SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:2190-1)

critical Nessus Plugin ID 201009

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2190-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464).
- CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870)
- CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
- CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr() (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765,).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020, bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in >control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- Move upstreamed patches into sorted section
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).
- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331).
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1224524

https://bugzilla.suse.com/1224525

https://bugzilla.suse.com/1224530

https://bugzilla.suse.com/1224531

https://bugzilla.suse.com/1224534

https://bugzilla.suse.com/1224535

https://bugzilla.suse.com/1224537

https://bugzilla.suse.com/1224541

https://bugzilla.suse.com/1224543

https://bugzilla.suse.com/1224549

https://bugzilla.suse.com/1224550

https://bugzilla.suse.com/1224558

https://bugzilla.suse.com/1224559

https://bugzilla.suse.com/1224566

https://bugzilla.suse.com/1224567

https://bugzilla.suse.com/1224571

https://bugzilla.suse.com/1224575

https://bugzilla.suse.com/1224576

https://bugzilla.suse.com/1224579

https://bugzilla.suse.com/1224580

https://bugzilla.suse.com/1224581

https://bugzilla.suse.com/1224582

https://bugzilla.suse.com/1224586

https://bugzilla.suse.com/1224587

https://bugzilla.suse.com/1224592

https://bugzilla.suse.com/1224598

https://bugzilla.suse.com/1224601

https://bugzilla.suse.com/1224607

https://bugzilla.suse.com/1224608

https://bugzilla.suse.com/1224611

https://bugzilla.suse.com/1224615

https://bugzilla.suse.com/1224617

https://bugzilla.suse.com/1224618

https://bugzilla.suse.com/1224621

https://bugzilla.suse.com/1224622

https://bugzilla.suse.com/1224624

https://bugzilla.suse.com/1224627

https://bugzilla.suse.com/1224628

https://bugzilla.suse.com/1224629

https://bugzilla.suse.com/1224632

https://bugzilla.suse.com/1224636

https://bugzilla.suse.com/1224637

https://bugzilla.suse.com/1224638

https://bugzilla.suse.com/1224640

https://bugzilla.suse.com/1224643

https://bugzilla.suse.com/1224644

https://bugzilla.suse.com/1224645

https://bugzilla.suse.com/1224647

https://bugzilla.suse.com/1224648

https://bugzilla.suse.com/1224649

https://bugzilla.suse.com/1224650

https://bugzilla.suse.com/1224651

https://bugzilla.suse.com/1224657

https://bugzilla.suse.com/1224659

https://bugzilla.suse.com/1224660

https://bugzilla.suse.com/1224663

https://bugzilla.suse.com/1224664

https://bugzilla.suse.com/1224665

https://bugzilla.suse.com/1224666

https://bugzilla.suse.com/1224667

https://bugzilla.suse.com/1224668

https://bugzilla.suse.com/1224671

https://bugzilla.suse.com/1224672

https://bugzilla.suse.com/1224676

https://bugzilla.suse.com/1224678

https://bugzilla.suse.com/1224679

https://bugzilla.suse.com/1224680

https://bugzilla.suse.com/1224681

https://bugzilla.suse.com/1224682

https://bugzilla.suse.com/1224685

https://bugzilla.suse.com/1224686

https://bugzilla.suse.com/1224692

https://bugzilla.suse.com/1224697

https://bugzilla.suse.com/1224699

https://bugzilla.suse.com/1224701

https://bugzilla.suse.com/1224703

https://bugzilla.suse.com/1224705

https://bugzilla.suse.com/1224707

https://bugzilla.suse.com/1224717

https://bugzilla.suse.com/1224718

https://bugzilla.suse.com/1224721

https://bugzilla.suse.com/1224722

https://bugzilla.suse.com/1224723

https://bugzilla.suse.com/1224725

https://bugzilla.suse.com/1224727

https://bugzilla.suse.com/1224728

https://bugzilla.suse.com/1224729

https://bugzilla.suse.com/1224730

https://bugzilla.suse.com/1224731

https://bugzilla.suse.com/1224732

https://bugzilla.suse.com/1224733

https://bugzilla.suse.com/1224736

https://bugzilla.suse.com/1224738

https://bugzilla.suse.com/1224739

https://bugzilla.suse.com/1224740

https://bugzilla.suse.com/1224747

https://bugzilla.suse.com/1224749

https://bugzilla.suse.com/1224759

https://bugzilla.suse.com/1224763

https://bugzilla.suse.com/1224764

https://bugzilla.suse.com/1224765

https://bugzilla.suse.com/1224766

https://bugzilla.suse.com/1224794

https://bugzilla.suse.com/1224795

https://bugzilla.suse.com/1224796

https://bugzilla.suse.com/1224803

https://bugzilla.suse.com/1224816

https://bugzilla.suse.com/1224895

https://bugzilla.suse.com/1224898

https://bugzilla.suse.com/1224900

https://bugzilla.suse.com/1224901

https://bugzilla.suse.com/1224902

https://bugzilla.suse.com/1224903

https://bugzilla.suse.com/1224904

https://bugzilla.suse.com/1224905

https://bugzilla.suse.com/1224907

https://bugzilla.suse.com/1224909

https://bugzilla.suse.com/1224910

https://bugzilla.suse.com/1224911

https://bugzilla.suse.com/1224912

https://bugzilla.suse.com/1224913

https://bugzilla.suse.com/1224914

