case for importing/exporting PSKs (bsc#1216982, bsc#1226216).
* test: make config-diff more flexible to use (bsc#1216982, bsc#1226216).
* tree: optionally skip namespaces during scanning (bsc#1232616).
* tree: do no export tls keys when not provided by user (bsc#1216982,
bsc#1226216).
* tree: read tls_configured_key and tls_keyring from sysfs (bsc#1216982,
bsc#1226216).
* tree: move dhchap and tls sysfs parser into separate functions (bsc#1216982,
bsc#1226216).
* tree: add getter/setters for TLS PSK (bsc#1216982, bsc#1226216).
* util: added error code for ENOKEY (bsc#1216982, bsc#1226216).
* util: Add string constant for ENVME_CONNECT_IGNORED.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4269=1 openSUSE-SLE-15.6-2024-4269=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4269=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libnvme-devel-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-debugsource-2.8+87.g29df38e-150600.3.12.2
* libnvme-mi1-1.8+79.g69e7772-150600.3.12.2
* libnvme-mi1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-1.8+79.g69e7772-150600.3.12.2
* python3-libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-debuginfo-2.8+87.g29df38e-150600.3.12.2
* libnvme-debugsource-1.8+79.g69e7772-150600.3.12.2
* python3-libnvme-1.8+79.g69e7772-150600.3.12.2
* libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* openSUSE Leap 15.6 (noarch)
* nvme-cli-bash-completion-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-zsh-completion-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-regress-script-2.8+87.g29df38e-150600.3.12.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libnvme-devel-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-debugsource-2.8+87.g29df38e-150600.3.12.2
* libnvme-mi1-1.8+79.g69e7772-150600.3.12.2
* libnvme-mi1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-debuginfo-2.8+87.g29df38e-150600.3.12.2
* python3-libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme-debugsource-1.8+79.g69e7772-150600.3.12.2
* python3-libnvme-1.8+79.g69e7772-150600.3.12.2
* libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* Basesystem Module 15-SP6 (noarch)
* nvme-cli-bash-completion-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-zsh-completion-2.8+87.g29df38e-150600.3.12.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1216982
* https://bugzilla.suse.com/show_bug.cgi?id=1226216
* https://bugzilla.suse.com/show_bug.cgi?id=1232616
* https://bugzilla.suse.com/show_bug.cgi?id=1234217
1
0
09 Dec '24
# Recommended update for net-snmp
Announcement ID: SUSE-RU-2024:4270-1
Release Date: 2024-12-09T16:40:04Z
Rating: moderate
References:
* bsc#1232030
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for net-snmp fixes the following issue:
* logrotate should use reload instead of restart (bsc#1232030).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4270=1 SUSE-2024-4270=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4270=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4270=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* libsnmp40-32bit-5.9.4-150600.24.5.2
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.5.2
* net-snmp-devel-32bit-5.9.4-150600.24.5.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python3-net-snmp-debuginfo-5.9.4-150600.24.5.2
* perl-SNMP-5.9.4-150600.24.5.2
* net-snmp-debuginfo-5.9.4-150600.24.5.2
* net-snmp-5.9.4-150600.24.5.2
* net-snmp-debugsource-5.9.4-150600.24.5.2
* libsnmp40-debuginfo-5.9.4-150600.24.5.2
* libsnmp40-5.9.4-150600.24.5.2
* perl-SNMP-debuginfo-5.9.4-150600.24.5.2
* net-snmp-devel-5.9.4-150600.24.5.2
* python3-net-snmp-5.9.4-150600.24.5.2
* snmp-mibs-5.9.4-150600.24.5.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* net-snmp-devel-64bit-5.9.4-150600.24.5.2
* libsnmp40-64bit-5.9.4-150600.24.5.2
* libsnmp40-64bit-debuginfo-5.9.4-150600.24.5.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* perl-SNMP-5.9.4-150600.24.5.2
* net-snmp-debuginfo-5.9.4-150600.24.5.2
* net-snmp-5.9.4-150600.24.5.2
* net-snmp-debugsource-5.9.4-150600.24.5.2
* libsnmp40-debuginfo-5.9.4-150600.24.5.2
* libsnmp40-5.9.4-150600.24.5.2
* perl-SNMP-debuginfo-5.9.4-150600.24.5.2
* net-snmp-devel-5.9.4-150600.24.5.2
* snmp-mibs-5.9.4-150600.24.5.2
* SUSE Package Hub 15 15-SP6 (x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.5.2
* net-snmp-debugsource-5.9.4-150600.24.5.2
* libsnmp40-32bit-5.9.4-150600.24.5.2
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.5.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1232030
1
0
openSUSE-SU-2024:0402-1: moderate: Security update for qt6-webengine
by opensuse-security@opensuse.org 09 Dec '24
by opensuse-security@opensuse.org 09 Dec '24
09 Dec '24
openSUSE Security Update: Security update for qt6-webengine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0402-1
Rating: moderate
References: #1233764
Cross-References: CVE-2024-11403
CVSS scores:
CVE-2024-11403 (SUSE): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for qt6-webengine fixes the following issues:
- CVE-2024-11403: Fixed out of bounds memory read/write in libjxl
(boo#1233764)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-402=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
libQt6Pdf6-6.4.2-bp155.2.6.1
libQt6PdfQuick6-6.4.2-bp155.2.6.1
libQt6PdfWidgets6-6.4.2-bp155.2.6.1
libQt6WebEngineCore6-6.4.2-bp155.2.6.1
libQt6WebEngineQuick6-6.4.2-bp155.2.6.1
libQt6WebEngineWidgets6-6.4.2-bp155.2.6.1
qt6-pdf-devel-6.4.2-bp155.2.6.1
qt6-pdf-imports-6.4.2-bp155.2.6.1
qt6-pdf-private-devel-6.4.2-bp155.2.6.1
qt6-pdfquick-devel-6.4.2-bp155.2.6.1
qt6-pdfquick-private-devel-6.4.2-bp155.2.6.1
qt6-pdfwidgets-devel-6.4.2-bp155.2.6.1
qt6-pdfwidgets-private-devel-6.4.2-bp155.2.6.1
qt6-webengine-6.4.2-bp155.2.6.1
qt6-webengine-docs-html-6.4.2-bp155.2.6.1
qt6-webengine-docs-qch-6.4.2-bp155.2.6.1
qt6-webengine-examples-6.4.2-bp155.2.6.1
qt6-webengine-imports-6.4.2-bp155.2.6.1
qt6-webenginecore-devel-6.4.2-bp155.2.6.1
qt6-webenginecore-private-devel-6.4.2-bp155.2.6.1
qt6-webenginequick-devel-6.4.2-bp155.2.6.1
qt6-webenginequick-private-devel-6.4.2-bp155.2.6.1
qt6-webenginewidgets-devel-6.4.2-bp155.2.6.1
qt6-webenginewidgets-private-devel-6.4.2-bp155.2.6.1
References:
https://www.suse.com/security/cve/CVE-2024-11403.html
https://bugzilla.suse.com/1233764
1
0
SUSE-SU-2024:4268-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4268-1
Release Date: 2024-12-09T12:33:42Z
Rating: important
References:
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2024-43861
CVSS scores:
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_128 fixes several issues.
The following security issue was fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* Fix intermittent nfs mount failures, may be due to SUNRPC over UDP.
(bsc#1231353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4268=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4268=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-2-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_128-default-2-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-2-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-2-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_128-default-2-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-2-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
openSUSE-SU-2024:0396-1: important: Security update for radare2
by opensuse-security@opensuse.org 09 Dec '24
by opensuse-security@opensuse.org 09 Dec '24
09 Dec '24
openSUSE Security Update: Security update for radare2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0396-1
Rating: important
References: #1234065
Cross-References: CVE-2024-29645
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for radare2 fixes the following issues:
Update to version 5.9.8:
- CVE-2024-29645: buffer overflow vulnerability allows an attacker to
execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes:
https://github.com/radareorg/radare2/releases/tag/5.9.8
https://github.com/radareorg/radare2/releases/tag/5.9.6
https://github.com/radareorg/radare2/releases/tag/5.9.4
https://github.com/radareorg/radare2/releases/tag/5.9.2
https://github.com/radareorg/radare2/releases/tag/5.9.0
https://github.com/radareorg/radare2/releases/tag/5.8.8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-396=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
radare2-5.9.8-bp155.2.3.1
radare2-devel-5.9.8-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
radare2-zsh-completion-5.9.8-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-29645.html
https://bugzilla.suse.com/1234065
1
0
09 Dec '24
openSUSE Security Update: Security update for nanopb
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0400-1
Rating: low
References: #1234088
Cross-References: CVE-2024-53984
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for nanopb fixes the following issues:
- CVE-2024-53984: Fix memory not released on error return (boo#1234088)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-400=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
libprotobuf-nanopb0-0.4.6-bp156.4.3.1
nanopb-devel-0.4.6-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
nanopb-source-0.4.6-bp156.4.3.1
References:
https://www.suse.com/security/cve/CVE-2024-53984.html
https://bugzilla.suse.com/1234088
1
0
openSUSE-SU-2024:0397-1: important: Security update for radare2
by opensuse-security@opensuse.org 09 Dec '24
by opensuse-security@opensuse.org 09 Dec '24
09 Dec '24
openSUSE Security Update: Security update for radare2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0397-1
Rating: important
References: #1234065
Cross-References: CVE-2024-29645
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for radare2 fixes the following issues:
Update to version 5.9.8:
- CVE-2024-29645: buffer overflow vulnerability allows an attacker to
execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes:
https://github.com/radareorg/radare2/releases/tag/5.9.8
https://github.com/radareorg/radare2/releases/tag/5.9.6
https://github.com/radareorg/radare2/releases/tag/5.9.4
https://github.com/radareorg/radare2/releases/tag/5.9.2
https://github.com/radareorg/radare2/releases/tag/5.9.0
https://github.com/radareorg/radare2/releases/tag/5.8.8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-397=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
radare2-5.9.8-bp156.4.3.1
radare2-devel-5.9.8-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
radare2-zsh-completion-5.9.8-bp156.4.3.1
References:
https://www.suse.com/security/cve/CVE-2024-29645.html
https://bugzilla.suse.com/1234065
1
0
openSUSE-RU-2024:0401-1: moderate: Recommended update for arch-install-scripts
by maintenance@opensuse.org 09 Dec '24
by maintenance@opensuse.org 09 Dec '24
09 Dec '24
openSUSE Recommended Update: Recommended update for arch-install-scripts
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0401-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for arch-install-scripts fixes the following issues:
- New upstream release 29
* arch-chroot: fix unshare chroot /dev symlinks
* arch-chroot: bind mount over a /etc/resolv.conf symlink (requires
mount >= 2.39)
* arch-chroot: add option to preserve the chroot resolv.conf
* arch-chroot: ensure /run is mounted with --make-private
* genfstab: ensure swap devices adhere to -f
* genfstab: remove atgc mount option
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-401=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
arch-install-scripts-29-bp156.3.3.1
References:
1
0
openSUSE-RU-2024:0399-1: moderate: Recommended update for minikube
by maintenance@opensuse.org 09 Dec '24
by maintenance@opensuse.org 09 Dec '24
09 Dec '24
openSUSE Recommended Update: Recommended update for minikube
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0399-1
Rating: moderate
References: #1120850 #1227005 #1227017 #1227049
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for minikube fixes the following issues:
- update to 1.34.0 (boo#1227017 boo#1227049 boo#1227005): For a more
detailed changelog, including changes occurring in pre-release versions,
see CHANGELOG.md.
https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md
* Breaking Changes:
- Bump minimum podman version to 4.9.0 #19457
- Disallow using Docker Desktop 4.34.0 #19576
* Features:
- Bump default Kubernetes version to v1.31.0 #19435
- Add new driver for macOS: vfkit #19423
- Add Parallels driver support for darwin/arm64 #19373
- Add new volcano addon #18602
- Addons ingress-dns: Added support for all architectures #19198
- Support privileged ports on WSL #19370
- VM drivers with docker container-runtime now use docker-buildx for
image building #19339
- Support running x86 QEMU on arm64 #19228
- Add -o json option for addon images command #19364
* Improvements:
- add -d shorthand for --driver #19356
- add -c shorthand for --container-runtime #19217
- kvm2: Don't delete the "default" libvirt network #18920
- Update MINIKUBE_HOME usage #18648
- CNI: Updated permissions to support network policies on kindnet
#19360
- GPU: Set NVIDIA_DRIVER_CAPABILITIES to all when GPU is enabled #19345
- Improved error message when trying to use mount on system missing 9P
#18995
- Improved error message when enabling KVM addons on non-KVM cluster
#19195
- Added warning when loading image with wrong arch #19229
- profile list --output json handle empty config folder #16900
- Check connectivity outside minikube when connectivity issuse #18859
* Bugs:
- Fix not creating API server tunnel for QEMU w/ builtin network #19191
- Fix waiting for user input on firewall unblock when
--interactive=false #19531
- Fix network retry check when subnet already in use for podman #17779
- Fix empty tarball when generating image save #19312
- Fix missing permission for kong-serviceaccount #19002
* Version Upgrades:
- Addon cloud-spanner: Update cloud-spanner-emulator/emulator image
from 1.5.17 to 1.5.23 #19341 #19501
- Addon headlamp: Update headlamp-k8s/headlamp image from v0.23.2 to
v0.25.0 #18992 #19152 #19349
- Addon kong: Update kong image from 3.6.1 to 3.7.1 #19046 #19124
- Addon kubevirt: Update bitnami/kubectl image from 1.30.0 to 1.31.0
#18929 #19087 #19313 #19479
- Addon ingress: Update ingress-nginx/controller image from v1.10.1 to
v1.11.2 #19302 #19461
- Addon inspektor-gadget: Update inspektor-gadget image from v0.27.0
to v0.32.0 #18872 #18931 #19011 #19166 #19411 #19554
- Addon istio-provisioner: Update istio/operator image from 1.21.2 to
1.23.0 #18932 #19052 #19167 #19283 #19450
- Addon nvidia-device-plugin: Update nvidia/k8s-device-plugin image
from v0.15.0 to v0.16.2 #19162 #19266 #19336 #19409
- Addon metrics-server: Update metrics-server/metrics-server image
from v0.7.1 to v0.7.2 #19529
- Addon YAKD: bump marcnuri/yakd image from 0.0.4 to 0.0.5 #19145
- CNI: Update calico from v3.27.3 to v3.28.1 #18870 #19377
- CNI: Update cilium from v1.15.3 to v1.16.1 #18925 #19084 #19247
#19337 #19476
- CNI: Update kindnetd from v20240202-8f1494ea to v20240813-c6f155d6
#18933 #19252 #19265 #19307 #19378 #19446
- CNI: Update flannel from v0.25.1 to v0.25.6 #18966 #19008 #19085
#19297 #19522
- Kicbase: Update nerdctld from 0.6.0 to 0.6.1 #19282
- Kicbase: Bump ubuntu:jammy from 20240427 to 20240808 #19068 #19184
#19478
- Kicbase/ISO: Update buildkit from v0.13.1 to v0.15.2 #19024 #19116
#19264 #19355 #19452
- Kicbase/ISO: Update cni-plugins from v1.4.1 to v1.5.1 #19044 #19128
- Kicbase/ISO: Update containerd from v1.7.15 to v1.7.21 #18934 #19106
#19186 #19298 #19521
- Kicbase/ISO: Update cri-dockerd from v0.3.12 to v0.3.15 #19199 #19249
- Kicbase/ISO: Update crun from 1.14.4 to 1.16.1 #19112 #19389 #19443
- Kicbase/ISO: Update docker from 26.0.2 to 27.2.0 #18993 #19038
#19142 #19153 #19175 #19319 #19326 #19429 #19530
- Kicbase/ISO: Update nerdctl from 1.7.5 to 1.7.6 #18869
- Kicbase/ISO: Update runc from v1.1.12 to v1.1.13 #19104
- update to 1.33.1:
* Bugs:
- Fix DNSSEC validation failed errors #18830
- Fix too many open files errors #18832
- CNI cilium: Fix cilium pods failing to start-up #18846
- Addon ingress: Fix enable failing on arm64 machines using VM driver
#18779
- Addon kubeflow: Fix some components missing arm64 images #18765
* Version Upgrades:
- Addon cloud-spanner: Update cloud-spanner-emulator/emulator image
from 1.5.15 to 1.5.17 #18773 #18811
- Addon headlamp: Update headlamp-k8s/headlamp image from v0.23.1 to
v0.23.2 #18793
- Addon ingress: Update ingress-nginx/controller image from v1.10.0 to
v1.10.1 #18756
- Addon istio-provisioner: Update istio/operator image from 1.21.1 to
1.21.2 #18757
- Addon kubevirt: Update bitnami/kubectl image from 1.29.3 to 1.30.0
#18711 #18771
- Addon nvidia-device-plugin: Update nvidia/k8s-device-plugin image
from v0.14.5 to v0.15.0 #18703
- CNI cilium: Update from v1.15.1 to v1.15.3 #18846
- High Availability: Update kube-vip from 0.7.1 to v0.8.0 #18774
- Kicbase/ISO: Update docker from 26.0.1 to 26.0.2 #18706
- Kicbase: Bump ubuntu:jammy from 20240227 to 20240427 #18702 #18769
#18804
- update to 1.33.0:
* Features:
- Support multi-control plane - HA clusters --ha #17909 Tutorial
- Add support for Kubernetes v1.30 #18669
- Support exposing clusterIP services via minikube service #17877
- Addon gvisor: Add arm64 support #18063 #18453
- New Addon: YAKD - Kubernetes Dashboard addon #17775
* Minor Improvements:
- Add active kubecontext to minikube profile list output #17735
- CNI calico: support kubeadm.pod-network-cidr #18233
- CNI bridge: Ensure pod communications are allowed #16143
- Addon auto-pause: Remove memory leak & add configurable interval
#17936
- image build: Add docker.io/library to image short names #16214
- cp: Create directory if not present #17715
- Move errors getting logs into log output itself #18007
- Add default sysctls to allow privileged ports with no capabilities
#18421
- Include extended attributes in preload tarballs #17829
- Apply kubeadm.applyNodeLabels label to all nodes #16416
- Limit driver status check to 20s #17553
- Include journalctl logs if systemd service fails to start #17659
- Fix "Failed to enable container runtime: sudo systemctl restart
cri-docker" #17907
- Fix containerd redownloading existing images on start #17671
- Fix kvm2 not detecting containerd preload #17658
- Fix modifying Docker binfmt config #17830
- Fix auto-pause addon #17866
- Fix not using preload with overlayfs storage driver #18333
- Fix image repositories not allowing subdomains with numbers #17496
- Fix stopping cluster when using kvm2 with containerd #17967
- Fix starting more than one cluster on kvm2 arm64 #18241
- Fix starting kvm2 clusters using Linux on arm64 Mac #18239
- Fix displaying error when deleting non-existing cluster #17713
- Fix no-limit not being respected on restart #17598
- Fix not applying kubeadm.applyNodeLabels label to nodes added after
inital start #16416
- Fix logs delimiter output #17734
* Bugs:
- Fix unescaped local host regex #18617
- Fix regex on validateNetwork to support special characters #18158
* Version Upgrades:
- Bump Kubernetes version default: v1.30.0 and latest: v1.30.0 #18669
- Addon headlamp: Update headlamp-k8s/headlamp image from v0.23.0 to
0.23.1 #18517
- Addon inspektor-gadget: Update inspektor-gadget image from v0.26.0
to v0.27.0 #18588
- Addon istio-provisioner: Update istio/operator image from 1.21.0 to
1.21.1 #18644
- Addon metrics-server: Update metrics-server/metrics-server image
from v0.7.0 to v0.7.1 #18551
- CNI: Update calico from v3.27.0 to v3.27.3 #18206
- CNI: Update flannel from v0.24.4 to v0.25.1 #18641
- Kicbase/ISO: Update buildkit from v0.13.0 to v0.13.1 #18566
- Kicbase/ISO: Update containerd from v1.7.14 to v1.7.15 #18621
- Kicbase/ISO: Update cri-dockerd from v0.3.3 to v0.3.12 #18585
- Kicbase/ISO: Update crun from 1.14 to 1.14.4 #18610
- Kicbase/ISO: Update docker from 25.0.4 to 26.0.1 #18485 #18649
- Kicbase/ISO: Update nerdctl from 1.7.4 to 1.7.5 #18634
- Kicbase: Update nerdctld from 0.5.1 to 0.6.0 #18647
- update to 1.32.0:
* rootless: support `--container-runtime=docker` #17520
* Install NVIDIA container toolkit during image build (offline support)
* Fix no-limit option for config validation #17530
* NVIDIA GPU support with new `--gpus=nvidia` flag for docker driver
#15927 #17314 #17488
* New `kubeflow` addon #17114
* New `local-path-provisioner` addon #15062
* Kicbase: Add `no-limit` option to `--cpus` & `--memory` flags #17491
* Hyper-V: Add memory validation for odd numbers #17325
* QEMU: Improve cpu type and IP detection #17217
* Mask http(s)_proxy password from startup output #17116
* `--delete-on-faliure` also recreates cluster for kubeadm failures
#16890
* Addon auto-pause: Configure intervals using `--auto-pause- interval`
#17070
* `--kubernetes-version` checks GitHub for version validation and
improved error output for invalid versions #16865
* Bugs:
* QEMU: Fix addons failing to enable #17402
* Fix downloading the wrong kubeadm images for k8s versions after
minikube release #17373
* Fix enabling & disabling addons with non-existing cluster #17324
* Fix delete if container-runtime doesn't exist #17347
* Fix network not found not being detected on new Docker versions #17323
* Fix addon registry doesn't follow Minikube DNS domain name
configuration (--dns-domain) #15585
* Version Upgrades:
* Bump Kubernetes version default: v1.28.3 and latest: v1.28.3
* Addon cloud-spanner: Update cloud-spanner-emulator/emulator image from
1.5.9 to 1.5.11 #17225 #17259
* Addon headlamp: Update headlamp-k8s/headlamp image from v0.19.0 to
v0.20.1 #17135 #17365
* Addon ingress: Update ingress-nginx/controller image from v1.8.1 to
v1.9.3 #17223 #17297 #17348 #17421
* Addon inspektor-gadget: Update inspektor-gadget image from v0.19.0 to
v0.21.0 #17176 #17340
* Addon istio-provisioner: Update istio/operator image from 1.12.2 to
1.19.3 #17383 #17436
* Addon kong: Update kong image from 3.2 to 3.4.2 #17485
* Addon registry: Update registry image from 2.8.1 to 2.8.3 #17382 #17467
* CNI: Update calico from v3.26.1 to v3.26.3 #17363 #17375
* CNI: Update flannel from v0.22.1 to v0.22.3 #17102 #17263
* CNI: Update kindnetd from v20230511-dc714da8 to v20230809-80a64d96
#17233
* Kicbase/ISO: Update buildkit from v0.11.6 to v0.12.2 #17194
* Kicbase/ISO: Update containerd from v1.7.3 to v1.7.7 #17243 #17466
* Kicbase/ISO: Update crictl from v1.21.0 to v1.28.0 #17240
* Kicbase/ISO: Update docker from 24.0.4 to 24.0.6 #17120 #17207
* Kicbase/ISO: Update nerdctl from 1.0.0 to 1.6.2 #17145 #17339 #17434
* Kicbase/ISO: Update runc from v1.1.7 to v1.1.9 #17250
* Kicbase: Bump ubuntu:jammy from 20230624 to 20231004 #17086 #17174
#17345 #17423
- update to 1.31.2:
* docker-env Regression:
* Create `~/.ssh` directory if missing #16934
* Fix adding guest to `~/.ssh/known_hosts` when not needed #17030
* Verify containerd storage separately from docker #16972
* cni: Fix regression in auto selection #16912
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-399=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 x86_64):
minikube-1.34.0-bp156.2.3.1
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
docker-machine-driver-kvm2-1.34.0-bp156.2.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
minikube-bash-completion-1.34.0-bp156.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-3817.html
https://www.suse.com/security/cve/CVE-2024-6104.html
https://www.suse.com/security/cve/CVE-2024-6257.html
https://bugzilla.suse.com/1120850
https://bugzilla.suse.com/1227005
https://bugzilla.suse.com/1227017
https://bugzilla.suse.com/1227049
1
0
openSUSE-RU-2024:0398-1: moderate: Recommended update for libcpuid
by maintenance@opensuse.org 09 Dec '24
by maintenance@opensuse.org 09 Dec '24
09 Dec '24
openSUSE Recommended Update: Recommended update for libcpuid
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0398-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for libcpuid fixes the following issues:
- Update to version 0.7.1:
* Fix cpuid kernel module build on ARM
* Return ERR_NO_CPUID when cpuid kernel module cannot be used on AArch32
* state
* Refactor the build of the bindings (#203)
* Fix build error on AArch64 when HWCAP_CPUID is not defined (#205)
* Fix build on Windows ARM with MSVC (206)
* Fix detection of Intel Meteor Lake
* Support for Intel Arrow Lake
* Support for AMD Turin
- update to 0.7.0:
* Version 0.7.0 (2024-08-26):
* Fix handle leaks in rdmsr.c (#199)
* Fix cpuid_get_hypervisor when NULL data is provided (#199)
* Prevent intel_fn11 array overruns (#199)
* Support for AMD Hawk Point
* Support for more AMD Phoenix (8000 series)
* Add cpu_clock_by_tsc() function to the library (#124)
* Check x86 CPUs MSR support (#185)
* Add support for ARM CPUs (AArch32 + AArch64) (#200)
* Add cpu_feature_level_t enumerated values for x86 CPUs (#177)
* Support up to 4 subleaf entries for CPUID leaf 0x80000026 (#189)
* Support for Extended CPU topology subleaf in
cpuid_identify_purpose_amd() (#189)
* Support CPU purpose for AMD x86 CPUs (#189)
* Add cpuid Linux and FreeBSD kernel modules for ARM CPUs
* Improve errors handling in cpuid_get_all_raw_data() and
cpuid_get_raw_data_core() (#202)
* Support get_total_cpus() on DragonFly BSD
* Improve set_cpu_affinity() on NetBSD
* Fix build on OpenBSD
* Improve behavior when CPU affinity cannot be set
* Fix a regression in cpuid_tool about arguments doing nothing (like
--rdmsr or --cpuid)
* Fix a segmentation fault when using --quiet in cpuid_tool
* Improve error handling in cpu_identify_all()
* Add Python bindings (#197)
* Support for AMD Granite Ridge
* Support for AMD Strix Point
* Detect x2APIC and AVX512 features for AMD x86 CPUs
- update to release 0.6.5
* Support for Intel Bay Trail-M
* Support for Intel Bay Trail-T
* Support for Intel Bay Trail-D
* Support for AMD Storm Peak
* Support for Intel Raport Lake Refresh
* Support heterogeneous RAW dumps in cpu_identify_all()
* Support for Intel Meteor Lake, including detection of LP E-Cores
* Support for Intel Emerald Rapids-SP
* Support for more AMD Van Gogh
- Update to release 0.6.4
* Support for AMD Genoa, Phoenix, Dragon Range, Ryzen Z1
* Support for Intel Sapphire Rapids-WS, Skylake (server), Cascade Lake,
Ice-Lake (server), Sapphire Rapids-SP, Raptor Lake-H/HX, Apollo lake
* Improve support for Arrandale, Alder-Lake and Raptor-Lake P/U
* Initial support for Centaur CPUs (VIA and Zhaoxin)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-398=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-398=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le x86_64):
libcpuid-debuginfo-0.7.1-bp156.2.3.1
libcpuid-debugsource-0.7.1-bp156.2.3.1
libcpuid-devel-0.7.1-bp156.2.3.1
libcpuid-tools-0.7.1-bp156.2.3.1
libcpuid-tools-debuginfo-0.7.1-bp156.2.3.1
libcpuid17-0.7.1-bp156.2.3.1
libcpuid17-debuginfo-0.7.1-bp156.2.3.1
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le x86_64):
libcpuid-devel-0.7.1-bp155.2.3.1
libcpuid-tools-0.7.1-bp155.2.3.1
libcpuid17-0.7.1-bp155.2.3.1
References:
1
0
09 Dec '24
# Recommended update for go1.23
Announcement ID: SUSE-RU-2024:4259-1
Release Date: 2024-12-09T09:07:04Z
Rating: moderate
References:
* bsc#1229122
* jsc#PED-11485
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has one fix can now be installed.
## Description:
This update for go1.23 fixes the following issues:
* go1.23.4 (released 2024-12-03) includes fixes to the compiler, the runtime,
the trace command, and the syscall package. (bsc#1229122)
* go#70644 crypto/rsa: new key generation prohibitively slow under race
detector
* go#70645 proposal: go/types: add Scope.Node convenience getter
* go#70646 x/tools/gopls: unimported completion corrupts import decl
(client=BBEdit)
* go#70648 crypto/tls: TestHandshakeClientECDHEECDSAAESGCM/TLSv12 failures
* go#70649 x/benchmarks/sweet/cmd/sweet: TestSweetEndToEnd failures
* go#70650 crypto/tls: TestGetClientCertificate/TLSv13 failures
* go#70651 x/tools/go/gcexportdata: simplify implementation assuming go >=
1.21
* go#70654 cmd/go: Incorrect output from go list
* go#70655 x/build/cmd/relui: add workflows for some remaining manual
recurring Go major release cycle tasks
* go#70657 proposal: bufio: Scanner.IterText/Scanner.IterBytes
* go#70658 x/net/http2: stuck extended CONNECT requests
* go#70659 os: TestRootDirFS failures on linux-mips64 and linux-mips64le arch-
mips
* go#70660 crypto/ecdsa: TestRFC6979 failures on s390x
* go#70664 x/mobile: target maccatalyst cannot find OpenGLES header
* go#70665 x/tools/gopls: refactor.extract.variable fails at package level
* go#70666 x/tools/gopls: panic in GetIfaceStubInfo
* go#70667 proposal: crypto/x509: support extracting X25519 public keys from
certificates
* go#70668 proposal: x/mobile: better support for unrecovered panics
* go#70669 cmd/go: local failure in TestScript/build_trimpath_cgo
* go#70670 cmd/link: unused functions aren't getting deadcoded from the binary
* go#70674 x/pkgsite: package removal request for
https://pkg.go.dev/github.com/uisdevsquad/go-test/debugmate
* go#70675 cmd/go/internal/lockedfile: mountrpc flake in TestTransform on
plan9
* go#70677 all: remote file server I/O flakiness with "Bad fid" errors on
plan9
* go#70678 internal/poll: deadlock on 'Intel(R) Xeon(R) Platinum' when an FD
is closed
* go#70679 mime/multipart: With go 1.23.3, mime/multipart does not link
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4259=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4259=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4259=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4259=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4259=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4259=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4259=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4259=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4259=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4259=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4259=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4259=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4259=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229122
* https://jira.suse.com/browse/PED-11485
1
0
09 Dec '24
# Recommended update for go1.22
Announcement ID: SUSE-RU-2024:4260-1
Release Date: 2024-12-09T09:08:05Z
Rating: moderate
References:
* bsc#1218424
* jsc#PED-11485
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has one fix can now be installed.
## Description:
This update for go1.22 fixes the following issues:
* go1.22.10 (released 2024-12-03) includes fixes to the runtime and the
syscall package. (bsc#1218424)
* go#70201 syscall: SyscallN always escapes the variadic argument
* go#70238 time: TestLoadFixed failures
* go#70474 sync/atomic: TestNilDeref flaky failure on windows-386 with runtime
fatal error
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4260=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4260=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4260=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4260=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4260=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4260=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4260=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4260=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4260=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4260=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4260=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4260=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4260=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218424
* https://jira.suse.com/browse/PED-11485
1
0
SUSE-SU-2024:4262-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4262-1
Release Date: 2024-12-09T10:03:55Z
Rating: important
References:
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_125 fixes several issues.
The following security issues were fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
Non-security issues fixed:
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4262=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4262=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-4-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_125-default-4-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_28-debugsource-4-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-4-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_125-default-4-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_28-debugsource-4-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4264-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4264-1
Release Date: 2024-12-09T10:04:26Z
Rating: important
References:
* bsc#1210619
* bsc#1220145
* bsc#1220537
* bsc#1221302
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223683
* bsc#1225013
* bsc#1225202
* bsc#1225211
* bsc#1225302
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1227651
* bsc#1228573
* bsc#1229553
Cross-References:
* CVE-2021-46955
* CVE-2021-47291
* CVE-2021-47378
* CVE-2021-47383
* CVE-2021-47402
* CVE-2021-47598
* CVE-2022-48651
* CVE-2023-1829
* CVE-2023-52752
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves 23 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2021-47291: ipv6: fix another slab-out-of-bounds in
fib6_nh_flush_exceptions (bsc#1227651).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225202).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit
(bsc#1225211).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
fragmenting IPv4 packets (bsc#1220537).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210619).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4264=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4264=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_43-debugsource-9-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-9-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_158-default-9-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_158-preempt-9-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-9-150300.7.6.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_158-default-9-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46955.html
* https://www.suse.com/security/cve/CVE-2021-47291.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210619
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220537
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225202
* https://bugzilla.suse.com/show_bug.cgi?id=1225211
* https://bugzilla.suse.com/show_bug.cgi?id=1225302
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1227651
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4265-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4265-1
Release Date: 2024-12-09T10:04:37Z
Rating: important
References:
* bsc#1225733
* bsc#1229553
Cross-References:
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_100 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4265=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4265=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_100-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-14-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_100-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-14-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4266-1: important: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4266-1
Release Date: 2024-12-09T10:04:52Z
Rating: important
References:
* bsc#1220145
* bsc#1220832
* bsc#1221302
* bsc#1222685
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52502
* CVE-2023-52752
* CVE-2023-52846
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 29 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_111 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220832).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4266=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4266=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_111-default-9-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-9-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_24-debugsource-9-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_111-default-9-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-9-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_24-debugsource-9-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220832
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
# Security update for glib2
Announcement ID: SUSE-SU-2024:4254-1
Release Date: 2024-12-06T17:03:29Z
Rating: important
References:
* bsc#1231463
* bsc#1233282
Cross-References:
* CVE-2024-52533
CVSS scores:
* CVE-2024-52533 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for glib2 fixes the following issues:
Security issues fixed:
* CVE-2024-52533: Fix a single byte buffer overflow in set_connect_msg()
(bsc#1233282).
Non-security issue fixed:
* Fix error when uninstalling packages (bsc#1231463).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4254=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4254=1 openSUSE-SLE-15.6-2024-4254=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-2.78.6-150600.4.8.1
* glib2-debugsource-2.78.6-150600.4.8.1
* libglib-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-2.78.6-150600.4.8.1
* glib2-devel-2.78.6-150600.4.8.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-2.78.6-150600.4.8.1
* glib2-tools-2.78.6-150600.4.8.1
* glib2-tools-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.8.1
* Basesystem Module 15-SP6 (noarch)
* glib2-lang-2.78.6-150600.4.8.1
* Basesystem Module 15-SP6 (x86_64)
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (noarch)
* gio-branding-upstream-2.78.6-150600.4.8.1
* glib2-lang-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glib2-tests-devel-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-static-2.78.6-150600.4.8.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-debugsource-2.78.6-150600.4.8.1
* libgthread-2_0-0-2.78.6-150600.4.8.1
* glib2-doc-2.78.6-150600.4.8.1
* libglib-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-2.78.6-150600.4.8.1
* glib2-devel-2.78.6-150600.4.8.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-2.78.6-150600.4.8.1
* glib2-tools-2.78.6-150600.4.8.1
* glib2-tools-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-tests-devel-2.78.6-150600.4.8.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (x86_64)
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-32bit-2.78.6-150600.4.8.1
* glib2-devel-32bit-2.78.6-150600.4.8.1
* libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* glib2-tools-32bit-2.78.6-150600.4.8.1
* libgio-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.8.1
* glib2-tools-32bit-debuginfo-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* libglib-2_0-0-64bit-2.78.6-150600.4.8.1
* libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-64bit-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-64bit-2.78.6-150600.4.8.1
* libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* glib2-tools-64bit-2.78.6-150600.4.8.1
* libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-64bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-64bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-64bit-2.78.6-150600.4.8.1
* glib2-tools-64bit-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-64bit-2.78.6-150600.4.8.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52533.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231463
* https://bugzilla.suse.com/show_bug.cgi?id=1233282
1
0
06 Dec '24
# Security update for kernel-firmware
Announcement ID: SUSE-SU-2024:4255-1
Release Date: 2024-12-06T17:10:46Z
Rating: important
References:
* bsc#1229069
* bsc#1229272
* bsc#1230007
* bsc#1230596
* bsc#1234027
Cross-References:
* CVE-2023-31315
CVSS scores:
* CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has four security fixes can now be
installed.