https://bugzilla.suse.com/1224915

https://bugzilla.suse.com/1224920

https://bugzilla.suse.com/1224928

https://bugzilla.suse.com/1224929

https://bugzilla.suse.com/1224930

https://bugzilla.suse.com/1224931

https://bugzilla.suse.com/1224932

https://bugzilla.suse.com/1224936

https://bugzilla.suse.com/1224937

https://bugzilla.suse.com/1224941

https://bugzilla.suse.com/1224942

https://bugzilla.suse.com/1224944

https://bugzilla.suse.com/1224945

https://bugzilla.suse.com/1224947

https://bugzilla.suse.com/1224956

https://bugzilla.suse.com/1224988

https://bugzilla.suse.com/1224992

https://bugzilla.suse.com/1225000

https://bugzilla.suse.com/1225003

https://bugzilla.suse.com/1225005

https://bugzilla.suse.com/1225008

https://bugzilla.suse.com/1225009

https://bugzilla.suse.com/1225022

https://bugzilla.suse.com/1225031

https://bugzilla.suse.com/1225032

https://bugzilla.suse.com/1225036

https://bugzilla.suse.com/1225041

https://bugzilla.suse.com/1225044

https://bugzilla.suse.com/1225053

https://bugzilla.suse.com/1225076

https://bugzilla.suse.com/1225077

https://bugzilla.suse.com/1225082

https://bugzilla.suse.com/1225085

https://bugzilla.suse.com/1225086

https://bugzilla.suse.com/1225092

https://bugzilla.suse.com/1225095

https://bugzilla.suse.com/1225096

https://bugzilla.suse.com/1225097

https://bugzilla.suse.com/1225106

https://bugzilla.suse.com/1225108

https://bugzilla.suse.com/1225109

https://bugzilla.suse.com/1225114

https://bugzilla.suse.com/1225118

https://bugzilla.suse.com/1225121

https://bugzilla.suse.com/1225122

https://bugzilla.suse.com/1225123

https://bugzilla.suse.com/1225125

https://bugzilla.suse.com/1225126

https://bugzilla.suse.com/1225127

https://bugzilla.suse.com/1225129

https://bugzilla.suse.com/1225131

https://bugzilla.suse.com/1225132

https://bugzilla.suse.com/1225138

https://bugzilla.suse.com/1225139

https://bugzilla.suse.com/1225145

https://bugzilla.suse.com/1225151

https://bugzilla.suse.com/1225153

https://bugzilla.suse.com/1225156

https://bugzilla.suse.com/1225158

https://bugzilla.suse.com/1225160

https://bugzilla.suse.com/1225161

https://bugzilla.suse.com/1225164

https://bugzilla.suse.com/1225167

https://bugzilla.suse.com/1225180

https://bugzilla.suse.com/1225183

https://bugzilla.suse.com/1225184

https://bugzilla.suse.com/1225186

https://bugzilla.suse.com/1225187

https://bugzilla.suse.com/1225189

https://bugzilla.suse.com/1225190

https://bugzilla.suse.com/1225191

https://bugzilla.suse.com/1225192

https://bugzilla.suse.com/1225193

https://bugzilla.suse.com/1225195

https://bugzilla.suse.com/1225198

https://bugzilla.suse.com/1225201

https://bugzilla.suse.com/1225203

https://bugzilla.suse.com/1225205

https://bugzilla.suse.com/1225206

https://bugzilla.suse.com/1225207

https://bugzilla.suse.com/1225208

https://bugzilla.suse.com/1225209

https://bugzilla.suse.com/1225210

https://bugzilla.suse.com/1225214

https://bugzilla.suse.com/1225222

https://bugzilla.suse.com/1225223

https://bugzilla.suse.com/1225224

https://bugzilla.suse.com/1225225

https://bugzilla.suse.com/1225227

https://bugzilla.suse.com/1225228

https://bugzilla.suse.com/1225229

https://bugzilla.suse.com/1225230

https://bugzilla.suse.com/1225232

https://bugzilla.suse.com/1225233

https://bugzilla.suse.com/1225235

https://bugzilla.suse.com/1225236

https://bugzilla.suse.com/1225237

https://bugzilla.suse.com/1225238

https://bugzilla.suse.com/1225239

https://bugzilla.suse.com/1225240

https://bugzilla.suse.com/1225241

https://bugzilla.suse.com/1225242

https://bugzilla.suse.com/1225243

https://bugzilla.suse.com/1225244

https://www.suse.com/security/cve/CVE-2021-47393

https://www.suse.com/security/cve/CVE-2021-47394

https://www.suse.com/security/cve/CVE-2021-47395

https://www.suse.com/security/cve/CVE-2021-47396

https://www.suse.com/security/cve/CVE-2021-47397

https://www.suse.com/security/cve/CVE-2021-47398

https://www.suse.com/security/cve/CVE-2021-47399

https://www.suse.com/security/cve/CVE-2021-47400

https://www.suse.com/security/cve/CVE-2021-47401

https://www.suse.com/security/cve/CVE-2021-47402

https://www.suse.com/security/cve/CVE-2021-47403

https://www.suse.com/security/cve/CVE-2021-47404

https://www.suse.com/security/cve/CVE-2021-47405

https://www.suse.com/security/cve/CVE-2021-47406

https://www.suse.com/security/cve/CVE-2021-47407

https://www.suse.com/security/cve/CVE-2021-47408

https://www.suse.com/security/cve/CVE-2021-47409

https://www.suse.com/security/cve/CVE-2021-47410

https://www.suse.com/security/cve/CVE-2021-47412

https://www.suse.com/security/cve/CVE-2021-47413

https://www.suse.com/security/cve/CVE-2021-47414

https://www.suse.com/security/cve/CVE-2021-47415

https://www.suse.com/security/cve/CVE-2021-47416

https://www.suse.com/security/cve/CVE-2021-47417

https://www.suse.com/security/cve/CVE-2021-47418

https://www.suse.com/security/cve/CVE-2021-47419

https://www.suse.com/security/cve/CVE-2021-47420

https://www.suse.com/security/cve/CVE-2021-47421

https://www.suse.com/security/cve/CVE-2021-47422

https://www.suse.com/security/cve/CVE-2021-47423