## Description:
This update for kernel-firmware fixes the following issues:
* Update to version 20241128 (git commit ea71da6f0690):
* i915: Update Xe2LPD DMC to v2.24
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops
* iwlwifi: add Bz-gf FW for core89-91 release
* amdgpu: update smu 13.0.10 firmware
* amdgpu: update sdma 6.0.3 firmware
* amdgpu: update psp 13.0.10 firmware
* amdgpu: update gc 11.0.3 firmware
* amdgpu: add smu 13.0.14 firmware
* amdgpu: add sdma 4.4.5 firmware
* amdgpu: add psp 13.0.14 firmware
* amdgpu: add gc 9.4.4 firmware
* amdgpu: update vcn 3.1.2 firmware
* amdgpu: update psp 13.0.5 firmware
* amdgpu: update psp 13.0.8 firmware
* amdgpu: update vega20 firmware
* amdgpu: update vega12 firmware
* amdgpu: update psp 14.0.4 firmware
* amdgpu: update gc 11.5.2 firmware
* amdgpu: update vega10 firmware
* amdgpu: update vcn 4.0.0 firmware
* amdgpu: update smu 13.0.0 firmware
* amdgpu: update psp 13.0.0 firmware
* amdgpu: update gc 11.0.0 firmware
* amdgpu: update beige goby firmware
* amdgpu: update vangogh firmware
* amdgpu: update dimgrey cavefish firmware
* amdgpu: update navy flounder firmware
* amdgpu: update psp 13.0.11 firmware
* amdgpu: update gc 11.0.4 firmware
* amdgpu: update vcn 4.0.2 firmware
* amdgpu: update psp 13.0.4 firmware
* amdgpu: update gc 11.0.1 firmware
* amdgpu: update sienna cichlid firmware
* amdgpu: update vpe 6.1.1 firmware
* amdgpu: update vcn 4.0.6 firmware
* amdgpu: update psp 14.0.1 firmware
* amdgpu: update gc 11.5.1 firmware
* amdgpu: update vcn 4.0.5 firmware
* amdgpu: update psp 14.0.0 firmware
* amdgpu: update gc 11.5.0 firmware
* amdgpu: update navi14 firmware
* amdgpu: update arcturus firmware
* amdgpu: update renoir firmware
* amdgpu: update navi12 firmware
* amdgpu: update sdma 4.4.2 firmware
* amdgpu: update psp 13.0.6 firmware
* amdgpu: update gc 9.4.3 firmware
* amdgpu: update vcn 4.0.4 firmware
* amdgpu: update psp 13.0.7 firmware
* amdgpu: update gc 11.0.2 firmware
* amdgpu: update navi10 firmware
* amdgpu: update aldebaran firmware
* Update aliases from 6.13-rc1
* Update to version 20241125 (git commit 508d770ee6f3):
* ice: update ice DDP wireless_edge package to 1.3.20.0
* ice: update ice DDP comms package to 1.3.52.0
* ice: update ice DDP package to ice-1.3.41.0
* amdgpu: update DMCUB to v9.0.10.0 for DCN314
* amdgpu: update DMCUB to v9.0.10.0 for DCN351
* Update to version 20241121 (git commit 48bb90cceb88):
* linux-firmware: Update AMD cpu microcode
* xe: Update GUC to v70.36.0 for BMG, LNL
* i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL
* Update to version 20241119 (git commit 60cdfe1831e8):
* iwlwifi: add Bz-gf FW for core91-69 release
* Update aliases from 6.12
* Update to version 20241113 (git commit 1727aceef4d2):
* qcom: venus-5.4: add venus firmware file for qcs615
* qcom: update venus firmware file for SC7280
* QCA: Add 22 bluetooth firmware nvm files for QCA2066
* Update to version 20241112 (git commit c57a0a42468b):
* mediatek MT7922: update bluetooth firmware to 20241106163512
* mediatek MT7921: update bluetooth firmware to 20241106151414
* linux-firmware: update firmware for MT7922 WiFi device
* linux-firmware: update firmware for MT7921 WiFi device
* qcom: Add QDU100 firmware image files.
* qcom: Update aic100 firmware files
* dedup-firmware.sh: fix infinite loop for --verbose
* rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7
* cnm: update chips&media wave521c firmware.
* mediatek MT7920: update bluetooth firmware to 20241104091246
* linux-firmware: update firmware for MT7920 WiFi device
* copy-firmware.sh: Run check_whence.py only if in a git repo
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops
* amdgpu: update DMCUB to v9.0.10.0 for DCN351
* rtw89: 8852a: update fw to v0.13.36.2
* rtw88: Add firmware v52.14.0 for RTL8812AU
* i915: Update Xe2LPD DMC to v2.23
* linux-firmware: update firmware for mediatek bluetooth chip (MT7925)
* linux-firmware: update firmware for MT7925 WiFi device
* WHENCE: Add sof-tolg for mt8195
* linux-firmware: Update firmware file for Intel BlazarI core
* qcom: Add link for QCS6490 GPU firmware
* qcom: update gpu firmwares for qcs615 chipset
* cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops
* mediatek: Add sof-tolg for mt8195
* Update to version 20241029 (git commit 048795eef350):
* ath11k: move WCN6750 firmware to the device-specific subdir
* xe: Update LNL GSC to v104.0.0.1263
* i915: Update MTL/ARL GSC to v102.1.15.1926
* Update to version 20241028 (git commit 987607d681cb):
* amdgpu: DMCUB updates for various AMDGPU ASICs
* i915: Add Xe3LPD DMC
* cnm: update chips&media wave521c firmware.
* linux-firmware: Add firmware for Cirrus CS35L41
* linux-firmware: Update firmware file for Intel BlazarU core
* Makefile: error out of 'install' if COPYOPTS is set
* Update to version 20241018 (git commit 2f0464118f40):
* check_whence.py: skip some validation if git ls-files fails
* qcom: Add Audio firmware for X1E80100 CRD/QCPs
* amdgpu: DMCUB updates forvarious AMDGPU ASICs
* brcm: replace NVRAM for Jetson TX1
* rtlwifi: Update firmware for RTL8192FU to v7.3
* make: separate installation and de-duplication targets
* check_whence.py: check the permissions
* Remove execute bit from firmware files
* configure: remove unused file
* rtl_nic: add firmware rtl8125d-1
* Update to version 20241014 (git commit 99f9c7ed1f4a):
* iwlwifi: add gl/Bz FW for core91-69 release
* iwlwifi: update ty/So/Ma firmwares for core91-69 release
* iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops
* cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops
* linux-firmware: update firmware for en8811h 2.5G ethernet phy
* QCA: Add Bluetooth firmwares for WCN785x with UART transport
* Update to version 20241011 (git commit 808cba847c70):
* mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher
* ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596)
* ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1
* ath12k: QCN9274 hw2.0: add board-2.bin
* copy-firmware.sh: rename variables in symlink hanlding
* copy-firmware.sh: remove no longer reachable test -L
* copy-firmware.sh: remove no longer reachable test -f
* copy-firmware.sh: call ./check_whence.py before parsing the file
* copy-firmware.sh: warn if the destination folder is not empty
* copy-firmware.sh: add err() helper
* copy-firmware.sh: fix indentation
* copy-firmware.sh: reset and consistently handle destdir
* Revert "copy-firmware: Support additional compressor options"
* copy-firmware.sh: flesh out and fix dedup-firmware.sh
* Style update yaml files
* editorconfig: add initial config file
* check_whence.py: annotate replacement strings as raw
* check_whence.py: LC_ALL=C sort -u the filelist
* check_whence.py: ban link-to-a-link
* check_whence.py: use consistent naming
* Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin
* tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31
* Drop obsoleted --ignore-duplicates option to copy-firmware.sh
* Drop the ath12k workaround again
* Update to version 20241010 (git commit d4e688aa74a0):
* rtlwifi: Add firmware v39.0 for RTL8192DU
* Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer
firmware in this package instead)
* update aliases
* Update to version 20241004 (git commit bbb77872a8a7):
* amdgpu: DMCUB DCN35 update
* brcm: Add BCM4354 NVRAM for Jetson TX1
* brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram
* Update to version 20241001 (git commit 51e5af813eaf):
* linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920)
* linux-firmware: add firmware for MT7920
* amdgpu: update raven firmware
* amdgpu: update SMU 13.0.10 firmware
* amdgpu: update PSP 13.0.10 firmware
* amdgpu: update GC 11.0.3 firmware
* amdgpu: update VCN 3.1.2 firmware
* amdgpu: update PSP 13.0.5 firmware
* amdgpu: update PSP 13.0.8 firmware
* amdgpu: update vega12 firmware
* amdgpu: update PSP 14.0.4 firmware
* amdgpu: update GC 11.5.2 firmware
* amdgpu: update vega10 firmware
* amdgpu: update VCN 4.0.0 firmware
* amdgpu: update PSP 13.0.0 firmware
* amdgpu: update GC 11.0.0 firmware
* amdgpu: update picasso firmware
* amdgpu: update beige goby firmware
* amdgpu: update vangogh firmware
* amdgpu: update dimgrey cavefish firmware
* amdgpu: update navy flounder firmware
* amdgpu: update green sardine firmware
* amdgpu: update VCN 4.0.2 firmware
* amdgpu: update PSP 13.0.4 firmware
* amdgpu: update GC 11.0.1 firmware
* amdgpu: update sienna cichlid firmware
* amdgpu: update VCN 4.0.6 firmware
* amdgpu: update PSP 14.0.1 firmware
* amdgpu: update GC 11.5.1 firmware
* amdgpu: update VCN 4.0.5 firmware
* amdgpu: update PSP 14.0.0 firmware
* amdgpu: update GC 11.5.0 firmware
* amdgpu: update navi14 firmware
* amdgpu: update renoir firmware
* amdgpu: update navi12 firmware
* amdgpu: update SMU 13.0.6 firmware
* amdgpu: update SDMA 4.4.2 firmware
* amdgpu: update PSP 13.0.6 firmware
* amdgpu: update GC 9.4.3 firmware
* amdgpu: update yellow carp firmware
* amdgpu: update VCN 4.0.4 firmware
* amdgpu: update PSP 13.0.7 firmware
* amdgpu: update GC 11.0.2 firmware
* amdgpu: update navi10 firmware
* amdgpu: update aldebaran firmware
* qcom: update gpu firmwares for qcm6490 chipset
* mt76: mt7996: add firmware files for mt7992 chipset
* mt76: mt7996: add firmware files for mt7996 chipset variants
* qcom: add gpu firmwares for sa8775p chipset
* rtw89: 8922a: add fw format-2 v0.35.42.1
* Pick up the fixed ath12k firmware from https://git.codelinaro.org/clo/ath-
firmware/ath12k-firmware (bsc#1230596)
* Update aliases from 6.11.x and 6.12-rc1
* Update to version 20240913 (git commit bcbdd1670bc3):
* amdgpu: update DMCUB to v0.0.233.0 DCN351
* copy-firmware: Handle links to uncompressed files
* WHENCE: Fix battmgr.jsn entry type
* Temporary revert for ath12k firmware (bsc#1230596)
* Update to version 20240912 (git commit 47c72fee8fe3):
* amdgpu: Add VPE 6.1.3 microcode
* amdgpu: add SDMA 6.1.2 microcode
* amdgpu: Add support for PSP 14.0.4
* amdgpu: add GC 11.5.2 microcode
* qcom: qcm6490: add ADSP and CDSP firmware
* linux-firmware: Update firmware file for Intel Bluetooth Magnetor core
* linux-firmware: Update firmware file for Intel BlazarU core
* linux-firmware: Update firmware file for Intel Bluetooth Solar core
* Update to version 20240911 (git commit 59def907425d):
* rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272)
* Update to version 20240910 (git commit 2a7b69a3fa30):
* realtek: rt1320: Add patch firmware of MCU
* i915: Update MTL DMC v2.23
* cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops
* Update to version 20240903 (git commit 96af55bd3d0b):
* amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007)
* iwlwifi: add Bz FW for core89-58 release
* rtl_nic: add firmware rtl8126a-3
* linux-firmware: update firmware for MT7921 WiFi device
* linux-firmware: update firmware for mediatek bluetooth chip (MT7921)
* Update to version 20240830 (git commit d6c600d46981):
* amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351
* qcom: vpu: restore compatibility with kernels before 6.6
* Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w
updates for bsc#1234027)
* amdgpu: DMCUB updates forvarious AMDGPU ASICs
* rtw89: 8922a: add fw format-1 v0.35.41.0
* linux-firmware: update firmware for MT7925 WiFi device
* linux-firmware: update firmware for mediatek bluetooth chip (MT7925)
* rtl_bt: Add firmware and config files for RTL8922A
* rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part
* rtl_bt: de-dupe identical config.bin files
* rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin
* linux-firmware: Update AMD SEV firmware
* linux-firmware: update firmware for MT7996
* Revert "i915: Update MTL DMC v2.22"
* ath12k: WCN7850 hw2.0: update board-2.bin
* ath11k: WCN6855 hw2.0: update to
WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41
* ath11k: WCN6855 hw2.0: update board-2.bin
* ath11k: QCA2066 hw2.1: add to
WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3
* ath11k: QCA2066 hw2.1: add board-2.bin
* ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1
* qcom: vpu: add video firmware for sa8775p
* amdgpu: DMCUB updates for various AMDGPU ASICs
* Update to version 20240809 (git commit 36db650dae03):
* qcom: update path for video firmware for vpu-1/2/3.0
* QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642
* rtw89: 8852c: add fw format-1 v0.27.97.0
* rtw89: 8852bt: add firmware 0.29.91.0
* amdgpu: Update ISP FW for isp v4.1.1
* mediatek: Update mt8195 SOF firmware
* amdgpu: DMCUB updates for DCN314
* xe: First GuC release v70.29.2 for BMG
* xe: Add GuC v70.29.2 for LNL
* i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL
* i915: Update MTL DMC v2.22
* i915: update MTL GSC to v102.0.10.1878
* xe: Add BMG HuC 8.2.10
* xe: Add GSC 104.0.0.1161 for LNL
* xe: Add LNL HuC 9.4.13
* i915: update DG2 HuC to v7.10.16
* amdgpu: Update ISP FW for isp v4.1.1
* QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641
* Issues already fixed in past releases:
* CVE-2023-31315: Fixed improper validation in a model specific register (MSR)
could allow a malicious program with ring0 access to modify SMM
configuration (bsc#1229069)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4255=1 openSUSE-SLE-15.6-2024-4255=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4255=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* kernel-firmware-usb-network-20241128-150600.3.9.1
* kernel-firmware-iwlwifi-20241128-150600.3.9.1
* kernel-firmware-serial-20241128-150600.3.9.1
* ucode-amd-20241128-150600.3.9.1
* kernel-firmware-liquidio-20241128-150600.3.9.1
* kernel-firmware-i915-20241128-150600.3.9.1
* kernel-firmware-network-20241128-150600.3.9.1
* kernel-firmware-atheros-20241128-150600.3.9.1
* kernel-firmware-mellanox-20241128-150600.3.9.1
* kernel-firmware-all-20241128-150600.3.9.1
* kernel-firmware-20241128-150600.3.9.1
* kernel-firmware-chelsio-20241128-150600.3.9.1
* kernel-firmware-mwifiex-20241128-150600.3.9.1
* kernel-firmware-radeon-20241128-150600.3.9.1
* kernel-firmware-media-20241128-150600.3.9.1
* kernel-firmware-sound-20241128-150600.3.9.1
* kernel-firmware-qlogic-20241128-150600.3.9.1
* kernel-firmware-realtek-20241128-150600.3.9.1
* kernel-firmware-ti-20241128-150600.3.9.1
* kernel-firmware-nvidia-20241128-150600.3.9.1
* kernel-firmware-dpaa2-20241128-150600.3.9.1
* kernel-firmware-mediatek-20241128-150600.3.9.1
* kernel-firmware-qcom-20241128-150600.3.9.1
* kernel-firmware-ath12k-20241128-150600.3.9.1
* kernel-firmware-intel-20241128-150600.3.9.1
* kernel-firmware-bnx2-20241128-150600.3.9.1
* kernel-firmware-marvell-20241128-150600.3.9.1
* kernel-firmware-prestera-20241128-150600.3.9.1
* kernel-firmware-nfp-20241128-150600.3.9.1
* kernel-firmware-ath11k-20241128-150600.3.9.1
* kernel-firmware-amdgpu-20241128-150600.3.9.1
* kernel-firmware-ueagle-20241128-150600.3.9.1
* kernel-firmware-platform-20241128-150600.3.9.1
* kernel-firmware-brcm-20241128-150600.3.9.1
* kernel-firmware-bluetooth-20241128-150600.3.9.1
* kernel-firmware-ath10k-20241128-150600.3.9.1
* Basesystem Module 15-SP6 (noarch)
* kernel-firmware-usb-network-20241128-150600.3.9.1
* kernel-firmware-iwlwifi-20241128-150600.3.9.1
* kernel-firmware-serial-20241128-150600.3.9.1
* ucode-amd-20241128-150600.3.9.1
* kernel-firmware-liquidio-20241128-150600.3.9.1
* kernel-firmware-i915-20241128-150600.3.9.1
* kernel-firmware-network-20241128-150600.3.9.1
* kernel-firmware-atheros-20241128-150600.3.9.1
* kernel-firmware-mellanox-20241128-150600.3.9.1
* kernel-firmware-all-20241128-150600.3.9.1
* kernel-firmware-chelsio-20241128-150600.3.9.1
* kernel-firmware-mwifiex-20241128-150600.3.9.1
* kernel-firmware-radeon-20241128-150600.3.9.1
* kernel-firmware-media-20241128-150600.3.9.1
* kernel-firmware-sound-20241128-150600.3.9.1
* kernel-firmware-qlogic-20241128-150600.3.9.1
* kernel-firmware-realtek-20241128-150600.3.9.1
* kernel-firmware-ti-20241128-150600.3.9.1
* kernel-firmware-nvidia-20241128-150600.3.9.1
* kernel-firmware-dpaa2-20241128-150600.3.9.1
* kernel-firmware-mediatek-20241128-150600.3.9.1
* kernel-firmware-qcom-20241128-150600.3.9.1
* kernel-firmware-ath12k-20241128-150600.3.9.1
* kernel-firmware-intel-20241128-150600.3.9.1
* kernel-firmware-bnx2-20241128-150600.3.9.1
* kernel-firmware-marvell-20241128-150600.3.9.1
* kernel-firmware-prestera-20241128-150600.3.9.1
* kernel-firmware-nfp-20241128-150600.3.9.1
* kernel-firmware-ath11k-20241128-150600.3.9.1
* kernel-firmware-amdgpu-20241128-150600.3.9.1
* kernel-firmware-ueagle-20241128-150600.3.9.1
* kernel-firmware-platform-20241128-150600.3.9.1
* kernel-firmware-brcm-20241128-150600.3.9.1
* kernel-firmware-bluetooth-20241128-150600.3.9.1
* kernel-firmware-ath10k-20241128-150600.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-31315.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229069
* https://bugzilla.suse.com/show_bug.cgi?id=1229272
* https://bugzilla.suse.com/show_bug.cgi?id=1230007
* https://bugzilla.suse.com/show_bug.cgi?id=1230596
* https://bugzilla.suse.com/show_bug.cgi?id=1234027
1
0
SUSE-SU-2024:4256-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4256-1
Release Date: 2024-12-06T19:03:50Z
Rating: important
References:
* bsc#1210619
* bsc#1218487
* bsc#1220145
* bsc#1220537
* bsc#1221302
* bsc#1222685
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223683
* bsc#1225013
* bsc#1225202
* bsc#1225211
* bsc#1225302
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1227651
* bsc#1228573
* bsc#1229553
Cross-References:
* CVE-2021-46955
* CVE-2021-47291
* CVE-2021-47378
* CVE-2021-47383
* CVE-2021-47402
* CVE-2021-47598
* CVE-2022-48651
* CVE-2023-1829
* CVE-2023-52752
* CVE-2023-6531
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves 25 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2021-47291: ipv6: fix another slab-out-of-bounds in
fib6_nh_flush_exceptions (bsc#1227651).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225202).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit
(bsc#1225211).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
fragmenting IPv4 packets (bsc#1220537).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
* CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
garbage collector's deletion of SKB races with unix_stream_read_generic()on
the socket that the SKB is queued on (bsc#1218487).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210619).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4256=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4256=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_42-debugsource-10-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-default-10-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-10-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_153-preempt-10-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-10-150300.7.6.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_153-default-10-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46955.html
* https://www.suse.com/security/cve/CVE-2021-47291.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210619
* https://bugzilla.suse.com/show_bug.cgi?id=1218487
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220537
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225202
* https://bugzilla.suse.com/show_bug.cgi?id=1225211
* https://bugzilla.suse.com/show_bug.cgi?id=1225302
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1227651
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-RU-2024:4244-1: moderate: Recommended update for shared-mime-info
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Recommended update for shared-mime-info
Announcement ID: SUSE-RU-2024:4244-1
Release Date: 2024-12-06T13:04:44Z
Rating: moderate
References:
* bsc#1231463
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for shared-mime-info fixes the following issue:
* Uninstall silently if update-mime-database is not present (bsc#1231463).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4244=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4244=1 openSUSE-SLE-15.6-2024-4244=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* shared-mime-info-2.4-150600.3.3.2
* shared-mime-info-debugsource-2.4-150600.3.3.2
* shared-mime-info-debuginfo-2.4-150600.3.3.2
* Basesystem Module 15-SP6 (noarch)
* shared-mime-info-lang-2.4-150600.3.3.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* shared-mime-info-2.4-150600.3.3.2
* shared-mime-info-debugsource-2.4-150600.3.3.2
* shared-mime-info-debuginfo-2.4-150600.3.3.2
* openSUSE Leap 15.6 (noarch)
* shared-mime-info-lang-2.4-150600.3.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231463
1
0
06 Dec '24
# Recommended update for 389-ds
Announcement ID: SUSE-RU-2024:4245-1
Release Date: 2024-12-06T14:00:55Z
Rating: important
References:
* bsc#1230852
Affected Products:
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for 389-ds fixes the following issues:
* Persist extracted key path for ldap_ssl_client_init over repeat invocations
(bsc#1230852)
* pamModuleIsThreadSafe is missing in the schema
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4245=1 openSUSE-SLE-15.5-2024-4245=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-4245=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* 389-ds-snmp-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debugsource-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-snmp-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-devel-2.2.10~git24.9b5efd9f-150500.3.29.1
* lib389-2.2.10~git24.9b5efd9f-150500.3.29.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* 389-ds-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debugsource-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-devel-2.2.10~git24.9b5efd9f-150500.3.29.1
* lib389-2.2.10~git24.9b5efd9f-150500.3.29.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230852
1
0
SUSE-SU-2024:4240-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4240-1
Release Date: 2024-12-06T12:33:47Z
Rating: important
References:
* bsc#1225429
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_73 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4240=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4240=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_73-default-2-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-2-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_17-debugsource-2-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_73-default-2-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-2-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64)
* kernel-livepatch-SLE15-SP5_Update_17-debugsource-2-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4243-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4243-1
Release Date: 2024-12-06T13:04:12Z
Rating: important
References:
* bsc#1223363
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225311
* bsc#1225312
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26828
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35949
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 20 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_62 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4243=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4243=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_62-default-7-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-7-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-7-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_62-default-7-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-7-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-7-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4246-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4246-1
Release Date: 2024-12-06T14:03:50Z
Rating: important
References:
* bsc#1223683
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1227651
* bsc#1228573
* bsc#1229553
Cross-References:
* CVE-2021-47291
* CVE-2021-47598
* CVE-2023-52752
* CVE-2024-26923
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves 12 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_164 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2021-47291: ipv6: fix another slab-out-of-bounds in
fib6_nh_flush_exceptions (bsc#1227651).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4246=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4246=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_164-default-5-150300.7.6.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_164-default-5-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-5-150300.7.6.1
* kernel-livepatch-SLE15-SP3_Update_45-debugsource-5-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_164-preempt-5-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-5-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47291.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1227651
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
06 Dec '24
# Recommended update for crmsh
Announcement ID: SUSE-RU-2024:4223-1
Release Date: 2024-12-06T09:19:15Z
Rating: moderate
References:
* bsc#1232821
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for crmsh fixes the following issues:
* Version update 4.6.0+20241111.68fcc6d:
* Fix: report.utils: Fix the performance issue (bsc#1232821).