https://www.suse.com/security/cve/CVE-2021-47424

https://www.suse.com/security/cve/CVE-2021-47425

https://www.suse.com/security/cve/CVE-2021-47426

https://www.suse.com/security/cve/CVE-2021-47427

https://www.suse.com/security/cve/CVE-2021-47428

https://www.suse.com/security/cve/CVE-2021-47429

https://www.suse.com/security/cve/CVE-2021-47430

https://www.suse.com/security/cve/CVE-2021-47431

https://www.suse.com/security/cve/CVE-2021-47433

https://www.suse.com/security/cve/CVE-2021-47434

https://www.suse.com/security/cve/CVE-2021-47435

https://www.suse.com/security/cve/CVE-2021-47436

https://www.suse.com/security/cve/CVE-2021-47437

https://www.suse.com/security/cve/CVE-2021-47438

https://www.suse.com/security/cve/CVE-2021-47439

https://www.suse.com/security/cve/CVE-2021-47440

https://www.suse.com/security/cve/CVE-2021-47441

https://www.suse.com/security/cve/CVE-2021-47442

https://www.suse.com/security/cve/CVE-2021-47443

https://www.suse.com/security/cve/CVE-2021-47444

https://www.suse.com/security/cve/CVE-2021-47445

https://www.suse.com/security/cve/CVE-2021-47446

https://www.suse.com/security/cve/CVE-2021-47447

https://www.suse.com/security/cve/CVE-2021-47448

https://www.suse.com/security/cve/CVE-2021-47449

https://www.suse.com/security/cve/CVE-2021-47450

https://www.suse.com/security/cve/CVE-2021-47451

https://www.suse.com/security/cve/CVE-2021-47452

https://www.suse.com/security/cve/CVE-2021-47453

https://www.suse.com/security/cve/CVE-2021-47454

https://www.suse.com/security/cve/CVE-2021-47455

https://www.suse.com/security/cve/CVE-2021-47456

https://www.suse.com/security/cve/CVE-2021-47457

https://www.suse.com/security/cve/CVE-2021-47458

https://www.suse.com/security/cve/CVE-2021-47459

https://www.suse.com/security/cve/CVE-2021-47460

https://www.suse.com/security/cve/CVE-2021-47461

https://www.suse.com/security/cve/CVE-2021-47462

https://www.suse.com/security/cve/CVE-2021-47463

https://www.suse.com/security/cve/CVE-2021-47464

https://www.suse.com/security/cve/CVE-2021-47465

https://www.suse.com/security/cve/CVE-2021-47466

https://www.suse.com/security/cve/CVE-2021-47467

https://www.suse.com/security/cve/CVE-2021-47468

https://www.suse.com/security/cve/CVE-2021-47469

https://www.suse.com/security/cve/CVE-2021-47470

https://www.suse.com/security/cve/CVE-2021-47471

https://www.suse.com/security/cve/CVE-2021-47472

https://www.suse.com/security/cve/CVE-2021-47473

https://www.suse.com/security/cve/CVE-2021-47474

https://www.suse.com/security/cve/CVE-2021-47475

https://www.suse.com/security/cve/CVE-2021-47476

https://www.suse.com/security/cve/CVE-2021-47477

https://www.suse.com/security/cve/CVE-2021-47478

https://www.suse.com/security/cve/CVE-2021-47479

https://www.suse.com/security/cve/CVE-2021-47480

https://www.suse.com/security/cve/CVE-2021-47481

https://www.suse.com/security/cve/CVE-2021-47482

https://www.suse.com/security/cve/CVE-2021-47483

https://www.suse.com/security/cve/CVE-2021-47484

https://www.suse.com/security/cve/CVE-2021-47485

https://www.suse.com/security/cve/CVE-2021-47486

https://www.suse.com/security/cve/CVE-2021-47488

https://www.suse.com/security/cve/CVE-2021-47489

https://www.suse.com/security/cve/CVE-2021-47490

https://www.suse.com/security/cve/CVE-2021-47491

https://www.suse.com/security/cve/CVE-2021-47492

https://www.suse.com/security/cve/CVE-2021-47493

https://www.suse.com/security/cve/CVE-2021-47494

https://www.suse.com/security/cve/CVE-2021-47495

https://www.suse.com/security/cve/CVE-2021-47496

https://www.suse.com/security/cve/CVE-2021-47497

https://www.suse.com/security/cve/CVE-2021-47498

https://www.suse.com/security/cve/CVE-2021-47499

https://www.suse.com/security/cve/CVE-2021-47500

https://www.suse.com/security/cve/CVE-2021-47501

https://www.suse.com/security/cve/CVE-2021-47502

https://www.suse.com/security/cve/CVE-2021-47503

https://www.suse.com/security/cve/CVE-2021-47504

https://www.suse.com/security/cve/CVE-2021-47505

https://www.suse.com/security/cve/CVE-2021-47506

https://www.suse.com/security/cve/CVE-2021-47507

https://www.suse.com/security/cve/CVE-2021-47508

https://www.suse.com/security/cve/CVE-2021-47509

https://www.suse.com/security/cve/CVE-2021-47510

https://www.suse.com/security/cve/CVE-2021-47511

https://www.suse.com/security/cve/CVE-2021-47512

https://www.suse.com/security/cve/CVE-2021-47513

https://www.suse.com/security/cve/CVE-2021-47514

https://www.suse.com/security/cve/CVE-2021-47516

https://www.suse.com/security/cve/CVE-2021-47518

https://www.suse.com/security/cve/CVE-2021-47520

https://www.suse.com/security/cve/CVE-2021-47521

https://www.suse.com/security/cve/CVE-2021-47522

https://www.suse.com/security/cve/CVE-2021-47523

https://www.suse.com/security/cve/CVE-2021-47524

https://www.suse.com/security/cve/CVE-2021-47525

https://www.suse.com/security/cve/CVE-2021-47526

https://www.suse.com/security/cve/CVE-2021-47528

https://www.suse.com/security/cve/CVE-2021-47529

https://www.suse.com/security/cve/CVE-2021-47530

https://www.suse.com/security/cve/CVE-2021-47531