* Fix: report.collect: Make sure log is not [None] before using it
(bsc#1232821).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4223=1 openSUSE-SLE-15.6-2024-4223=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4223=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* crmsh-4.6.0+20241111.68fcc6d-150600.3.17.2
* crmsh-scripts-4.6.0+20241111.68fcc6d-150600.3.17.2
* crmsh-test-4.6.0+20241111.68fcc6d-150600.3.17.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch)
* crmsh-4.6.0+20241111.68fcc6d-150600.3.17.2
* crmsh-scripts-4.6.0+20241111.68fcc6d-150600.3.17.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1232821
1
0
06 Dec '24
# Recommended update for glibc
Announcement ID: SUSE-RU-2024:4224-1
Release Date: 2024-12-06T09:24:59Z
Rating: moderate
References:
* bsc#1233699
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for glibc fixes the following issue:
* Remove nss-systemd from default nsswitch.conf (bsc#1233699).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4224=1 SUSE-2024-4224=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4224=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4224=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glibc-debuginfo-2.38-150600.14.17.2
* glibc-2.38-150600.14.17.2
* glibc-devel-2.38-150600.14.17.2
* glibc-devel-static-2.38-150600.14.17.2
* glibc-extra-debuginfo-2.38-150600.14.17.2
* glibc-locale-2.38-150600.14.17.2
* glibc-utils-src-debugsource-2.38-150600.14.17.2
* glibc-utils-debuginfo-2.38-150600.14.17.2
* glibc-locale-base-2.38-150600.14.17.2
* glibc-debugsource-2.38-150600.14.17.2
* glibc-locale-base-debuginfo-2.38-150600.14.17.2
* nscd-debuginfo-2.38-150600.14.17.2
* libnsl1-2.38-150600.14.17.2
* glibc-devel-debuginfo-2.38-150600.14.17.2
* glibc-extra-2.38-150600.14.17.2
* glibc-utils-2.38-150600.14.17.2
* glibc-profile-2.38-150600.14.17.2
* nscd-2.38-150600.14.17.2
* libnsl1-debuginfo-2.38-150600.14.17.2
* openSUSE Leap 15.6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.17.1
* glibc-locale-base-32bit-2.38-150600.14.17.1
* glibc-32bit-2.38-150600.14.17.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.17.1
* glibc-devel-static-32bit-2.38-150600.14.17.1
* glibc-32bit-debuginfo-2.38-150600.14.17.1
* glibc-utils-32bit-debuginfo-2.38-150600.14.17.2
* glibc-utils-32bit-2.38-150600.14.17.2
* glibc-profile-32bit-2.38-150600.14.17.1
* libnsl1-32bit-2.38-150600.14.17.1
* libnsl1-32bit-debuginfo-2.38-150600.14.17.1
* glibc-devel-32bit-2.38-150600.14.17.1
* openSUSE Leap 15.6 (noarch)
* glibc-info-2.38-150600.14.17.2
* glibc-html-2.38-150600.14.17.2
* glibc-lang-2.38-150600.14.17.2
* glibc-i18ndata-2.38-150600.14.17.2
* openSUSE Leap 15.6 (i686)
* glibc-locale-2.38-150600.14.17.1
* libnsl1-2.38-150600.14.17.1
* glibc-locale-base-debuginfo-2.38-150600.14.17.1
* libnsl1-debuginfo-2.38-150600.14.17.1
* glibc-debugsource-2.38-150600.14.17.1
* glibc-devel-debuginfo-2.38-150600.14.17.1
* glibc-2.38-150600.14.17.1
* glibc-devel-static-2.38-150600.14.17.1
* glibc-profile-2.38-150600.14.17.1
* glibc-devel-2.38-150600.14.17.1
* glibc-locale-base-2.38-150600.14.17.1
* glibc-debuginfo-2.38-150600.14.17.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* glibc-profile-64bit-2.38-150600.14.17.2
* glibc-64bit-2.38-150600.14.17.2
* glibc-64bit-debuginfo-2.38-150600.14.17.2
* libnsl1-64bit-2.38-150600.14.17.2
* glibc-utils-64bit-debuginfo-2.38-150600.14.17.2
* glibc-utils-64bit-2.38-150600.14.17.2
* glibc-devel-static-64bit-2.38-150600.14.17.2
* glibc-locale-base-64bit-2.38-150600.14.17.2
* glibc-devel-64bit-debuginfo-2.38-150600.14.17.2
* libnsl1-64bit-debuginfo-2.38-150600.14.17.2
* glibc-devel-64bit-2.38-150600.14.17.2
* glibc-locale-base-64bit-debuginfo-2.38-150600.14.17.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.38-150600.14.17.2
* glibc-2.38-150600.14.17.2
* glibc-devel-2.38-150600.14.17.2
* glibc-extra-debuginfo-2.38-150600.14.17.2
* glibc-locale-2.38-150600.14.17.2
* glibc-locale-base-2.38-150600.14.17.2
* glibc-debugsource-2.38-150600.14.17.2
* glibc-locale-base-debuginfo-2.38-150600.14.17.2
* nscd-debuginfo-2.38-150600.14.17.2
* libnsl1-2.38-150600.14.17.2
* glibc-devel-debuginfo-2.38-150600.14.17.2
* glibc-extra-2.38-150600.14.17.2
* glibc-profile-2.38-150600.14.17.2
* nscd-2.38-150600.14.17.2
* libnsl1-debuginfo-2.38-150600.14.17.2
* Basesystem Module 15-SP6 (noarch)
* glibc-info-2.38-150600.14.17.2
* glibc-lang-2.38-150600.14.17.2
* glibc-i18ndata-2.38-150600.14.17.2
* Basesystem Module 15-SP6 (x86_64)
* glibc-locale-base-32bit-2.38-150600.14.17.1
* glibc-32bit-2.38-150600.14.17.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.17.1
* glibc-32bit-debuginfo-2.38-150600.14.17.1
* libnsl1-32bit-2.38-150600.14.17.1
* libnsl1-32bit-debuginfo-2.38-150600.14.17.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.38-150600.14.17.2
* glibc-devel-static-2.38-150600.14.17.2
* glibc-utils-src-debugsource-2.38-150600.14.17.2
* glibc-utils-debuginfo-2.38-150600.14.17.2
* glibc-debugsource-2.38-150600.14.17.2
* glibc-utils-2.38-150600.14.17.2
* Development Tools Module 15-SP6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.17.1
* glibc-32bit-debuginfo-2.38-150600.14.17.1
* glibc-devel-32bit-2.38-150600.14.17.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233699
1
0
06 Dec '24
# Recommended update for python-kiwi
Announcement ID: SUSE-RU-2024:4238-1
Release Date: 2024-12-06T11:44:02Z
Rating: important
References:
* bsc#1233196
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for python-kiwi fixes the following issues:
* Fixed boot support for ISO media on Power PC architecture
* Update documentation configuration to match with latest theme
* Set grub-bls default to false for SUSE Linux Enterprise 15 (bsc#1233196)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4238=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4238=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4238=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4238=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4238=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4238=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4238=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4238=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4238=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4238=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4238=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4238=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4238=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4238=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4238=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4238=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4238=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4238=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4238=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4238=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4238=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4238=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4238=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4238=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4238=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* openSUSE Leap 15.5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* openSUSE Leap 15.6 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* Development Tools Module 15-SP5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* Development Tools Module 15-SP6 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Enterprise Storage 7.1 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233196
1
0
SUSE-SU-2024:4227-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4227-1
Release Date: 2024-12-06T10:03:53Z
Rating: important
References:
* bsc#1225429
* bsc#1225733
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2024-35949
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_39 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4227=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4227=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-14-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4228-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4228-1
Release Date: 2024-12-06T10:04:04Z
Rating: important
References:
* bsc#1223683
* bsc#1225099
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1227471
* bsc#1228349
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26923
* CVE-2024-35949
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-40909
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 12 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4228=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4228=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_68-default-6-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-6-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-6-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_68-default-6-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-6-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-6-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4230-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4230-1
Release Date: 2024-12-06T10:34:14Z
Rating: important
References:
* bsc#1225733
* bsc#1229553
Cross-References:
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_150 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4230=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4232=1 SUSE-2024-4233=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4232=1 SUSE-SLE-
Module-Live-Patching-15-SP3-2024-4233=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP2_Update_43-debugsource-14-150200.2.1
* kernel-livepatch-5_3_18-150200_24_172-default-14-150200.2.1
* kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-14-150200.2.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_41-debugsource-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-14-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_40-debugsource-14-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-14-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_150-preempt-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-14-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-preempt-14-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_147-default-14-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-13-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4234-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4234-1
Release Date: 2024-12-06T10:34:29Z
Rating: important
References:
* bsc#1219296
* bsc#1220145
* bsc#1220211
* bsc#1220828
* bsc#1220832
* bsc#1221302
* bsc#1222685
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52340
* CVE-2023-52502
* CVE-2023-52752
* CVE-2023-52846
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26585
* CVE-2024-26610
* CVE-2024-26622
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 31 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_108 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220832).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220211).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big'
packets (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4234=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4234=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-11-150400.9.8.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-11-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220211
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
* https://bugzilla.suse.com/show_bug.cgi?id=1220832
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4235-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4235-1
Release Date: 2024-12-06T10:34:50Z
Rating: important
References:
* bsc#1220145
* bsc#1221302
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 27 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_116 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4235=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4235=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_116-default-9-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_25-debugsource-9-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-9-150400.9.8.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_116-default-9-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_25-debugsource-9-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-9-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4236-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4236-1
Release Date: 2024-12-06T10:35:07Z
Rating: important
References:
* bsc#1223059
* bsc#1223363
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 22 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_119 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4236=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4236=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-8-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-8-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_119-default-8-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-8-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-8-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_119-default-8-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4237-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4237-1
Release Date: 2024-12-06T10:35:22Z
Rating: important
References:
* bsc#1229553
Cross-References:
* CVE-2024-43861
CVSS scores:
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_170 fixes one issue.
The following security issue was fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4237=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4237=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_170-default-2-150300.7.6.1
* kernel-livepatch-SLE15-SP3_Update_47-debugsource-2-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-2-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_170-preempt-debuginfo-2-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_170-preempt-2-150300.7.6.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_170-default-2-150300.7.6.1
* kernel-livepatch-SLE15-SP3_Update_47-debugsource-2-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-2-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4218-1: important: Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4218-1
Release Date: 2024-12-05T20:39:59Z
Rating: important
References:
* bsc#1219296
* bsc#1220145
* bsc#1220211
* bsc#1220828
* bsc#1220832
* bsc#1221302
* bsc#1222685
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52340
* CVE-2023-52502
* CVE-2023-52752
* CVE-2023-52846
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26585
* CVE-2024-26610
* CVE-2024-26622
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35949
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 34 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_49 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2022-48662: Update for 'really move i915_gem_context.link under ref
protection' (bsc#1223521)
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220832).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220211).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big'
packets (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4218=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4218=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-11-150500.11.8.1
* kernel-livepatch-SLE15-SP5_Update_10-debugsource-11-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-11-150500.11.8.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-11-150500.11.8.1
* kernel-livepatch-SLE15-SP5_Update_10-debugsource-11-150500.11.8.1
* kernel-livepatch-5_14_21-150500_55_49-default-11-150500.11.8.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220211
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
* https://bugzilla.suse.com/show_bug.cgi?id=1220832
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4220-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4220-1
Release Date: 2024-12-05T21:09:30Z
Rating: important
References:
* bsc#1225429
* bsc#1225733
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2024-35949
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_36 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4220=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4220=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_7-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_7-debugsource-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_36-default-14-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
05 Dec '24
# Security update for obs-scm-bridge
Announcement ID: SUSE-SU-2024:4212-1
Release Date: 2024-12-05T16:05:03Z
Rating: important
References:
* bsc#1230469
Cross-References:
* CVE-2024-22038
CVSS scores:
* CVE-2024-22038 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-22038 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
* CVE-2024-22038 ( NVD ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-22038 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for obs-scm-bridge fixes the following issues:
Updated to version 0.5.4: \- CVE-2024-22038: Fixed DoS attacks, information
leaks with crafted Git repositories (bnc#1230469)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4212=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4212=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4212=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4212=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4212=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4212=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4212=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4212=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4212=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4212=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4212=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4212=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4212=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4212=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4212=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4212=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* openSUSE Leap 15.6 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* Development Tools Module 15-SP5 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* Development Tools Module 15-SP6 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
* SUSE Enterprise Storage 7.1 (noarch)
* obs-scm-bridge-0.5.4-150100.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-22038.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230469
1
0
05 Dec '24
# Recommended update for helm
Announcement ID: SUSE-RU-2024:4213-1
Release Date: 2024-12-05T16:06:20Z
Rating: moderate
References:
* bsc#1219969
* bsc#1220207
* jsc#MSC-899
* jsc#SMO-479
Cross-References:
* CVE-2024-25620
* CVE-2024-26147
CVSS scores:
* CVE-2024-25620 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
* CVE-2024-26147 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities and contains two features can now be
installed.
## Description:
helm was updated to fix the following issues:
Update to version 3.16.3:
* fix: fix label name
* Fix typo in pkg/lint/rules/chartfile_test.go
* Increasing the size of the runner used for releases.
* fix(hooks): correct hooks delete order
* Bump github.com/containerd/containerd from 1.7.12 to 1.7.23
Update to version 3.16.2:
* Revering change unrelated to issue #13176
* adds tests for handling of Helm index with broken chart versions #13176
* improves handling of Helm index with broken helm chart versions #13176
* Bump the k8s-io group with 7 updates
* adding check-latest:true
* Grammar fixes
* Fix typos
Update to version 3.16.1:
* bumping version to 1.22.7
* Merge pull request #13327 from mattfarina/revert-11726
Update to version 3.16.0:
Helm v3.16.0 is a feature release. Users are encouraged to upgrade for the best
experience. * Notable Changes \- added sha512sum template function \- added
ActiveHelp for cmds that don't take any more args \- drops very old Kubernetes
versions support in helm create \- add --skip-schema-validation flag to helm
'install', 'upgrade' and 'lint' \- fixed bug to now use burst limit setting for
discovery \- Added windows arm64 support * Full changelog see
https://github.com/helm/helm/releases/tag/v3.16.0
Update to version 3.15.4:
* Bump the k8s-io group across 1 directory with 7 updates
* Bump github.com/docker/docker
* * *
Thu Jul 11 05:39:32 UTC 2024 - opensuse_buildservice(a)ojkastl.de
* Update to version 3.15.3:
* fix(helm): Use burst limit setting for discovery
* fixed dependency_update_test.go
* fix(dependencyBuild): prevent race condition in concurrent helm dependency
* fix: respect proxy envvars on helm install/upgrade
* Merge pull request #13085 from alex-kattathra-johnson/issue-12961
Update to version 3.15.2:
* fix: wrong cli description
* fix typo in load_plugins.go
* fix docs of DeployedAll
* Bump github.com/docker/docker
* bump oras minor version
* feat(load.go): add warning on requirements.lock
Update to version 3.15.1:
* Fixing build issue where wrong version is used
Update to version 3.15.0:
Helm v3.15.0 is a feature release. Users are encouraged to upgrade for the best
experience.