https://www.suse.com/security/cve/CVE-2021-47532

https://www.suse.com/security/cve/CVE-2021-47533

https://www.suse.com/security/cve/CVE-2021-47534

https://www.suse.com/security/cve/CVE-2021-47535

https://www.suse.com/security/cve/CVE-2021-47536

https://www.suse.com/security/cve/CVE-2021-47537

https://www.suse.com/security/cve/CVE-2021-47540

https://www.suse.com/security/cve/CVE-2021-47541

https://www.suse.com/security/cve/CVE-2021-47542

https://www.suse.com/security/cve/CVE-2021-47544

https://www.suse.com/security/cve/CVE-2021-47548

https://www.suse.com/security/cve/CVE-2021-47549

https://www.suse.com/security/cve/CVE-2021-47550

https://www.suse.com/security/cve/CVE-2021-47551

https://www.suse.com/security/cve/CVE-2021-47552

https://www.suse.com/security/cve/CVE-2021-47553

https://www.suse.com/security/cve/CVE-2021-47554

https://www.suse.com/security/cve/CVE-2021-47555

https://www.suse.com/security/cve/CVE-2021-47556

https://www.suse.com/security/cve/CVE-2021-47557

https://www.suse.com/security/cve/CVE-2021-47558

https://www.suse.com/security/cve/CVE-2021-47559

https://www.suse.com/security/cve/CVE-2021-47560

https://www.suse.com/security/cve/CVE-2021-47562

https://www.suse.com/security/cve/CVE-2021-47563

https://www.suse.com/security/cve/CVE-2021-47564

https://www.suse.com/security/cve/CVE-2021-47565

https://www.suse.com/security/cve/CVE-2021-47569

https://www.suse.com/security/cve/CVE-2022-48633

https://www.suse.com/security/cve/CVE-2022-48662

https://www.suse.com/security/cve/CVE-2022-48669

https://www.suse.com/security/cve/CVE-2022-48689

https://www.suse.com/security/cve/CVE-2022-48691

https://www.suse.com/security/cve/CVE-2022-48699

https://www.suse.com/security/cve/CVE-2022-48705

https://www.suse.com/security/cve/CVE-2022-48708

https://www.suse.com/security/cve/CVE-2022-48709

https://www.suse.com/security/cve/CVE-2022-48710

https://www.suse.com/security/cve/CVE-2023-0160

https://www.suse.com/security/cve/CVE-2023-1829

https://www.suse.com/security/cve/CVE-2023-42755

https://www.suse.com/security/cve/CVE-2023-47233

https://www.suse.com/security/cve/CVE-2023-52586

https://www.suse.com/security/cve/CVE-2023-52591

https://www.suse.com/security/cve/CVE-2023-52618

https://www.suse.com/security/cve/CVE-2023-52642

https://www.suse.com/security/cve/CVE-2023-52643

https://www.suse.com/security/cve/CVE-2023-52644

https://www.suse.com/security/cve/CVE-2023-52646

https://www.suse.com/security/cve/CVE-2023-52650

https://www.suse.com/security/cve/CVE-2023-52653

https://www.suse.com/security/cve/CVE-2023-52654

https://www.suse.com/security/cve/CVE-2023-52655

https://www.suse.com/security/cve/CVE-2023-52656

https://www.suse.com/security/cve/CVE-2023-52657

https://www.suse.com/security/cve/CVE-2023-52659

https://www.suse.com/security/cve/CVE-2023-52660

https://www.suse.com/security/cve/CVE-2023-52661

https://www.suse.com/security/cve/CVE-2023-52662

https://www.suse.com/security/cve/CVE-2023-52664

https://www.suse.com/security/cve/CVE-2023-52669

https://www.suse.com/security/cve/CVE-2023-52671

https://www.suse.com/security/cve/CVE-2023-52674

https://www.suse.com/security/cve/CVE-2023-52676

https://www.suse.com/security/cve/CVE-2023-52678

https://www.suse.com/security/cve/CVE-2023-52679

https://www.suse.com/security/cve/CVE-2023-52680

https://www.suse.com/security/cve/CVE-2023-52683

https://www.suse.com/security/cve/CVE-2023-52685

https://www.suse.com/security/cve/CVE-2023-52686

https://www.suse.com/security/cve/CVE-2023-52690

https://www.suse.com/security/cve/CVE-2023-52691

https://www.suse.com/security/cve/CVE-2023-52692

https://www.suse.com/security/cve/CVE-2023-52693

https://www.suse.com/security/cve/CVE-2023-52694

https://www.suse.com/security/cve/CVE-2023-52696

https://www.suse.com/security/cve/CVE-2023-52698

https://www.suse.com/security/cve/CVE-2023-52699

https://www.suse.com/security/cve/CVE-2023-52702

https://www.suse.com/security/cve/CVE-2023-52703

https://www.suse.com/security/cve/CVE-2023-52705

https://www.suse.com/security/cve/CVE-2023-52707

https://www.suse.com/security/cve/CVE-2023-52708

https://www.suse.com/security/cve/CVE-2023-52730

https://www.suse.com/security/cve/CVE-2023-52731

https://www.suse.com/security/cve/CVE-2023-52732

https://www.suse.com/security/cve/CVE-2023-52733

https://www.suse.com/security/cve/CVE-2023-52736

https://www.suse.com/security/cve/CVE-2023-52738

https://www.suse.com/security/cve/CVE-2023-52739

https://www.suse.com/security/cve/CVE-2023-52740

https://www.suse.com/security/cve/CVE-2023-52741

https://www.suse.com/security/cve/CVE-2023-52742

https://www.suse.com/security/cve/CVE-2023-52743

https://www.suse.com/security/cve/CVE-2024-35904

https://www.suse.com/security/cve/CVE-2024-35905

https://www.suse.com/security/cve/CVE-2024-35907

https://www.suse.com/security/cve/CVE-2024-35912

https://www.suse.com/security/cve/CVE-2024-35914

https://www.suse.com/security/cve/CVE-2024-35915

https://www.suse.com/security/cve/CVE-2024-35922

https://www.suse.com/security/cve/CVE-2024-35924

https://www.suse.com/security/cve/CVE-2024-35930

https://www.suse.com/security/cve/CVE-2024-35932

https://www.suse.com/security/cve/CVE-2024-35933

https://www.suse.com/security/cve/CVE-2024-35935

https://www.suse.com/security/cve/CVE-2024-35936

https://www.suse.com/security/cve/CVE-2024-35938

https://www.suse.com/security/cve/CVE-2024-35939

https://www.suse.com/security/cve/CVE-2024-35940

https://www.suse.com/security/cve/CVE-2024-35943

https://www.suse.com/security/cve/CVE-2024-35944

https://www.suse.com/security/cve/CVE-2024-35947

https://www.suse.com/security/cve/CVE-2024-35950

https://www.suse.com/security/cve/CVE-2024-35951

https://www.suse.com/security/cve/CVE-2024-35952

https://www.suse.com/security/cve/CVE-2024-35955

https://www.suse.com/security/cve/CVE-2024-35959

https://www.suse.com/security/cve/CVE-2024-35963

https://www.suse.com/security/cve/CVE-2024-35964

https://www.suse.com/security/cve/CVE-2024-35965

https://www.suse.com/security/cve/CVE-2024-35966

https://www.suse.com/security/cve/CVE-2024-35967

https://www.suse.com/security/cve/CVE-2024-35969

https://www.suse.com/security/cve/CVE-2024-35973

https://www.suse.com/security/cve/CVE-2024-35976

https://www.suse.com/security/cve/CVE-2024-35978

https://www.suse.com/security/cve/CVE-2024-35982

https://www.suse.com/security/cve/CVE-2024-35984

https://www.suse.com/security/cve/CVE-2024-35989

https://www.suse.com/security/cve/CVE-2024-35990

https://www.suse.com/security/cve/CVE-2024-35998

https://www.suse.com/security/cve/CVE-2024-35999

https://www.suse.com/security/cve/CVE-2024-36006

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1141539

https://bugzilla.suse.com/1174585

https://bugzilla.suse.com/1181674

https://bugzilla.suse.com/1187716

https://bugzilla.suse.com/1190569

https://bugzilla.suse.com/1191949

https://bugzilla.suse.com/1192107

https://bugzilla.suse.com/1193983

https://bugzilla.suse.com/1194288

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1196956

https://bugzilla.suse.com/1197915

https://bugzilla.suse.com/1200465

https://bugzilla.suse.com/1205205

https://bugzilla.suse.com/1207284

https://bugzilla.suse.com/1207361

https://bugzilla.suse.com/1207948

https://bugzilla.suse.com/1208149

https://bugzilla.suse.com/1209657

https://bugzilla.suse.com/1209799

https://bugzilla.suse.com/1209834

https://bugzilla.suse.com/1209980

https://bugzilla.suse.com/1210335

https://bugzilla.suse.com/1213863

https://bugzilla.suse.com/1214852

https://bugzilla.suse.com/1215322

https://bugzilla.suse.com/1215702

https://bugzilla.suse.com/1216358

https://bugzilla.suse.com/1216702

https://bugzilla.suse.com/1217169

https://bugzilla.suse.com/1217339

https://bugzilla.suse.com/1217515

https://bugzilla.suse.com/1218447

https://bugzilla.suse.com/1220021

https://bugzilla.suse.com/1220267

https://bugzilla.suse.com/1220363

https://bugzilla.suse.com/1220783

https://bugzilla.suse.com/1221044

https://bugzilla.suse.com/1221081

https://bugzilla.suse.com/1221615

https://bugzilla.suse.com/1221777

https://bugzilla.suse.com/1221816

https://bugzilla.suse.com/1221829

https://bugzilla.suse.com/1222011

https://bugzilla.suse.com/1222374

https://bugzilla.suse.com/1222385

https://bugzilla.suse.com/1222413

https://bugzilla.suse.com/1222464

https://bugzilla.suse.com/1222513

https://bugzilla.suse.com/1222559

https://bugzilla.suse.com/1222561

https://bugzilla.suse.com/1222608

https://bugzilla.suse.com/1222619

https://bugzilla.suse.com/1222627

https://bugzilla.suse.com/1222721

https://bugzilla.suse.com/1222765

https://bugzilla.suse.com/1222770

https://bugzilla.suse.com/1222783

https://bugzilla.suse.com/1222793

https://bugzilla.suse.com/1222870

https://bugzilla.suse.com/1222893

https://bugzilla.suse.com/1222960

https://bugzilla.suse.com/1222961

https://bugzilla.suse.com/1222974

https://bugzilla.suse.com/1222975

https://bugzilla.suse.com/1222976

https://bugzilla.suse.com/1223011

https://bugzilla.suse.com/1223023

https://bugzilla.suse.com/1223027

https://bugzilla.suse.com/1223031

https://bugzilla.suse.com/1223043

https://bugzilla.suse.com/1223046

https://bugzilla.suse.com/1223048

https://bugzilla.suse.com/1223049

https://bugzilla.suse.com/1223084

https://bugzilla.suse.com/1223113

https://bugzilla.suse.com/1223119

https://bugzilla.suse.com/1223137

https://bugzilla.suse.com/1223138

https://bugzilla.suse.com/1223140

https://bugzilla.suse.com/1223188

https://bugzilla.suse.com/1223203

https://bugzilla.suse.com/1223207

https://bugzilla.suse.com/1223315

https://bugzilla.suse.com/1223360

https://bugzilla.suse.com/1223384

https://bugzilla.suse.com/1223390

https://bugzilla.suse.com/1223432

https://bugzilla.suse.com/1223489

https://bugzilla.suse.com/1223505

https://bugzilla.suse.com/1223532

https://bugzilla.suse.com/1223575

https://bugzilla.suse.com/1223595

https://bugzilla.suse.com/1223626

https://bugzilla.suse.com/1223627

https://bugzilla.suse.com/1223628

https://bugzilla.suse.com/1223631

https://bugzilla.suse.com/1223633

https://bugzilla.suse.com/1223638