* Updating to k8s 1.30 c4e37b3 (Matt Farina)
* bump version to v3.15.0 d7afa3b (Matt Farina)
* bump version to 7743467 (Matt Farina)
* Fix namespace on kubeconfig error 214fb6e (Calvin Krist)
* Update testdata PKI with keys that have validity until 3393 (Fixes #12880)
1b75d48 (Dirk Müller)
* Modified how created annotation is populated based on package creation time
0a69a0d (Andrew Block)
* Enabling hide secrets on install and upgrade dry run 25c4738 (Matt Farina)
* Fixing all the linting errors d58d7b3 (Robert Sirchia)
* Add a note about --dry-run displaying secrets a23dd9e (Matt Farina)
* Updating .gitignore 8b424ba (Robert Sirchia)
* add error messages 8d19bcb (George Jenkins)
* Fix: Ignore alias validation error for index load 68294fd (George Jenkins)
* validation fix 8e6a514 (Matt Farina)
* bug: add proxy support for oci getter 94c1dea (Ricardo Maraschini)
* Update architecture detection method 57a1bb8 (weidongkl)
* Improve release action 4790bb9 (George Jenkins)
* Fix grammatical error c25736c (Matt Carr)
* Updated for review comments d2cf8c6 (MichaelMorris)
* Add robustness to wait status checks fc74964 (MichaelMorris)
* refactor: create a helper for checking if a release is uninstalled f908379
(Alex Petrov)
* fix: reinstall previously uninstalled chart with --keep-history 9e198fa
(Alex Petrov)
Update to version 3.14.4:
Helm v3.14.4 is a patch release. Users are encouraged to upgrade for the best
experience. Users are encouraged to upgrade for the best experience.
* refactor: create a helper for checking if a release is uninstalled 81c902a
(Alex Petrov)
* fix: reinstall previously uninstalled chart with --keep-history 5a11c76
(Alex Petrov)
* bug: add proxy support for oci getter aa7d953 (Ricardo Maraschini)
Update to version 3.14.3:
* Add a note about --dry-run displaying secrets
* add error messages
* Fix: Ignore alias validation error for index load
* Update architecture detection method
Update to version 3.14.2 (bsc#1220207, CVE-2024-26147):
* Fix for uninitialized variable in yaml parsing
Update to version 3.14.1 (bsc#1219969, CVE-2024-25620):
* validation fix
Update to version 3.14.0:
* Notable Changes
* New helm search flag of --fail-on-no-result
* Allow a nested tpl invocation access to defines
* Speed up the tpl function
* Added qps/HELM_QPS parameter that tells Kubernetes packages how to operate
* Added --kube-version to lint command
* The ignore pkg is now public
* Changelog
* Improve release action
* Fix issues when verify generation readiness was merged
* fix test to use the default code's k8sVersionMinor
* lint: Add --kube-version flag to set capabilities and deprecation rules
* Removing Asset Transparency
* tests(pkg/engine): test RenderWithClientProvider
* Make the `ignore` pkg public again
* feature(pkg/engine): introduce RenderWithClientProvider
* Updating Helm libraries for k8s 1.28.4
* Remove excessive logging
* Update CONTRIBUTING.md
* Fixing release labelling in rollback
* feat: move livenessProbe and readinessProbe values to default values file
* Revert "fix(main): fix basic auth for helm pull or push"
* Revert "fix(registry): address anonymous pull issue"
* Update get-helm-3
* Drop filterSystemLabels usage from Query method
* Apply review suggestions
* Update get-helm-3 to get version through get.helm.sh
* feat: print failed hook name
* Fixing precedence issue with the import of values.
* chore(create): indent to spaces
* Allow using label selectors for system labels for sql backend.
* Allow using label selectors for system labels for secrets and configmap backends.
* remove useless print during prepareUpgrade
* Add missing with clause to release gh action
* FIX Default ServiceAccount yaml
* fix(registry): address anonymous pull issue
* fix(registry): unswallow error
* Fix missing run statement on release action
* Add qps/HELM_QPS parameter
* Write latest version to get.helm.sh bucket
* Increased release information key name max length.
* Pin gox to specific commit
* Remove `GoFish` from package managers for installing the binary
* Test update for "Allow a nested `tpl` invocation access to `defines` in a containing one"
* Test update for "Speed up `tpl`"
* Add support for RISC-V
* lint and validate dependency metadata to reference dependencies with a unique key (name or alias)
* Work around template.Clone omitting options
* fix: pass 'passCredentialsAll' as env-var to getter
* feat: pass basic auth to env-vars when running download plugins
* helm search: New CLI Flag --fail-on-no-result
* Update pkg/kube/ready.go
* fix post install hook deletion due to before-hook-creation policy
* Allow a nested `tpl` invocation access to `defines` in a containing one
* Remove the 'reference templates' concept
* Speed up `tpl`
* ready checker- comment update
* ready checker- remove duplicate statefulset generational check
* Verify generation in readiness checks
* feat(helm): add --reset-then-reuse-values flag to 'helm upgrade'
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4213=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4213=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4213=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4213=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-4213=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-4213=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4213=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4213=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.16.3-150000.1.38.1
* helm-3.16.3-150000.1.38.1
* openSUSE Leap Micro 5.5 (noarch)
* helm-zsh-completion-3.16.3-150000.1.38.1
* helm-bash-completion-3.16.3-150000.1.38.1
* helm-fish-completion-3.16.3-150000.1.38.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.16.3-150000.1.38.1
* helm-3.16.3-150000.1.38.1
* openSUSE Leap 15.5 (noarch)
* helm-zsh-completion-3.16.3-150000.1.38.1
* helm-bash-completion-3.16.3-150000.1.38.1
* helm-fish-completion-3.16.3-150000.1.38.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.16.3-150000.1.38.1
* helm-3.16.3-150000.1.38.1
* openSUSE Leap 15.6 (noarch)
* helm-zsh-completion-3.16.3-150000.1.38.1
* helm-bash-completion-3.16.3-150000.1.38.1
* helm-fish-completion-3.16.3-150000.1.38.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.16.3-150000.1.38.1
* helm-3.16.3-150000.1.38.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.16.3-150000.1.38.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.16.3-150000.1.38.1
* helm-3.16.3-150000.1.38.1
* Containers Module 15-SP5 (noarch)
* helm-zsh-completion-3.16.3-150000.1.38.1
* helm-bash-completion-3.16.3-150000.1.38.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.16.3-150000.1.38.1
* helm-3.16.3-150000.1.38.1
* Containers Module 15-SP6 (noarch)
* helm-zsh-completion-3.16.3-150000.1.38.1
* helm-bash-completion-3.16.3-150000.1.38.1
* SUSE Package Hub 15 15-SP5 (noarch)
* helm-fish-completion-3.16.3-150000.1.38.1
* SUSE Package Hub 15 15-SP6 (noarch)
* helm-fish-completion-3.16.3-150000.1.38.1
## References:
* https://www.suse.com/security/cve/CVE-2024-25620.html
* https://www.suse.com/security/cve/CVE-2024-26147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219969
* https://bugzilla.suse.com/show_bug.cgi?id=1220207
* https://jira.suse.com/browse/MSC-899
* https://jira.suse.com/browse/SMO-479
1
0
# Security update for php8
Announcement ID: SUSE-SU-2024:4215-1
Release Date: 2024-12-05T17:31:56Z
Rating: moderate
References:
* bsc#1233651
* bsc#1233702
* bsc#1233703
Cross-References:
* CVE-2024-11233
* CVE-2024-11234
* CVE-2024-8929
CVSS scores:
* CVE-2024-11233 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-11233 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-11233 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-11233 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-11234 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-11234 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-11234 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-11234 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
* CVE-2024-8929 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-8929 ( NVD ): 5.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for php8 fixes the following issues:
* CVE-2024-11233: buffer overread when processing input with the
convert.quoted-printable-decode filter. (bsc#1233702)
* CVE-2024-11234: possible CRLF injection in URIs when a proxy is configured
in a stream context. (bsc#1233703)
* CVE-2024-8929: data exposure on MySQL clients due to heap buffer overread in
mysqlnd. (bsc#1233651)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4215=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4215=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4215=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* php8-mbstring-debuginfo-8.0.30-150400.4.49.1
* php8-gmp-8.0.30-150400.4.49.1
* php8-gmp-debuginfo-8.0.30-150400.4.49.1
* php8-sqlite-8.0.30-150400.4.49.1
* php8-ctype-debuginfo-8.0.30-150400.4.49.1
* php8-gettext-debuginfo-8.0.30-150400.4.49.1
* php8-iconv-debuginfo-8.0.30-150400.4.49.1
* php8-dom-8.0.30-150400.4.49.1
* php8-mysql-debuginfo-8.0.30-150400.4.49.1
* php8-intl-debuginfo-8.0.30-150400.4.49.1
* php8-zip-8.0.30-150400.4.49.1
* php8-ftp-debuginfo-8.0.30-150400.4.49.1
* php8-soap-debuginfo-8.0.30-150400.4.49.1
* php8-ctype-8.0.30-150400.4.49.1
* php8-curl-debuginfo-8.0.30-150400.4.49.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.49.1
* php8-tidy-debuginfo-8.0.30-150400.4.49.1
* php8-fpm-debuginfo-8.0.30-150400.4.49.1
* php8-mbstring-8.0.30-150400.4.49.1
* php8-snmp-8.0.30-150400.4.49.1
* php8-fpm-8.0.30-150400.4.49.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.49.1
* php8-sysvshm-8.0.30-150400.4.49.1
* php8-readline-8.0.30-150400.4.49.1
* php8-xmlreader-8.0.30-150400.4.49.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.49.1
* php8-sysvsem-8.0.30-150400.4.49.1
* php8-sodium-debuginfo-8.0.30-150400.4.49.1
* php8-exif-debuginfo-8.0.30-150400.4.49.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.49.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.49.1
* php8-xsl-8.0.30-150400.4.49.1
* php8-tidy-8.0.30-150400.4.49.1
* php8-opcache-debuginfo-8.0.30-150400.4.49.1
* php8-mysql-8.0.30-150400.4.49.1
* php8-intl-8.0.30-150400.4.49.1
* php8-odbc-8.0.30-150400.4.49.1
* php8-cli-8.0.30-150400.4.49.1
* php8-openssl-8.0.30-150400.4.49.1
* php8-embed-debugsource-8.0.30-150400.4.49.1
* php8-sockets-8.0.30-150400.4.49.1
* php8-gd-8.0.30-150400.4.49.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.49.1
* php8-odbc-debuginfo-8.0.30-150400.4.49.1
* php8-bz2-8.0.30-150400.4.49.1
* php8-pdo-debuginfo-8.0.30-150400.4.49.1
* php8-zlib-8.0.30-150400.4.49.1
* php8-opcache-8.0.30-150400.4.49.1
* php8-exif-8.0.30-150400.4.49.1
* php8-snmp-debuginfo-8.0.30-150400.4.49.1
* php8-sqlite-debuginfo-8.0.30-150400.4.49.1
* php8-8.0.30-150400.4.49.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.49.1
* php8-calendar-debuginfo-8.0.30-150400.4.49.1
* php8-bz2-debuginfo-8.0.30-150400.4.49.1
* php8-tokenizer-8.0.30-150400.4.49.1
* php8-gd-debuginfo-8.0.30-150400.4.49.1
* php8-ftp-8.0.30-150400.4.49.1
* php8-pdo-8.0.30-150400.4.49.1
* php8-embed-8.0.30-150400.4.49.1
* php8-debuginfo-8.0.30-150400.4.49.1
* php8-curl-8.0.30-150400.4.49.1
* php8-iconv-8.0.30-150400.4.49.1
* php8-phar-8.0.30-150400.4.49.1
* php8-fpm-debugsource-8.0.30-150400.4.49.1
* php8-test-8.0.30-150400.4.49.1
* php8-bcmath-8.0.30-150400.4.49.1
* php8-enchant-debuginfo-8.0.30-150400.4.49.1
* php8-ldap-debuginfo-8.0.30-150400.4.49.1
* php8-zip-debuginfo-8.0.30-150400.4.49.1
* php8-openssl-debuginfo-8.0.30-150400.4.49.1
* php8-gettext-8.0.30-150400.4.49.1
* php8-enchant-8.0.30-150400.4.49.1
* php8-debugsource-8.0.30-150400.4.49.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.49.1
* php8-dba-debuginfo-8.0.30-150400.4.49.1
* php8-readline-debuginfo-8.0.30-150400.4.49.1
* php8-xsl-debuginfo-8.0.30-150400.4.49.1
* php8-fileinfo-8.0.30-150400.4.49.1
* php8-pcntl-8.0.30-150400.4.49.1
* php8-xmlwriter-8.0.30-150400.4.49.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.49.1
* php8-sodium-8.0.30-150400.4.49.1
* php8-dom-debuginfo-8.0.30-150400.4.49.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.49.1
* php8-fastcgi-debugsource-8.0.30-150400.4.49.1
* php8-zlib-debuginfo-8.0.30-150400.4.49.1
* php8-fastcgi-8.0.30-150400.4.49.1
* php8-calendar-8.0.30-150400.4.49.1
* php8-ldap-8.0.30-150400.4.49.1
* php8-dba-8.0.30-150400.4.49.1
* php8-soap-8.0.30-150400.4.49.1
* php8-bcmath-debuginfo-8.0.30-150400.4.49.1
* php8-cli-debuginfo-8.0.30-150400.4.49.1
* php8-shmop-debuginfo-8.0.30-150400.4.49.1
* php8-devel-8.0.30-150400.4.49.1
* php8-pcntl-debuginfo-8.0.30-150400.4.49.1
* php8-posix-debuginfo-8.0.30-150400.4.49.1
* php8-sysvmsg-8.0.30-150400.4.49.1
* php8-posix-8.0.30-150400.4.49.1
* php8-pgsql-8.0.30-150400.4.49.1
* php8-pgsql-debuginfo-8.0.30-150400.4.49.1
* php8-sockets-debuginfo-8.0.30-150400.4.49.1
* php8-phar-debuginfo-8.0.30-150400.4.49.1
* php8-shmop-8.0.30-150400.4.49.1
* php8-embed-debuginfo-8.0.30-150400.4.49.1
* apache2-mod_php8-8.0.30-150400.4.49.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* php8-mbstring-debuginfo-8.0.30-150400.4.49.1
* php8-gmp-8.0.30-150400.4.49.1
* php8-gmp-debuginfo-8.0.30-150400.4.49.1
* php8-sqlite-8.0.30-150400.4.49.1
* php8-ctype-debuginfo-8.0.30-150400.4.49.1
* php8-gettext-debuginfo-8.0.30-150400.4.49.1
* php8-iconv-debuginfo-8.0.30-150400.4.49.1
* php8-dom-8.0.30-150400.4.49.1
* php8-mysql-debuginfo-8.0.30-150400.4.49.1
* php8-intl-debuginfo-8.0.30-150400.4.49.1
* php8-zip-8.0.30-150400.4.49.1
* php8-ftp-debuginfo-8.0.30-150400.4.49.1
* php8-soap-debuginfo-8.0.30-150400.4.49.1
* php8-ctype-8.0.30-150400.4.49.1
* php8-curl-debuginfo-8.0.30-150400.4.49.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.49.1
* php8-tidy-debuginfo-8.0.30-150400.4.49.1
* php8-fpm-debuginfo-8.0.30-150400.4.49.1
* php8-mbstring-8.0.30-150400.4.49.1
* php8-snmp-8.0.30-150400.4.49.1
* php8-fpm-8.0.30-150400.4.49.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.49.1
* php8-sysvshm-8.0.30-150400.4.49.1
* php8-readline-8.0.30-150400.4.49.1
* php8-xmlreader-8.0.30-150400.4.49.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.49.1
* php8-sysvsem-8.0.30-150400.4.49.1
* php8-sodium-debuginfo-8.0.30-150400.4.49.1
* php8-exif-debuginfo-8.0.30-150400.4.49.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.49.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.49.1
* php8-xsl-8.0.30-150400.4.49.1
* php8-tidy-8.0.30-150400.4.49.1
* php8-opcache-debuginfo-8.0.30-150400.4.49.1
* php8-mysql-8.0.30-150400.4.49.1
* php8-intl-8.0.30-150400.4.49.1
* php8-odbc-8.0.30-150400.4.49.1
* php8-cli-8.0.30-150400.4.49.1
* php8-openssl-8.0.30-150400.4.49.1
* php8-embed-debugsource-8.0.30-150400.4.49.1
* php8-sockets-8.0.30-150400.4.49.1
* php8-gd-8.0.30-150400.4.49.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.49.1
* php8-odbc-debuginfo-8.0.30-150400.4.49.1
* php8-bz2-8.0.30-150400.4.49.1
* php8-pdo-debuginfo-8.0.30-150400.4.49.1
* php8-zlib-8.0.30-150400.4.49.1
* php8-opcache-8.0.30-150400.4.49.1
* php8-exif-8.0.30-150400.4.49.1
* php8-snmp-debuginfo-8.0.30-150400.4.49.1
* php8-sqlite-debuginfo-8.0.30-150400.4.49.1
* php8-8.0.30-150400.4.49.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.49.1
* php8-calendar-debuginfo-8.0.30-150400.4.49.1
* php8-bz2-debuginfo-8.0.30-150400.4.49.1
* php8-tokenizer-8.0.30-150400.4.49.1
* php8-gd-debuginfo-8.0.30-150400.4.49.1
* php8-ftp-8.0.30-150400.4.49.1
* php8-pdo-8.0.30-150400.4.49.1
* php8-embed-8.0.30-150400.4.49.1
* php8-debuginfo-8.0.30-150400.4.49.1
* php8-curl-8.0.30-150400.4.49.1
* php8-iconv-8.0.30-150400.4.49.1
* php8-fpm-debugsource-8.0.30-150400.4.49.1
* php8-phar-8.0.30-150400.4.49.1
* php8-test-8.0.30-150400.4.49.1
* php8-bcmath-8.0.30-150400.4.49.1
* php8-enchant-debuginfo-8.0.30-150400.4.49.1
* php8-ldap-debuginfo-8.0.30-150400.4.49.1
* php8-zip-debuginfo-8.0.30-150400.4.49.1
* php8-openssl-debuginfo-8.0.30-150400.4.49.1
* php8-gettext-8.0.30-150400.4.49.1
* php8-enchant-8.0.30-150400.4.49.1
* php8-debugsource-8.0.30-150400.4.49.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.49.1
* php8-dba-debuginfo-8.0.30-150400.4.49.1
* php8-readline-debuginfo-8.0.30-150400.4.49.1
* php8-xsl-debuginfo-8.0.30-150400.4.49.1
* php8-fileinfo-8.0.30-150400.4.49.1
* php8-pcntl-8.0.30-150400.4.49.1
* php8-xmlwriter-8.0.30-150400.4.49.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.49.1
* php8-sodium-8.0.30-150400.4.49.1
* php8-dom-debuginfo-8.0.30-150400.4.49.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.49.1
* php8-fastcgi-debugsource-8.0.30-150400.4.49.1
* php8-zlib-debuginfo-8.0.30-150400.4.49.1
* php8-fastcgi-8.0.30-150400.4.49.1
* php8-calendar-8.0.30-150400.4.49.1
* php8-ldap-8.0.30-150400.4.49.1
* php8-dba-8.0.30-150400.4.49.1
* php8-soap-8.0.30-150400.4.49.1
* php8-bcmath-debuginfo-8.0.30-150400.4.49.1
* php8-cli-debuginfo-8.0.30-150400.4.49.1
* php8-shmop-debuginfo-8.0.30-150400.4.49.1
* php8-devel-8.0.30-150400.4.49.1
* php8-pcntl-debuginfo-8.0.30-150400.4.49.1
* php8-posix-debuginfo-8.0.30-150400.4.49.1
* php8-sysvmsg-8.0.30-150400.4.49.1
* php8-posix-8.0.30-150400.4.49.1
* php8-sockets-debuginfo-8.0.30-150400.4.49.1
* php8-pgsql-8.0.30-150400.4.49.1
* php8-pgsql-debuginfo-8.0.30-150400.4.49.1
* php8-phar-debuginfo-8.0.30-150400.4.49.1
* php8-shmop-8.0.30-150400.4.49.1
* php8-embed-debuginfo-8.0.30-150400.4.49.1
* apache2-mod_php8-8.0.30-150400.4.49.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* php8-mbstring-debuginfo-8.0.30-150400.4.49.1
* php8-gmp-8.0.30-150400.4.49.1
* php8-gmp-debuginfo-8.0.30-150400.4.49.1
* php8-sqlite-8.0.30-150400.4.49.1