https://bugzilla.suse.com/1223650

https://bugzilla.suse.com/1223653

https://bugzilla.suse.com/1223666

https://bugzilla.suse.com/1223670

https://bugzilla.suse.com/1223671

https://bugzilla.suse.com/1223675

https://bugzilla.suse.com/1223677

https://bugzilla.suse.com/1223678

https://bugzilla.suse.com/1223679

https://bugzilla.suse.com/1223698

https://bugzilla.suse.com/1223712

https://bugzilla.suse.com/1223715

https://bugzilla.suse.com/1223717

https://bugzilla.suse.com/1223718

https://bugzilla.suse.com/1223737

https://bugzilla.suse.com/1223738

https://bugzilla.suse.com/1223741

https://bugzilla.suse.com/1223744

https://bugzilla.suse.com/1223747

https://bugzilla.suse.com/1223748

https://bugzilla.suse.com/1223750

https://bugzilla.suse.com/1223752

https://bugzilla.suse.com/1223754

https://bugzilla.suse.com/1223756

https://bugzilla.suse.com/1223757

https://bugzilla.suse.com/1223762

https://bugzilla.suse.com/1223769

https://bugzilla.suse.com/1223770

https://bugzilla.suse.com/1223779

https://bugzilla.suse.com/1223780

https://bugzilla.suse.com/1223781

https://bugzilla.suse.com/1223788

https://bugzilla.suse.com/1223802

https://bugzilla.suse.com/1223819

https://bugzilla.suse.com/1223823

https://bugzilla.suse.com/1223826

https://bugzilla.suse.com/1223828

https://bugzilla.suse.com/1223829

https://bugzilla.suse.com/1223837

https://bugzilla.suse.com/1223842

https://bugzilla.suse.com/1223843

https://bugzilla.suse.com/1223844

https://bugzilla.suse.com/1223847

https://bugzilla.suse.com/1223858

https://bugzilla.suse.com/1223875

https://bugzilla.suse.com/1223879

https://bugzilla.suse.com/1223895

https://bugzilla.suse.com/1223959

https://bugzilla.suse.com/1223961

https://bugzilla.suse.com/1223991

https://bugzilla.suse.com/1223996

https://bugzilla.suse.com/1224020

https://bugzilla.suse.com/1224076

https://bugzilla.suse.com/1224096

https://bugzilla.suse.com/1224098

https://bugzilla.suse.com/1224099

https://bugzilla.suse.com/1224137

https://bugzilla.suse.com/1224166

https://bugzilla.suse.com/1224174

https://bugzilla.suse.com/1224177

https://bugzilla.suse.com/1224180

https://bugzilla.suse.com/1224181

https://bugzilla.suse.com/1224187

https://bugzilla.suse.com/1224331

https://bugzilla.suse.com/1224346

https://bugzilla.suse.com/1224423

https://bugzilla.suse.com/1224432

https://bugzilla.suse.com/1224437

https://bugzilla.suse.com/1224438

https://bugzilla.suse.com/1224442

https://bugzilla.suse.com/1224443

https://bugzilla.suse.com/1224445

https://bugzilla.suse.com/1224449

https://bugzilla.suse.com/1224479

https://bugzilla.suse.com/1224482

https://bugzilla.suse.com/1224487

https://bugzilla.suse.com/1224488

https://bugzilla.suse.com/1224492

https://bugzilla.suse.com/1224494

https://bugzilla.suse.com/1224495

https://bugzilla.suse.com/1224502

https://bugzilla.suse.com/1224508

https://bugzilla.suse.com/1224509

https://bugzilla.suse.com/1224511

https://bugzilla.suse.com/1224519

https://bugzilla.suse.com/1225245

https://bugzilla.suse.com/1225246

https://bugzilla.suse.com/1225247

https://bugzilla.suse.com/1225248

https://bugzilla.suse.com/1225249

https://bugzilla.suse.com/1225250

https://bugzilla.suse.com/1225251

https://bugzilla.suse.com/1225252

https://bugzilla.suse.com/1225253

https://bugzilla.suse.com/1225254

https://bugzilla.suse.com/1225255

https://bugzilla.suse.com/1225256

https://bugzilla.suse.com/1225257

https://bugzilla.suse.com/1225258

https://bugzilla.suse.com/1225259

https://bugzilla.suse.com/1225260

https://bugzilla.suse.com/1225261

https://bugzilla.suse.com/1225262

https://bugzilla.suse.com/1225263

https://bugzilla.suse.com/1225268

https://bugzilla.suse.com/1225301

https://bugzilla.suse.com/1225303

https://bugzilla.suse.com/1225304

https://bugzilla.suse.com/1225306

https://bugzilla.suse.com/1225316

https://bugzilla.suse.com/1225318

https://bugzilla.suse.com/1225320

https://bugzilla.suse.com/1225321

https://bugzilla.suse.com/1225322

https://bugzilla.suse.com/1225323

https://bugzilla.suse.com/1225326

https://bugzilla.suse.com/1225327

https://bugzilla.suse.com/1225328

https://bugzilla.suse.com/1225329

https://bugzilla.suse.com/1225330

https://bugzilla.suse.com/1225331

https://bugzilla.suse.com/1225332

https://bugzilla.suse.com/1225333

https://bugzilla.suse.com/1225334

https://bugzilla.suse.com/1225335

https://bugzilla.suse.com/1225336

https://bugzilla.suse.com/1225337

https://bugzilla.suse.com/1225338

https://bugzilla.suse.com/1225339

https://bugzilla.suse.com/1225341

https://bugzilla.suse.com/1225342

https://bugzilla.suse.com/1225344

https://bugzilla.suse.com/1225346

https://bugzilla.suse.com/1225347

https://bugzilla.suse.com/1225351

https://bugzilla.suse.com/1225353

https://bugzilla.suse.com/1225354

https://bugzilla.suse.com/1225355

https://bugzilla.suse.com/1225357

https://bugzilla.suse.com/1225358

https://bugzilla.suse.com/1225360

https://bugzilla.suse.com/1225361

https://bugzilla.suse.com/1225366

https://bugzilla.suse.com/1225367

https://bugzilla.suse.com/1225368

https://bugzilla.suse.com/1225369

https://bugzilla.suse.com/1225370

https://bugzilla.suse.com/1225372

https://bugzilla.suse.com/1225373

https://bugzilla.suse.com/1225374

https://bugzilla.suse.com/1225375

https://bugzilla.suse.com/1225376

https://bugzilla.suse.com/1225377

https://bugzilla.suse.com/1225379

https://bugzilla.suse.com/1225380

https://bugzilla.suse.com/1225382

https://bugzilla.suse.com/1225383

https://bugzilla.suse.com/1225384

https://bugzilla.suse.com/1225386

https://bugzilla.suse.com/1225387

https://bugzilla.suse.com/1225388

https://bugzilla.suse.com/1225390

https://bugzilla.suse.com/1225392

https://bugzilla.suse.com/1225393

https://bugzilla.suse.com/1225396

https://bugzilla.suse.com/1225400

https://bugzilla.suse.com/1225404

https://bugzilla.suse.com/1225405

https://bugzilla.suse.com/1225408

https://bugzilla.suse.com/1225409

https://bugzilla.suse.com/1225410

https://bugzilla.suse.com/1225411

https://bugzilla.suse.com/1225424

https://bugzilla.suse.com/1225425

https://bugzilla.suse.com/1225427

https://bugzilla.suse.com/1225431

https://bugzilla.suse.com/1225435

https://bugzilla.suse.com/1225436

https://bugzilla.suse.com/1225437

https://bugzilla.suse.com/1225438

https://bugzilla.suse.com/1225439

https://bugzilla.suse.com/1225441

https://bugzilla.suse.com/1225442

https://bugzilla.suse.com/1225443

https://bugzilla.suse.com/1225444

https://bugzilla.suse.com/1225445

https://bugzilla.suse.com/1225446

https://bugzilla.suse.com/1225447

https://bugzilla.suse.com/1225450

https://bugzilla.suse.com/1225453

https://bugzilla.suse.com/1225455

https://bugzilla.suse.com/1225461

https://bugzilla.suse.com/1225463

https://bugzilla.suse.com/1225464

https://bugzilla.suse.com/1225466

https://bugzilla.suse.com/1225467

https://bugzilla.suse.com/1225468

https://bugzilla.suse.com/1225471

https://bugzilla.suse.com/1225472

https://bugzilla.suse.com/1225478

https://bugzilla.suse.com/1225479

https://bugzilla.suse.com/1225480

https://bugzilla.suse.com/1225482

https://bugzilla.suse.com/1225483

https://bugzilla.suse.com/1225486

https://bugzilla.suse.com/1225488

https://bugzilla.suse.com/1225490

https://bugzilla.suse.com/1225492

https://bugzilla.suse.com/1225495

https://bugzilla.suse.com/1225499

https://bugzilla.suse.com/1225500

https://bugzilla.suse.com/1225501

https://bugzilla.suse.com/1225502

https://bugzilla.suse.com/1225506

https://bugzilla.suse.com/1225508

https://bugzilla.suse.com/1225510

https://bugzilla.suse.com/1225513

https://bugzilla.suse.com/1225515

https://bugzilla.suse.com/1225529

https://bugzilla.suse.com/1225530

https://bugzilla.suse.com/1225532

https://bugzilla.suse.com/1225534

https://bugzilla.suse.com/1225535

https://bugzilla.suse.com/1225548

https://bugzilla.suse.com/1225549

https://bugzilla.suse.com/1225550

https://bugzilla.suse.com/1225553

https://bugzilla.suse.com/1225554

https://bugzilla.suse.com/1225555

https://bugzilla.suse.com/1225556

https://bugzilla.suse.com/1225557

https://bugzilla.suse.com/1225559

https://bugzilla.suse.com/1225560

https://bugzilla.suse.com/1225565

https://bugzilla.suse.com/1225566

https://bugzilla.suse.com/1225568

https://bugzilla.suse.com/1225569

https://bugzilla.suse.com/1225570

https://bugzilla.suse.com/1225571

https://bugzilla.suse.com/1225572

https://bugzilla.suse.com/1225577

https://bugzilla.suse.com/1225583

https://bugzilla.suse.com/1225584

https://bugzilla.suse.com/1225587

https://bugzilla.suse.com/1225588

https://bugzilla.suse.com/1225589

https://bugzilla.suse.com/1225590

https://bugzilla.suse.com/1225591

https://bugzilla.suse.com/1225592

https://bugzilla.suse.com/1225593

https://bugzilla.suse.com/1225595

https://bugzilla.suse.com/1225599

https://bugzilla.suse.com/1225616

https://bugzilla.suse.com/1225640

https://bugzilla.suse.com/1225642

https://bugzilla.suse.com/1225705

https://bugzilla.suse.com/1225708

https://bugzilla.suse.com/1225715

https://bugzilla.suse.com/1225720

https://bugzilla.suse.com/1225722

https://bugzilla.suse.com/1225734

https://bugzilla.suse.com/1225735

https://bugzilla.suse.com/1225747

https://bugzilla.suse.com/1225748

https://bugzilla.suse.com/1225756

https://bugzilla.suse.com/1225761

https://bugzilla.suse.com/1225766

https://bugzilla.suse.com/1225775

https://bugzilla.suse.com/1225810

https://bugzilla.suse.com/1225820

https://bugzilla.suse.com/1225829

https://bugzilla.suse.com/1225835

https://bugzilla.suse.com/1225842

https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html

https://www.suse.com/security/cve/CVE-2020-36788

https://www.suse.com/security/cve/CVE-2021-4148

https://www.suse.com/security/cve/CVE-2021-43527

https://www.suse.com/security/cve/CVE-2021-47358

https://www.suse.com/security/cve/CVE-2021-47359

https://www.suse.com/security/cve/CVE-2021-47360

https://www.suse.com/security/cve/CVE-2021-47361

https://www.suse.com/security/cve/CVE-2021-47362

https://www.suse.com/security/cve/CVE-2021-47363

https://www.suse.com/security/cve/CVE-2021-47364

https://www.suse.com/security/cve/CVE-2021-47365

https://www.suse.com/security/cve/CVE-2021-47366