* php8-ctype-debuginfo-8.0.30-150400.4.49.1
* php8-gettext-debuginfo-8.0.30-150400.4.49.1
* php8-iconv-debuginfo-8.0.30-150400.4.49.1
* php8-dom-8.0.30-150400.4.49.1
* php8-mysql-debuginfo-8.0.30-150400.4.49.1
* php8-intl-debuginfo-8.0.30-150400.4.49.1
* php8-zip-8.0.30-150400.4.49.1
* php8-ftp-debuginfo-8.0.30-150400.4.49.1
* php8-soap-debuginfo-8.0.30-150400.4.49.1
* php8-ctype-8.0.30-150400.4.49.1
* php8-curl-debuginfo-8.0.30-150400.4.49.1
* php8-sysvmsg-debuginfo-8.0.30-150400.4.49.1
* php8-tidy-debuginfo-8.0.30-150400.4.49.1
* php8-fpm-debuginfo-8.0.30-150400.4.49.1
* php8-mbstring-8.0.30-150400.4.49.1
* php8-snmp-8.0.30-150400.4.49.1
* php8-fpm-8.0.30-150400.4.49.1
* php8-xmlreader-debuginfo-8.0.30-150400.4.49.1
* php8-sysvshm-8.0.30-150400.4.49.1
* php8-readline-8.0.30-150400.4.49.1
* php8-xmlreader-8.0.30-150400.4.49.1
* apache2-mod_php8-debuginfo-8.0.30-150400.4.49.1
* php8-sysvsem-8.0.30-150400.4.49.1
* php8-sodium-debuginfo-8.0.30-150400.4.49.1
* php8-exif-debuginfo-8.0.30-150400.4.49.1
* php8-fileinfo-debuginfo-8.0.30-150400.4.49.1
* apache2-mod_php8-debugsource-8.0.30-150400.4.49.1
* php8-xsl-8.0.30-150400.4.49.1
* php8-tidy-8.0.30-150400.4.49.1
* php8-opcache-debuginfo-8.0.30-150400.4.49.1
* php8-mysql-8.0.30-150400.4.49.1
* php8-intl-8.0.30-150400.4.49.1
* php8-odbc-8.0.30-150400.4.49.1
* php8-cli-8.0.30-150400.4.49.1
* php8-openssl-8.0.30-150400.4.49.1
* php8-embed-debugsource-8.0.30-150400.4.49.1
* php8-sockets-8.0.30-150400.4.49.1
* php8-gd-8.0.30-150400.4.49.1
* php8-sysvshm-debuginfo-8.0.30-150400.4.49.1
* php8-odbc-debuginfo-8.0.30-150400.4.49.1
* php8-bz2-8.0.30-150400.4.49.1
* php8-pdo-debuginfo-8.0.30-150400.4.49.1
* php8-zlib-8.0.30-150400.4.49.1
* php8-opcache-8.0.30-150400.4.49.1
* php8-exif-8.0.30-150400.4.49.1
* php8-snmp-debuginfo-8.0.30-150400.4.49.1
* php8-sqlite-debuginfo-8.0.30-150400.4.49.1
* php8-8.0.30-150400.4.49.1
* php8-fastcgi-debuginfo-8.0.30-150400.4.49.1
* php8-calendar-debuginfo-8.0.30-150400.4.49.1
* php8-bz2-debuginfo-8.0.30-150400.4.49.1
* php8-tokenizer-8.0.30-150400.4.49.1
* php8-gd-debuginfo-8.0.30-150400.4.49.1
* php8-ftp-8.0.30-150400.4.49.1
* php8-pdo-8.0.30-150400.4.49.1
* php8-embed-8.0.30-150400.4.49.1
* php8-debuginfo-8.0.30-150400.4.49.1
* php8-curl-8.0.30-150400.4.49.1
* php8-iconv-8.0.30-150400.4.49.1
* php8-fpm-debugsource-8.0.30-150400.4.49.1
* php8-phar-8.0.30-150400.4.49.1
* php8-test-8.0.30-150400.4.49.1
* php8-bcmath-8.0.30-150400.4.49.1
* php8-enchant-debuginfo-8.0.30-150400.4.49.1
* php8-ldap-debuginfo-8.0.30-150400.4.49.1
* php8-zip-debuginfo-8.0.30-150400.4.49.1
* php8-openssl-debuginfo-8.0.30-150400.4.49.1
* php8-gettext-8.0.30-150400.4.49.1
* php8-enchant-8.0.30-150400.4.49.1
* php8-debugsource-8.0.30-150400.4.49.1
* php8-sysvsem-debuginfo-8.0.30-150400.4.49.1
* php8-dba-debuginfo-8.0.30-150400.4.49.1
* php8-readline-debuginfo-8.0.30-150400.4.49.1
* php8-xsl-debuginfo-8.0.30-150400.4.49.1
* php8-fileinfo-8.0.30-150400.4.49.1
* php8-pcntl-8.0.30-150400.4.49.1
* php8-xmlwriter-8.0.30-150400.4.49.1
* php8-tokenizer-debuginfo-8.0.30-150400.4.49.1
* php8-sodium-8.0.30-150400.4.49.1
* php8-dom-debuginfo-8.0.30-150400.4.49.1
* php8-xmlwriter-debuginfo-8.0.30-150400.4.49.1
* php8-fastcgi-debugsource-8.0.30-150400.4.49.1
* php8-zlib-debuginfo-8.0.30-150400.4.49.1
* php8-fastcgi-8.0.30-150400.4.49.1
* php8-calendar-8.0.30-150400.4.49.1
* php8-ldap-8.0.30-150400.4.49.1
* php8-dba-8.0.30-150400.4.49.1
* php8-soap-8.0.30-150400.4.49.1
* php8-bcmath-debuginfo-8.0.30-150400.4.49.1
* php8-cli-debuginfo-8.0.30-150400.4.49.1
* php8-shmop-debuginfo-8.0.30-150400.4.49.1
* php8-devel-8.0.30-150400.4.49.1
* php8-pcntl-debuginfo-8.0.30-150400.4.49.1
* php8-posix-debuginfo-8.0.30-150400.4.49.1
* php8-sysvmsg-8.0.30-150400.4.49.1
* php8-posix-8.0.30-150400.4.49.1
* php8-sockets-debuginfo-8.0.30-150400.4.49.1
* php8-pgsql-8.0.30-150400.4.49.1
* php8-pgsql-debuginfo-8.0.30-150400.4.49.1
* php8-phar-debuginfo-8.0.30-150400.4.49.1
* php8-shmop-8.0.30-150400.4.49.1
* php8-embed-debuginfo-8.0.30-150400.4.49.1
* apache2-mod_php8-8.0.30-150400.4.49.1
## References:
* https://www.suse.com/security/cve/CVE-2024-11233.html
* https://www.suse.com/security/cve/CVE-2024-11234.html
* https://www.suse.com/security/cve/CVE-2024-8929.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233651
* https://bugzilla.suse.com/show_bug.cgi?id=1233702
* https://bugzilla.suse.com/show_bug.cgi?id=1233703
1
0
SUSE-SU-2024:4214-1: important: Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4214-1
Release Date: 2024-12-05T17:03:54Z
Rating: important
References:
* bsc#1220145
* bsc#1220832
* bsc#1221302
* bsc#1222685
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52502
* CVE-2023-52752
* CVE-2023-52846
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35949
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 30 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_52 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2022-48662: Update for 'really move i915_gem_context.link under ref
protection' (bsc#1223521)
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220832).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4214=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4214=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-9-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_11-debugsource-9-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_52-default-9-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-9-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_11-debugsource-9-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_52-default-9-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220832
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4216-1: important: Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4216-1
Release Date: 2024-12-05T17:33:37Z
Rating: important
References:
* bsc#1221302
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26610
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35949
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 25 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_59 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2022-48662: Update for 'really move i915_gem_context.link under ref
protection' (bsc#1223521)
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4216=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4216=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-9-150500.11.10.1
* kernel-livepatch-5_14_21-150500_55_59-default-9-150500.11.10.1
* kernel-livepatch-SLE15-SP5_Update_12-debugsource-9-150500.11.10.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-9-150500.11.10.1
* kernel-livepatch-5_14_21-150500_55_59-default-9-150500.11.10.1
* kernel-livepatch-SLE15-SP5_Update_12-debugsource-9-150500.11.10.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4217-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)
Announcement ID: SUSE-SU-2024:4217-1
Release Date: 2024-12-05T18:03:45Z
Rating: important
References:
* bsc#1225733
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2024-35949
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_21 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4217=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4217=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_0-debugsource-7-150600.4.13.1
* kernel-livepatch-6_4_0-150600_21-default-7-150600.4.13.1
* kernel-livepatch-6_4_0-150600_21-default-debuginfo-7-150600.4.13.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_0-debugsource-7-150600.4.13.1
* kernel-livepatch-6_4_0-150600_21-default-7-150600.4.13.1
* kernel-livepatch-6_4_0-150600_21-default-debuginfo-7-150600.4.13.1
## References:
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
openSUSE-RU-2024:0393-1: moderate: Recommended update for tryton, trytond, trytond_account_invoice_stock, trytond_party, trytond_purchase, trytond_stock, trytond_stock_supply
by maintenance@opensuse.org 05 Dec '24
by maintenance@opensuse.org 05 Dec '24
05 Dec '24
openSUSE Recommended Update: Recommended update for tryton, trytond, trytond_account_invoice_stock, trytond_party, trytond_purchase, trytond_stock, trytond_stock_supply
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0393-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for tryton, trytond, trytond_account_invoice_stock,
trytond_party, trytond_purchase, trytond_stock, trytond_stock_supply fixes
the following issues:
Changes in tryton:
- Version 6.0.46 - Bugfix Release
Changes in trytond:
- Version 6.0.55 - Bugfix Release
- Version 6.0.53 - Bugfix Release
Changes in trytond_account_invoice_stock:
- Version 6.0.4 - Bugfix Release
- sources are not signed anymore
Changes in trytond_stock_supply:
- Version 6.0.10 - Bugfix Release
Changes in trytond_stock:
- Version 6.0.30 - Bugfix Release
- Version 6.0.29 - Bugfix Release
Changes in trytond_party:
- Version 6.0.7 - Bugfix Release
Changes in trytond_purchase:
- Version 6.0.19 - Bugfix Release
- Version 6.0.18 - Bugfix Release
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-393=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
tryton-6.0.46-bp156.2.12.1
trytond-6.0.55-bp156.2.12.1
trytond_account_invoice_stock-6.0.4-bp156.2.3.1
trytond_party-6.0.7-bp156.2.3.1
trytond_purchase-6.0.19-bp156.2.9.1
trytond_stock-6.0.30-bp156.2.6.1
trytond_stock_supply-6.0.10-bp156.2.6.1
References:
1
0
# Security update for avahi
Announcement ID: SUSE-SU-2024:4196-1
Release Date: 2024-12-05T12:56:23Z
Rating: moderate
References:
* bsc#1233420
Cross-References:
* CVE-2024-52616
CVSS scores:
* CVE-2024-52616 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52616 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-52616 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for avahi fixes the following issues:
* CVE-2024-52616: Fixed Avahi Wide-Area DNS Predictable Transaction IDs
(bsc#1233420)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4196=1 openSUSE-SLE-15.6-2024-4196=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4196=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4196=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4196=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libavahi-libevent1-0.8-150600.15.6.1
* libavahi-glib1-debuginfo-0.8-150600.15.6.1
* libavahi-gobject-devel-0.8-150600.15.6.1
* avahi-autoipd-debuginfo-0.8-150600.15.6.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.6.1
* libavahi-core7-0.8-150600.15.6.1
* avahi-qt5-debugsource-0.8-150600.15.6.1
* avahi-compat-howl-devel-0.8-150600.15.6.1
* libavahi-gobject0-0.8-150600.15.6.1
* avahi-0.8-150600.15.6.1
* avahi-utils-debuginfo-0.8-150600.15.6.1
* avahi-debuginfo-0.8-150600.15.6.1
* libdns_sd-debuginfo-0.8-150600.15.6.1
* libavahi-common3-0.8-150600.15.6.1
* libavahi-client3-0.8-150600.15.6.1
* python3-avahi-0.8-150600.15.6.1
* libavahi-glib1-0.8-150600.15.6.1
* libavahi-ui-gtk3-0-0.8-150600.15.6.1
* avahi-utils-gtk-0.8-150600.15.6.1
* avahi-debugsource-0.8-150600.15.6.1
* avahi-glib2-debugsource-0.8-150600.15.6.1
* libavahi-client3-debuginfo-0.8-150600.15.6.1
* avahi-autoipd-0.8-150600.15.6.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.6.1
* avahi-utils-0.8-150600.15.6.1
* libdns_sd-0.8-150600.15.6.1
* python3-avahi-gtk-0.8-150600.15.6.1
* libavahi-libevent1-debuginfo-0.8-150600.15.6.1
* libhowl0-0.8-150600.15.6.1
* libavahi-qt5-1-debuginfo-0.8-150600.15.6.1
* libavahi-qt5-devel-0.8-150600.15.6.1
* libavahi-common3-debuginfo-0.8-150600.15.6.1
* libavahi-devel-0.8-150600.15.6.1
* libavahi-qt5-1-0.8-150600.15.6.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.6.1
* libavahi-gobject0-debuginfo-0.8-150600.15.6.1
* libhowl0-debuginfo-0.8-150600.15.6.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.6.1
* libavahi-glib-devel-0.8-150600.15.6.1
* libavahi-core7-debuginfo-0.8-150600.15.6.1
* openSUSE Leap 15.6 (x86_64)
* libavahi-glib1-32bit-0.8-150600.15.6.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.6.1
* libavahi-client3-32bit-0.8-150600.15.6.1
* avahi-32bit-debuginfo-0.8-150600.15.6.1
* libdns_sd-32bit-debuginfo-0.8-150600.15.6.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.6.1
* libavahi-common3-32bit-0.8-150600.15.6.1
* libdns_sd-32bit-0.8-150600.15.6.1
* libavahi-glib1-32bit-debuginfo-0.8-150600.15.6.1
* openSUSE Leap 15.6 (noarch)
* avahi-lang-0.8-150600.15.6.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavahi-common3-64bit-debuginfo-0.8-150600.15.6.1
* libavahi-client3-64bit-debuginfo-0.8-150600.15.6.1
* libavahi-glib1-64bit-0.8-150600.15.6.1
* avahi-64bit-debuginfo-0.8-150600.15.6.1
* libdns_sd-64bit-0.8-150600.15.6.1
* libavahi-glib1-64bit-debuginfo-0.8-150600.15.6.1
* libdns_sd-64bit-debuginfo-0.8-150600.15.6.1
* libavahi-common3-64bit-0.8-150600.15.6.1
* libavahi-client3-64bit-0.8-150600.15.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libavahi-libevent1-0.8-150600.15.6.1
* libavahi-glib1-debuginfo-0.8-150600.15.6.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.6.1
* libavahi-core7-0.8-150600.15.6.1
* avahi-compat-howl-devel-0.8-150600.15.6.1
* libavahi-gobject0-0.8-150600.15.6.1
* avahi-0.8-150600.15.6.1
* avahi-utils-debuginfo-0.8-150600.15.6.1
* avahi-debuginfo-0.8-150600.15.6.1
* libdns_sd-debuginfo-0.8-150600.15.6.1
* libavahi-common3-0.8-150600.15.6.1
* libavahi-client3-0.8-150600.15.6.1
* libavahi-glib1-0.8-150600.15.6.1
* libavahi-ui-gtk3-0-0.8-150600.15.6.1
* avahi-debugsource-0.8-150600.15.6.1
* avahi-glib2-debugsource-0.8-150600.15.6.1
* libavahi-client3-debuginfo-0.8-150600.15.6.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.6.1
* avahi-utils-0.8-150600.15.6.1
* libdns_sd-0.8-150600.15.6.1
* libavahi-libevent1-debuginfo-0.8-150600.15.6.1
* libhowl0-0.8-150600.15.6.1
* libavahi-common3-debuginfo-0.8-150600.15.6.1
* libavahi-devel-0.8-150600.15.6.1
* libavahi-gobject0-debuginfo-0.8-150600.15.6.1
* libhowl0-debuginfo-0.8-150600.15.6.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.6.1
* libavahi-glib-devel-0.8-150600.15.6.1
* libavahi-core7-debuginfo-0.8-150600.15.6.1
* Basesystem Module 15-SP6 (noarch)
* avahi-lang-0.8-150600.15.6.1
* Basesystem Module 15-SP6 (x86_64)
* libavahi-common3-32bit-debuginfo-0.8-150600.15.6.1
* libavahi-client3-32bit-0.8-150600.15.6.1
* avahi-32bit-debuginfo-0.8-150600.15.6.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.6.1
* libavahi-common3-32bit-0.8-150600.15.6.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-utils-gtk-0.8-150600.15.6.1
* avahi-debugsource-0.8-150600.15.6.1
* avahi-glib2-debugsource-0.8-150600.15.6.1
* avahi-autoipd-0.8-150600.15.6.1
* avahi-debuginfo-0.8-150600.15.6.1
* libavahi-gobject-devel-0.8-150600.15.6.1
* avahi-autoipd-debuginfo-0.8-150600.15.6.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.6.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* avahi-debuginfo-0.8-150600.15.6.1
* python3-avahi-0.8-150600.15.6.1
* avahi-debugsource-0.8-150600.15.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52616.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233420
1
0
SUSE-RU-2024:4198-1: moderate: Recommended update for libsolv, libzypp, zypper
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Recommended update for libsolv, libzypp, zypper
Announcement ID: SUSE-RU-2024:4198-1
Release Date: 2024-12-05T13:46:42Z
Rating: moderate
References:
* bsc#1225451
* bsc#1233393
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for libsolv, libzypp, zypper fixes the following issues:
* Fix replaces_installed_package using the wrong solvable id when checking the
noupdate map
* Make POOL_FLAG_ADDFILEPROVIDESFILTERED behaviour more standard
* Add rpm_query_idarray query function
* Support rpm's "orderwithrequires" dependency
* BuildCache: Don't try to retrieve missing raw metadata if no permission to
write the cache (bsc#1225451)
* RepoManager: Throw RepoNoPermissionException if the user has no permission
to update(write) the caches (bsc#1225451)
* The 20MB download limit must not apply to non-metadata files like package
URLs provided via the CLI (bsc#1233393)
* Don't try to download missing raw metadata if cache is not writable
(bsc#1225451)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4198=1 openSUSE-SLE-15.5-2024-4198=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4198=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4198=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4198=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4198=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4198=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4198=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4198=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4198=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libsolv-tools-base-debuginfo-0.7.31-150500.6.5.1
* ruby-solv-0.7.31-150500.6.5.1
* libzypp-debugsource-17.35.14-150500.6.24.1
* libsolv-tools-0.7.31-150500.6.5.1
* perl-solv-debuginfo-0.7.31-150500.6.5.1
* ruby-solv-debuginfo-0.7.31-150500.6.5.1
* python311-solv-0.7.31-150500.6.5.1
* libzypp-devel-17.35.14-150500.6.24.1
* libzypp-17.35.14-150500.6.24.1
* libsolv-debugsource-0.7.31-150500.6.5.1
* libsolv-debuginfo-0.7.31-150500.6.5.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libzypp-devel-doc-17.35.14-150500.6.24.1
* zypper-1.14.78-150500.6.14.1
* python311-solv-debuginfo-0.7.31-150500.6.5.1
* libsolv-tools-debuginfo-0.7.31-150500.6.5.1
* zypper-debuginfo-1.14.78-150500.6.14.1
* python3-solv-0.7.31-150500.6.5.1
* libzypp-debuginfo-17.35.14-150500.6.24.1
* libsolv-devel-debuginfo-0.7.31-150500.6.5.1
* libsolv-devel-0.7.31-150500.6.5.1
* python3-solv-debuginfo-0.7.31-150500.6.5.1
* perl-solv-0.7.31-150500.6.5.1
* libsolv-demo-0.7.31-150500.6.5.1
* zypper-debugsource-1.14.78-150500.6.14.1
* libsolv-demo-debuginfo-0.7.31-150500.6.5.1
* openSUSE Leap 15.5 (noarch)
* zypper-aptitude-1.14.78-150500.6.14.1
* zypper-log-1.14.78-150500.6.14.1
* zypper-needs-restarting-1.14.78-150500.6.14.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* zypper-1.14.78-150500.6.14.1
* libsolv-tools-debuginfo-0.7.31-150500.6.5.1
* zypper-debuginfo-1.14.78-150500.6.14.1
* libzypp-debuginfo-17.35.14-150500.6.24.1
* zypper-debugsource-1.14.78-150500.6.14.1
* libzypp-17.35.14-150500.6.24.1
* libsolv-debugsource-0.7.31-150500.6.5.1
* libsolv-debuginfo-0.7.31-150500.6.5.1
* libzypp-debugsource-17.35.14-150500.6.24.1
* libsolv-tools-0.7.31-150500.6.5.1
* openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-debuginfo-0.7.31-150500.6.5.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* openSUSE Leap Micro 5.5 (noarch)
* zypper-needs-restarting-1.14.78-150500.6.14.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libzypp-17.35.14-150500.6.24.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libsolv-tools-0.7.31-150500.6.5.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.14-150500.6.24.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libsolv-tools-0.7.31-150500.6.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libzypp-17.35.14-150500.6.24.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libsolv-tools-0.7.31-150500.6.5.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libzypp-17.35.14-150500.6.24.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libsolv-tools-0.7.31-150500.6.5.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* zypper-1.14.78-150500.6.14.1
* libsolv-tools-base-debuginfo-0.7.31-150500.6.5.1
* libsolv-tools-debuginfo-0.7.31-150500.6.5.1
* zypper-debuginfo-1.14.78-150500.6.14.1
* libzypp-debuginfo-17.35.14-150500.6.24.1
* zypper-debugsource-1.14.78-150500.6.14.1
* libzypp-17.35.14-150500.6.24.1
* libsolv-debugsource-0.7.31-150500.6.5.1
* libsolv-debuginfo-0.7.31-150500.6.5.1
* libzypp-debugsource-17.35.14-150500.6.24.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libsolv-tools-0.7.31-150500.6.5.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* zypper-needs-restarting-1.14.78-150500.6.14.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ruby-solv-0.7.31-150500.6.5.1
* ruby-solv-debuginfo-0.7.31-150500.6.5.1
* zypper-1.14.78-150500.6.14.1
* libsolv-tools-base-debuginfo-0.7.31-150500.6.5.1
* python3-solv-debuginfo-0.7.31-150500.6.5.1
* libsolv-tools-debuginfo-0.7.31-150500.6.5.1
* zypper-debuginfo-1.14.78-150500.6.14.1
* python3-solv-0.7.31-150500.6.5.1
* libzypp-devel-17.35.14-150500.6.24.1
* libzypp-debuginfo-17.35.14-150500.6.24.1
* zypper-debugsource-1.14.78-150500.6.14.1
* libsolv-devel-debuginfo-0.7.31-150500.6.5.1
* libzypp-17.35.14-150500.6.24.1
* libsolv-tools-base-0.7.31-150500.6.5.1
* libsolv-debugsource-0.7.31-150500.6.5.1
* libsolv-debuginfo-0.7.31-150500.6.5.1
* libzypp-debugsource-17.35.14-150500.6.24.1
* libsolv-devel-0.7.31-150500.6.5.1
* libsolv-tools-0.7.31-150500.6.5.1
* Basesystem Module 15-SP5 (noarch)
* zypper-log-1.14.78-150500.6.14.1
* zypper-needs-restarting-1.14.78-150500.6.14.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libsolv-debuginfo-0.7.31-150500.6.5.1
* perl-solv-debuginfo-0.7.31-150500.6.5.1
* perl-solv-0.7.31-150500.6.5.1
* libsolv-debugsource-0.7.31-150500.6.5.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1225451
* https://bugzilla.suse.com/show_bug.cgi?id=1233393
1
0
SUSE-RU-2024:4200-1: moderate: Recommended update for libsolv, libzypp, zypper
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Recommended update for libsolv, libzypp, zypper
Announcement ID: SUSE-RU-2024:4200-1
Release Date: 2024-12-05T13:48:51Z
Rating: moderate
References:
* bsc#1225451
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for libsolv, libzypp, zypper fixes the following issues:
* Fix replaces_installed_package using the wrong solvable id when checking the
noupdate map
* Make POOL_FLAG_ADDFILEPROVIDESFILTERED behaviour more standard
* Add rpm_query_idarray query function
* Support rpm's "orderwithrequires" dependency
* BuildCache: Don't try to retrieve missing raw metadata if no permission to
write the cache (bsc#1225451)
* RepoManager: Throw RepoNoPermissionException if the user has no permission
to update(write) the caches (bsc#1225451)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4200=1 openSUSE-SLE-15.6-2024-4200=1
* SUSE Linux Enterprise High Performance Computing 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4200=1
* SUSE Linux Enterprise Server 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4200=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4200=1
* SUSE Linux Enterprise Desktop 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4200=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4200=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4200=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python311-solv-debuginfo-0.7.31-150600.8.7.2
* zypper-debugsource-1.14.78-150600.10.16.3
* perl-solv-0.7.31-150600.8.7.2
* libzypp-debuginfo-17.35.14-150600.3.32.2
* libsolv-demo-debuginfo-0.7.31-150600.8.7.2
* perl-solv-debuginfo-0.7.31-150600.8.7.2
* libsolv-demo-0.7.31-150600.8.7.2
* ruby-solv-0.7.31-150600.8.7.2
* libzypp-debugsource-17.35.14-150600.3.32.2
* ruby-solv-debuginfo-0.7.31-150600.8.7.2
* libsolv-devel-0.7.31-150600.8.7.2
* python311-solv-0.7.31-150600.8.7.2
* libsolv-debugsource-0.7.31-150600.8.7.2
* libsolv-devel-debuginfo-0.7.31-150600.8.7.2
* zypper-1.14.78-150600.10.16.3
* libsolv-debuginfo-0.7.31-150600.8.7.2
* libsolv-tools-base-0.7.31-150600.8.7.2
* zypper-debuginfo-1.14.78-150600.10.16.3
* libsolv-tools-base-debuginfo-0.7.31-150600.8.7.2
* python3-solv-0.7.31-150600.8.7.2
* libsolv-tools-0.7.31-150600.8.7.2
* libsolv-tools-debuginfo-0.7.31-150600.8.7.2
* libzypp-devel-17.35.14-150600.3.32.2
* libzypp-devel-doc-17.35.14-150600.3.32.2
* python3-solv-debuginfo-0.7.31-150600.8.7.2
* libzypp-17.35.14-150600.3.32.2
* openSUSE Leap 15.6 (noarch)
* zypper-log-1.14.78-150600.10.16.3
* zypper-aptitude-1.14.78-150600.10.16.3
* zypper-needs-restarting-1.14.78-150600.10.16.3
* SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64)
* libsolv-tools-base-0.7.31-150600.8.7.2
* libsolv-tools-0.7.31-150600.8.7.2
* libzypp-17.35.14-150600.3.32.2
* SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.31-150600.8.7.2
* libsolv-tools-0.7.31-150600.8.7.2
* libzypp-17.35.14-150600.3.32.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsolv-tools-base-0.7.31-150600.8.7.2
* libsolv-tools-0.7.31-150600.8.7.2
* libzypp-17.35.14-150600.3.32.2
* SUSE Linux Enterprise Desktop 15 SP6 (x86_64)
* libsolv-tools-base-0.7.31-150600.8.7.2
* libsolv-tools-0.7.31-150600.8.7.2
* libzypp-17.35.14-150600.3.32.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libzypp-debuginfo-17.35.14-150600.3.32.2
* python3-solv-0.7.31-150600.8.7.2
* libsolv-tools-0.7.31-150600.8.7.2
* zypper-debugsource-1.14.78-150600.10.16.3
* libzypp-debugsource-17.35.14-150600.3.32.2
* ruby-solv-0.7.31-150600.8.7.2
* libsolv-devel-0.7.31-150600.8.7.2
* libsolv-tools-debuginfo-0.7.31-150600.8.7.2
* libsolv-debugsource-0.7.31-150600.8.7.2
* libsolv-devel-debuginfo-0.7.31-150600.8.7.2
* libzypp-devel-17.35.14-150600.3.32.2
* zypper-1.14.78-150600.10.16.3
* libsolv-debuginfo-0.7.31-150600.8.7.2
* zypper-debuginfo-1.14.78-150600.10.16.3
* libsolv-tools-base-0.7.31-150600.8.7.2
* ruby-solv-debuginfo-0.7.31-150600.8.7.2
* python3-solv-debuginfo-0.7.31-150600.8.7.2
* libzypp-17.35.14-150600.3.32.2
* Basesystem Module 15-SP6 (noarch)
* zypper-log-1.14.78-150600.10.16.3
* zypper-needs-restarting-1.14.78-150600.10.16.3
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* perl-solv-debuginfo-0.7.31-150600.8.7.2
* libsolv-debugsource-0.7.31-150600.8.7.2
* perl-solv-0.7.31-150600.8.7.2
* libsolv-debuginfo-0.7.31-150600.8.7.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1225451
1
0
SUSE-RU-2024:4201-1: moderate: Recommended update for libsolv, libzypp, zypper
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Recommended update for libsolv, libzypp, zypper
Announcement ID: SUSE-RU-2024:4201-1
Release Date: 2024-12-05T13:49:49Z
Rating: moderate
References:
* bsc#1225451
* bsc#1233393
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for libsolv, libzypp, zypper fixes the following issues:
* Fix replaces_installed_package using the wrong solvable id when checking the
noupdate map
* Make POOL_FLAG_ADDFILEPROVIDESFILTERED behaviour more standard
* Add rpm_query_idarray query function
* Support rpm's "orderwithrequires" dependency
* BuildCache: Don't try to retrieve missing raw metadata if no permission to
write the cache (bsc#1225451)
* RepoManager: Throw RepoNoPermissionException if the user has no permission
to update(write) the caches (bsc#1225451)
* The 20MB download limit must not apply to non-metadata files like package
URLs provided via the CLI (bsc#1233393)
* Don't try to download missing raw metadata if cache is not writable
(bsc#1225451)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4201=1 SUSE-
SLE-INSTALLER-15-SP4-2024-4201=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4201=1 SUSE-SLE-Product-SUSE-
Manager-Retail-Branch-Server-4.3-2024-4201=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4201=1 SUSE-SLE-Product-SUSE-
Manager-Server-4.3-2024-4201=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4201=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4201=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4201=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4201=1 SUSE-SLE-Product-
SLES_SAP-15-SP4-2024-4201=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4201=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4201=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4201=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4201=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4201=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4201=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4201=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4201=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4201=1
## Package List:
* SUSE Manager Proxy 4.3 (x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-devel-0.7.31-150400.3.32.2
* ruby-solv-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* SUSE Manager Proxy 4.3 (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-devel-0.7.31-150400.3.32.2
* ruby-solv-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-devel-0.7.31-150400.3.32.2
* ruby-solv-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* SUSE Manager Server 4.3 (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libzypp-devel-doc-17.35.14-150400.3.98.2
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* perl-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-0.7.31-150400.3.32.2
* perl-solv-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* zypper-debugsource-1.14.78-150400.3.67.3
* libsolv-demo-debuginfo-0.7.31-150400.3.32.2
* python3-solv-0.7.31-150400.3.32.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* python311-solv-debuginfo-0.7.31-150400.3.32.2
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* libsolv-demo-0.7.31-150400.3.32.2
* libzypp-debuginfo-17.35.14-150400.3.98.2
* python311-solv-0.7.31-150400.3.32.2
* ruby-solv-0.7.31-150400.3.32.2
* openSUSE Leap 15.4 (noarch)
* zypper-aptitude-1.14.78-150400.3.67.3
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64)
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le)
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* perl-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-0.7.31-150400.3.32.2
* perl-solv-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* libzypp-debuginfo-17.35.14-150400.3.98.2
* ruby-solv-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro 5.3 (noarch)
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* libzypp-debuginfo-17.35.14-150400.3.98.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* zypper-debugsource-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Micro 5.4 (noarch)
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* perl-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-0.7.31-150400.3.32.2
* perl-solv-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* libzypp-debuginfo-17.35.14-150400.3.98.2
* ruby-solv-0.7.31-150400.3.32.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* perl-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-0.7.31-150400.3.32.2
* perl-solv-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* libzypp-debuginfo-17.35.14-150400.3.98.2
* ruby-solv-0.7.31-150400.3.32.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* perl-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-0.7.31-150400.3.32.2
* perl-solv-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* libzypp-debuginfo-17.35.14-150400.3.98.2
* ruby-solv-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.14-150400.3.98.2
* libsolv-debugsource-0.7.31-150400.3.32.2
* libsolv-tools-base-0.7.31-150400.3.32.2
* libzypp-devel-17.35.14-150400.3.98.2
* libsolv-tools-base-debuginfo-0.7.31-150400.3.32.2
* perl-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-debuginfo-0.7.31-150400.3.32.2
* libzypp-debugsource-17.35.14-150400.3.98.2
* python3-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-debuginfo-0.7.31-150400.3.32.2
* libsolv-devel-0.7.31-150400.3.32.2
* perl-solv-0.7.31-150400.3.32.2
* zypper-1.14.78-150400.3.67.3
* zypper-debugsource-1.14.78-150400.3.67.3
* python3-solv-0.7.31-150400.3.32.2
* libsolv-debuginfo-0.7.31-150400.3.32.2
* zypper-debuginfo-1.14.78-150400.3.67.3
* ruby-solv-debuginfo-0.7.31-150400.3.32.2
* libsolv-tools-0.7.31-150400.3.32.2
* libzypp-debuginfo-17.35.14-150400.3.98.2
* ruby-solv-0.7.31-150400.3.32.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* zypper-log-1.14.78-150400.3.67.3
* zypper-needs-restarting-1.14.78-150400.3.67.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1225451
* https://bugzilla.suse.com/show_bug.cgi?id=1233393
1
0
SUSE-SU-2024:4202-1: moderate: Security update for java-1_8_0-openjdk
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for java-1_8_0-openjdk
Announcement ID: SUSE-SU-2024:4202-1
Release Date: 2024-12-05T14:03:50Z
Rating: moderate
References:
* bsc#1231702
* bsc#1231711
* bsc#1231716
* bsc#1231719
Cross-References:
* CVE-2024-21208
* CVE-2024-21210
* CVE-2024-21217
* CVE-2024-21235
CVSS scores:
* CVE-2024-21208 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21210 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21217 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21235 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for java-1_8_0-openjdk fixes the following issues:
Update to version jdk8u432 (icedtea-3.33.0): \- CVE-2024-21208: Fixed partial
DoS in component Networking (bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed
unauthorized update, insert or delete access to some of Oracle Java SE
accessible data in component Hotspot (bsc#1231711,JDK-8328544) \-
CVE-2024-21217: Fixed partial DoS in component Serialization
(bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized read/write
access to data in component Hotspot (bsc#1231719,JDK-8332644)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4202=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4202=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4202=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4202=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4202=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4202=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4202=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4202=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4202=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4202=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4202=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4202=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4202=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4202=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-src-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-accessibility-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* openSUSE Leap 15.5 (noarch)
* java-1_8_0-openjdk-javadoc-1.8.0.432-150000.3.100.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-src-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-accessibility-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openjdk-javadoc-1.8.0.432-150000.3.100.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debuginfo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-debugsource-1.8.0.432-150000.3.100.1
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.432-150000.3.100.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21208.html
* https://www.suse.com/security/cve/CVE-2024-21210.html
* https://www.suse.com/security/cve/CVE-2024-21217.html
* https://www.suse.com/security/cve/CVE-2024-21235.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231702
* https://bugzilla.suse.com/show_bug.cgi?id=1231711
* https://bugzilla.suse.com/show_bug.cgi?id=1231716
* https://bugzilla.suse.com/show_bug.cgi?id=1231719
1
0
05 Dec '24
# Security update for docker-stable
Announcement ID: SUSE-SU-2024:4204-1
Release Date: 2024-12-05T14:57:55Z
Rating: important
References:
* bsc#1214855
* bsc#1221916
* bsc#1228324
* bsc#1230331
* bsc#1230333
* bsc#1231348
Cross-References:
* CVE-2024-41110
CVSS scores:
* CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has five security fixes can now be
installed.
## Description:
This update for docker-stable fixes the following issues:
* CVE-2024-41110: Fixed Authz zero length regression (bsc#1228324).
Bug fixes:
* Allow users to disable SUSE secrets support by setting
DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker (bsc#1231348).
* Import specfile changes for docker-buildx as well as the changes to help
reduce specfile differences between docker-stable and docker (bsc#1230331,
bsc#1230333).
* Fix BuildKit's symlink resolution logic to correctly handle non-lexical
symlinks (bsc#1221916).
* Write volume options atomically so sudden system crashes won't result in
future Docker starts failing due to empty files (bsc#1214855).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4204=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4204=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4204=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4204=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-4204=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-4204=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4204=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4204=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4204=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4204=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4204=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4204=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Enterprise Storage 7.1 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* openSUSE Leap 15.5 (noarch)
* docker-stable-fish-completion-24.0.9_ce-150000.1.5.1
* docker-stable-zsh-completion-24.0.9_ce-150000.1.5.1
* docker-stable-rootless-extras-24.0.9_ce-150000.1.5.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* openSUSE Leap 15.6 (noarch)
* docker-stable-fish-completion-24.0.9_ce-150000.1.5.1
* docker-stable-zsh-completion-24.0.9_ce-150000.1.5.1
* docker-stable-rootless-extras-24.0.9_ce-150000.1.5.1
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* Containers Module 15-SP5 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* Containers Module 15-SP6 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* docker-stable-debuginfo-24.0.9_ce-150000.1.5.1
* docker-stable-24.0.9_ce-150000.1.5.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* docker-stable-bash-completion-24.0.9_ce-150000.1.5.1
## References:
* https://www.suse.com/security/cve/CVE-2024-41110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214855
* https://bugzilla.suse.com/show_bug.cgi?id=1221916
* https://bugzilla.suse.com/show_bug.cgi?id=1228324
* https://bugzilla.suse.com/show_bug.cgi?id=1230331
* https://bugzilla.suse.com/show_bug.cgi?id=1230333
* https://bugzilla.suse.com/show_bug.cgi?id=1231348
1
0
SUSE-SU-2024:4206-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4206-1
Release Date: 2024-12-05T15:33:35Z
Rating: important
References:
* bsc#1225429
* bsc#1225733
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2024-35949
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_44 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4206=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4206=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-13-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_9-debugsource-13-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-13-150500.2.1
* kernel-livepatch-5_14_21-150500_55_44-default-13-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_9-debugsource-13-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4207-1: important: Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4207-1
Release Date: 2024-12-05T15:33:46Z
Rating: important
References:
* bsc#1223363
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225311
* bsc#1225312
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26828
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35949
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 20 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_65 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4207=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4207=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-7-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_65-default-7-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_14-debugsource-7-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-7-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_65-default-7-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_14-debugsource-7-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4208-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
Announcement ID: SUSE-SU-2024:4208-1
Release Date: 2024-12-05T15:33:56Z
Rating: important
References:
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1228786
* bsc#1229273
* bsc#1229553
* bsc#1231419
Cross-References:
* CVE-2023-52752
* CVE-2024-35949
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-40954
* CVE-2024-42133
* CVE-2024-43861
CVSS scores:
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_7 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG
(bsc#1228511).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4208=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4208=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-5-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-5-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-5-150600.13.6.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-5-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-5-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-5-150600.13.6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231419
1
0
SUSE-SU-2024:4209-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
Announcement ID: SUSE-SU-2024:4209-1
Release Date: 2024-12-05T15:34:05Z
Rating: important
References:
* bsc#1225819
* bsc#1228349
* bsc#1228786
* bsc#1229273
* bsc#1229553
* bsc#1231419
Cross-References:
* CVE-2023-52752
* CVE-2024-35949
* CVE-2024-40909
* CVE-2024-40954
* CVE-2024-42133
* CVE-2024-43861
CVSS scores:
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves six vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_14 fixes several issues.
The following security issues were fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG
(bsc#1228511).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4209=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4209=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_14-default-5-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-5-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-5-150600.13.6.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_14-default-5-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-5-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-5-150600.13.6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231419
1
0
SUSE-SU-2024:4210-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)
Announcement ID: SUSE-SU-2024:4210-1
Release Date: 2024-12-05T15:34:15Z
Rating: important
References:
* bsc#1225819
* bsc#1228349
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2023-52752
* CVE-2024-35949
* CVE-2024-40909
* CVE-2024-40954
* CVE-2024-43861
CVSS scores:
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves five vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_17 fixes several issues.
The following security issues were fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4210=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4210=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-5-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_17-default-5-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_3-debugsource-5-150600.13.6.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-5-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_17-default-5-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_3-debugsource-5-150600.13.6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
openSUSE-RU-2024:0391-1: moderate: Recommended update for sops
by maintenance@opensuse.org 05 Dec '24
by maintenance@opensuse.org 05 Dec '24
05 Dec '24
openSUSE Recommended Update: Recommended update for sops
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0391-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for sops fixes the following issues:
- fix broken sops executable
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-391=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
sops-3.8.0-bp156.2.3.1
References:
1
0
05 Dec '24
# Feature update for saphana-checks
Announcement ID: SUSE-FU-2024:4189-1
Release Date: 2024-12-05T09:01:03Z
Rating: moderate
References:
* jsc#PED-8760
* jsc#PED-8761
* jsc#PED-8762
Affected Products:
* openSUSE Leap 15.6
* SAP Applications Module 15-SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains three features can now be installed.
## Description:
This update for saphana-checks fixes the following issues:
* Implementation of `saphana-checks` tool from SAP packaged for SUSE Linux
Enterprise Server for SAP Applications. It is installed in /usr/lib/saphana-
checks instead of /opt/sap/saphana-checks (jsc#PED-8760, jsc#PED-8761)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4189=1
* SAP Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-4189=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* saphana-checks-2409+1.g81ed692-150600.13.3.1
* SAP Applications Module 15-SP6 (noarch)
* saphana-checks-2409+1.g81ed692-150600.13.3.1
## References:
* https://jira.suse.com/browse/PED-8760
* https://jira.suse.com/browse/PED-8761
* https://jira.suse.com/browse/PED-8762
1
0
05 Dec '24
# Recommended update for lshw
Announcement ID: SUSE-RU-2024:4190-1
Release Date: 2024-12-05T09:50:34Z
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
This update for lshw fixes the following issue:
* Update to version B.02.20 (jsc#9912):
* update changelog
* update data files
* get rid of GTK deprecation warning
* get rid of some snprintf warnings
* Add support for 100Gbit interfaces
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4190=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4190=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4190=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4190=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4190=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4190=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4190=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4190=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4190=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4190=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4190=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4190=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4190=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4190=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4190=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4190=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4190=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4190=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4190=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4190=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4190=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4190=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4190=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4190=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4190=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4190=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4190=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* lshw-debugsource-B.02.20-150200.3.18.2
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-gui-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-gui-B.02.20-150200.3.18.2
* openSUSE Leap 15.5 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* lshw-debugsource-B.02.20-150200.3.18.2
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-gui-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-gui-B.02.20-150200.3.18.2
* openSUSE Leap 15.6 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* Basesystem Module 15-SP5 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* Basesystem Module 15-SP6 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server 15 SP2 LTSS (ppc64le x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Manager Proxy 4.3 (x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Manager Proxy 4.3 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Manager Server 4.3 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Enterprise Storage 7.1 (x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Enterprise Storage 7.1 (noarch)
* lshw-lang-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* lshw-debuginfo-B.02.20-150200.3.18.2
* lshw-B.02.20-150200.3.18.2
* lshw-debugsource-B.02.20-150200.3.18.2
1
0
05 Dec '24
# Recommended update for SAPHanaSR-angi
Announcement ID: SUSE-RU-2024:4191-1
Release Date: 2024-12-05T10:24:53Z
Rating: moderate
References:
* jsc#PED-6403
Affected Products:
* openSUSE Leap 15.4
* SAP Applications Module 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that contains one feature can now be installed.
## Description:
This update for SAPHanaSR-angi fixes the following issues:
* Version update to v1.2.9
* add SAPHanaSR-alert-fencing, an alert agent for cluster fencing alerts.
* enhance SAPHanaController with the feature ON_FAIL_ACTION=fence This is part
of the 'FAST-STOP' feature of the resource agents. (jsc#SAPSOL-196)
* Improve handling of timeout return values for the resource agents
* SAPHanaSR-showAttr - adding new option 'sitelist' and new output format
'csv' and 'cache'
* updating man pages
* add additional requires for SLE16: /usr/bin/sudo and /usr/bin/logger
(jsc#PED-6403) (jsc#SAPSOL-133).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4191=1
* SAP Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-4191=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* SAPHanaSR-angi-1.2.9-150400.9.6.2
* SAP Applications Module 15-SP4 (noarch)
* SAPHanaSR-angi-1.2.9-150400.9.6.2
## References:
* https://jira.suse.com/browse/PED-6403
1
0
05 Dec '24
# Recommended update for SAPHanaSR-angi
Announcement ID: SUSE-RU-2024:4192-1
Release Date: 2024-12-05T10:25:17Z
Rating: moderate
References:
* jsc#PED-6403
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SAP Applications Module 15-SP5
* SAP Applications Module 15-SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature can now be installed.
## Description:
This update for SAPHanaSR-angi fixes the following issues:
* Version update to v1.2.9
* add SAPHanaSR-alert-fencing, an alert agent for cluster fencing alerts.
* enhance SAPHanaController with the feature ON_FAIL_ACTION=fence This is part
of the 'FAST-STOP' feature of the resource agents. (jsc#SAPSOL-196)
* Improve handling of timeout return values for the resource agents
* SAPHanaSR-showAttr - adding new option 'sitelist' and new output format
'csv' and 'cache'
* updating man pages
* add additional requires for SLE16: /usr/bin/sudo and /usr/bin/logger
(jsc#PED-6403) (jsc#SAPSOL-133).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4192=1
* SAP Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-4192=1
* SAP Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-4192=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4192=1 openSUSE-SLE-15.5-2024-4192=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* SAPHanaSR-angi-1.2.9-150500.3.12.2
* SAP Applications Module 15-SP5 (noarch)
* SAPHanaSR-angi-1.2.9-150500.3.12.2
* SAP Applications Module 15-SP6 (noarch)
* SAPHanaSR-angi-1.2.9-150500.3.12.2
* openSUSE Leap 15.5 (noarch)
* SAPHanaSR-angi-1.2.9-150500.3.12.2
## References:
* https://jira.suse.com/browse/PED-6403
1
0
# Security update for python3
Announcement ID: SUSE-SU-2024:4193-1
Release Date: 2024-12-05T11:02:58Z
Rating: low
References:
* bsc#1231795
* bsc#1233307
Cross-References:
* CVE-2024-11168
CVSS scores:
* CVE-2024-11168 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X
* CVE-2024-11168 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-11168 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for python3 fixes the following issues:
* CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses
(bsc#1233307)
Other fixes: \- Remove -IVendor/ from python-config (bsc#1231795)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4193=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4193=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4193=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4193=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4193=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4193=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4193=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4193=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4193=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4193=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4193=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4193=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4193=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4193=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4193=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-base-3.6.15-150300.10.78.1
* python3-dbm-3.6.15-150300.10.78.1
* python3-tk-debuginfo-3.6.15-150300.10.78.1
* python3-doc-devhelp-3.6.15-150300.10.78.1
* python3-testsuite-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* python3-tk-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-curses-3.6.15-150300.10.78.1
* python3-curses-debuginfo-3.6.15-150300.10.78.1
* python3-idle-3.6.15-150300.10.78.1
* python3-testsuite-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-debuginfo-3.6.15-150300.10.78.1
* python3-doc-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* python3-tools-3.6.15-150300.10.78.1
* python3-devel-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-devel-3.6.15-150300.10.78.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.78.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.78.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpython3_6m1_0-64bit-3.6.15-150300.10.78.1
* libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.78.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* python3-dbm-3.6.15-150300.10.78.1
* python3-tk-debuginfo-3.6.15-150300.10.78.1
* python3-doc-devhelp-3.6.15-150300.10.78.1
* python3-testsuite-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* python3-tk-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-curses-3.6.15-150300.10.78.1
* python3-curses-debuginfo-3.6.15-150300.10.78.1
* python3-idle-3.6.15-150300.10.78.1
* python3-testsuite-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-debuginfo-3.6.15-150300.10.78.1
* python3-doc-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* python3-tools-3.6.15-150300.10.78.1
* python3-devel-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-devel-3.6.15-150300.10.78.1
* openSUSE Leap 15.5 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.78.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.78.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* python3-dbm-3.6.15-150300.10.78.1
* python3-tk-debuginfo-3.6.15-150300.10.78.1
* python3-doc-devhelp-3.6.15-150300.10.78.1
* python3-testsuite-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* python3-tk-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-curses-3.6.15-150300.10.78.1
* python3-curses-debuginfo-3.6.15-150300.10.78.1
* python3-idle-3.6.15-150300.10.78.1
* python3-testsuite-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-debuginfo-3.6.15-150300.10.78.1
* python3-doc-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* python3-tools-3.6.15-150300.10.78.1
* python3-devel-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-devel-3.6.15-150300.10.78.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.78.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-curses-3.6.15-150300.10.78.1
* python3-curses-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-3.6.15-150300.10.78.1
* python3-devel-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-idle-3.6.15-150300.10.78.1
* python3-tk-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-tk-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* python3-devel-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-curses-3.6.15-150300.10.78.1
* python3-curses-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-3.6.15-150300.10.78.1
* python3-devel-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-idle-3.6.15-150300.10.78.1
* python3-tk-debuginfo-3.6.15-150300.10.78.1
* python3-dbm-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-tk-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* python3-devel-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-tools-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-tools-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* python3-base-3.6.15-150300.10.78.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.78.1
* python3-base-debuginfo-3.6.15-150300.10.78.1
* python3-debugsource-3.6.15-150300.10.78.1
* python3-core-debugsource-3.6.15-150300.10.78.1
* python3-debuginfo-3.6.15-150300.10.78.1
* libpython3_6m1_0-3.6.15-150300.10.78.1
* python3-3.6.15-150300.10.78.1
## References:
* https://www.suse.com/security/cve/CVE-2024-11168.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231795
* https://bugzilla.suse.com/show_bug.cgi?id=1233307
1
0
SUSE-SU-2024:4194-1: important: Security update for python-python-multipart
by OPENSUSE-UPDATES 05 Dec '24
by OPENSUSE-UPDATES 05 Dec '24
05 Dec '24
# Security update for python-python-multipart
Announcement ID: SUSE-SU-2024:4194-1
Release Date: 2024-12-05T11:03:12Z
Rating: important
References:
* bsc#1234115
Cross-References:
* CVE-2024-53981
CVSS scores:
* CVE-2024-53981 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53981 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-python-multipart fixes the following issues:
* CVE-2024-53981: excessive logging for certain inputs when parsing form data.
(bsc#1234115)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4194=1 SUSE-2024-4194=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-python-multipart-0.0.9-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-53981.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234115
1
0
05 Dec '24
# Recommended update for suseconnect-ng
Announcement ID: SUSE-RU-2024:4181-1
Release Date: 2024-12-05T04:59:07Z
Rating: moderate
References:
* bsc#1231185
* bsc#1231328
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has two fixes can now be installed.
## Description:
This update for suseconnect-ng fixes the following issues:
* Integrating uptime-tracker
* Honor auto-import-gpg-keys flag on migration (bsc#1231328)
* Only send labels if targetting SCC
* Skip the docker auth generation on RMT (bsc#1231185)
* Add --set-labels to register command to set labels at registration time on
SCC
* Add a new function to display suse-uptime-tracker version
* Add a command to show the info being gathered
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4181=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4181=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libsuseconnect-1.13.0-150600.3.11.1
* suseconnect-ng-1.13.0-150600.3.11.1
* suseconnect-ruby-bindings-1.13.0-150600.3.11.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsuseconnect-1.13.0-150600.3.11.1
* suseconnect-ng-1.13.0-150600.3.11.1
* suseconnect-ruby-bindings-1.13.0-150600.3.11.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231185
* https://bugzilla.suse.com/show_bug.cgi?id=1231328
1
0
05 Dec '24
# Recommended update for suseconnect-ng
Announcement ID: SUSE-RU-2024:4182-1
Release Date: 2024-12-05T04:59:21Z
Rating: moderate
References:
* bsc#1231185
* bsc#1231328
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for suseconnect-ng fixes the following issues:
* Integrating uptime-tracker
* Honor auto-import-gpg-keys flag on migration (bsc#1231328)
* Only send labels if targetting SCC
* Skip the docker auth generation on RMT (bsc#1231185)
* Add --set-labels to register command to set labels at registration time on
SCC
* Add a new function to display suse-uptime-tracker version
* Add a command to show the info being gathered
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4182=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4182=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4182=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4182=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* suseconnect-ng-1.13.0-150500.3.32.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* suseconnect-ruby-bindings-1.13.0-150500.3.32.1
* suseconnect-ng-1.13.0-150500.3.32.1
* libsuseconnect-1.13.0-150500.3.32.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* suseconnect-ruby-bindings-1.13.0-150500.3.32.1
* suseconnect-ng-1.13.0-150500.3.32.1
* libsuseconnect-1.13.0-150500.3.32.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* suseconnect-ng-1.13.0-150500.3.32.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231185
* https://bugzilla.suse.com/show_bug.cgi?id=1231328
1
0
05 Dec '24
# Recommended update for suseconnect-ng
Announcement ID: SUSE-RU-2024:4184-1
Release Date: 2024-12-05T05:00:42Z
Rating: moderate
References:
* bsc#1231185
* bsc#1231328
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for suseconnect-ng fixes the following issues:
* Integrating uptime-tracker
* Honor auto-import-gpg-keys flag on migration (bsc#1231328)
* Only send labels if targetting SCC
* Skip the docker auth generation on RMT (bsc#1231185)
* Add --set-labels to register command to set labels at registration time on
SCC
* Add a new function to display suse-uptime-tracker version
* Add a command to show the info being gathered
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4184=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4184=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4184=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4184=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4184=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4184=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4184=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4184=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4184=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4184=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4184=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4184=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4184=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Manager Proxy 4.3 (x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* suseconnect-ng-1.13.0-150400.3.42.1
* libsuseconnect-1.13.0-150400.3.42.1
* suseconnect-ruby-bindings-1.13.0-150400.3.42.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231185
* https://bugzilla.suse.com/show_bug.cgi?id=1231328
1
0