https://www.suse.com/security/cve/CVE-2021-47367

https://www.suse.com/security/cve/CVE-2021-47368

https://www.suse.com/security/cve/CVE-2021-47369

https://www.suse.com/security/cve/CVE-2021-47370

https://www.suse.com/security/cve/CVE-2021-47371

https://www.suse.com/security/cve/CVE-2021-47372

https://www.suse.com/security/cve/CVE-2021-47373

https://www.suse.com/security/cve/CVE-2021-47374

https://www.suse.com/security/cve/CVE-2021-47375

https://www.suse.com/security/cve/CVE-2021-47376

https://www.suse.com/security/cve/CVE-2021-47378

https://www.suse.com/security/cve/CVE-2021-47379

https://www.suse.com/security/cve/CVE-2021-47380

https://www.suse.com/security/cve/CVE-2021-47381

https://www.suse.com/security/cve/CVE-2021-47382

https://www.suse.com/security/cve/CVE-2021-47383

https://www.suse.com/security/cve/CVE-2021-47384

https://www.suse.com/security/cve/CVE-2021-47385

https://www.suse.com/security/cve/CVE-2021-47386

https://www.suse.com/security/cve/CVE-2021-47387

https://www.suse.com/security/cve/CVE-2021-47388

https://www.suse.com/security/cve/CVE-2021-47389

https://www.suse.com/security/cve/CVE-2021-47390

https://www.suse.com/security/cve/CVE-2021-47391

https://www.suse.com/security/cve/CVE-2021-47392

https://www.suse.com/security/cve/CVE-2023-52744

https://www.suse.com/security/cve/CVE-2023-52745

https://www.suse.com/security/cve/CVE-2023-52746

https://www.suse.com/security/cve/CVE-2023-52747

https://www.suse.com/security/cve/CVE-2023-52753

https://www.suse.com/security/cve/CVE-2023-52754

https://www.suse.com/security/cve/CVE-2023-52756

https://www.suse.com/security/cve/CVE-2023-52757

https://www.suse.com/security/cve/CVE-2023-52759

https://www.suse.com/security/cve/CVE-2023-52763

https://www.suse.com/security/cve/CVE-2023-52764

https://www.suse.com/security/cve/CVE-2023-52766

https://www.suse.com/security/cve/CVE-2023-52773

https://www.suse.com/security/cve/CVE-2023-52774

https://www.suse.com/security/cve/CVE-2023-52777

https://www.suse.com/security/cve/CVE-2023-52781

https://www.suse.com/security/cve/CVE-2023-52788

https://www.suse.com/security/cve/CVE-2023-52789

https://www.suse.com/security/cve/CVE-2023-52791

https://www.suse.com/security/cve/CVE-2023-52795

https://www.suse.com/security/cve/CVE-2023-52796

https://www.suse.com/security/cve/CVE-2023-52798

https://www.suse.com/security/cve/CVE-2023-52799

https://www.suse.com/security/cve/CVE-2023-52800

https://www.suse.com/security/cve/CVE-2023-52803

https://www.suse.com/security/cve/CVE-2023-52804

https://www.suse.com/security/cve/CVE-2023-52805

https://www.suse.com/security/cve/CVE-2023-52806

https://www.suse.com/security/cve/CVE-2023-52807

https://www.suse.com/security/cve/CVE-2023-52808

https://www.suse.com/security/cve/CVE-2023-52809

https://www.suse.com/security/cve/CVE-2023-52810

https://www.suse.com/security/cve/CVE-2023-52811

https://www.suse.com/security/cve/CVE-2023-52814

https://www.suse.com/security/cve/CVE-2023-52815

https://www.suse.com/security/cve/CVE-2023-52816

https://www.suse.com/security/cve/CVE-2023-52817

https://www.suse.com/security/cve/CVE-2023-52818

https://www.suse.com/security/cve/CVE-2023-52819

https://www.suse.com/security/cve/CVE-2023-52821

https://www.suse.com/security/cve/CVE-2023-52825

https://www.suse.com/security/cve/CVE-2023-52826

https://www.suse.com/security/cve/CVE-2023-52832

https://www.suse.com/security/cve/CVE-2023-52833

https://www.suse.com/security/cve/CVE-2023-52834

https://www.suse.com/security/cve/CVE-2023-52838

https://www.suse.com/security/cve/CVE-2023-52840

https://www.suse.com/security/cve/CVE-2023-52841

https://www.suse.com/security/cve/CVE-2023-52844

https://www.suse.com/security/cve/CVE-2023-52847

https://www.suse.com/security/cve/CVE-2023-52851

https://www.suse.com/security/cve/CVE-2023-52853

https://www.suse.com/security/cve/CVE-2023-52854

https://www.suse.com/security/cve/CVE-2023-52855

https://www.suse.com/security/cve/CVE-2023-52856

https://www.suse.com/security/cve/CVE-2023-52858

https://www.suse.com/security/cve/CVE-2023-52860

https://www.suse.com/security/cve/CVE-2023-52861

https://www.suse.com/security/cve/CVE-2023-52864

https://www.suse.com/security/cve/CVE-2023-52865

https://www.suse.com/security/cve/CVE-2023-52867

https://www.suse.com/security/cve/CVE-2023-52868

https://www.suse.com/security/cve/CVE-2023-52870

https://www.suse.com/security/cve/CVE-2023-52871

https://www.suse.com/security/cve/CVE-2023-52872

https://www.suse.com/security/cve/CVE-2023-52873

https://www.suse.com/security/cve/CVE-2023-52875

https://www.suse.com/security/cve/CVE-2023-52876

https://www.suse.com/security/cve/CVE-2023-52877

https://www.suse.com/security/cve/CVE-2023-52878

https://www.suse.com/security/cve/CVE-2023-52880

https://www.suse.com/security/cve/CVE-2023-6531

https://www.suse.com/security/cve/CVE-2024-2201

https://www.suse.com/security/cve/CVE-2024-26597

https://www.suse.com/security/cve/CVE-2024-26643

https://www.suse.com/security/cve/CVE-2024-26679

https://www.suse.com/security/cve/CVE-2024-26692

https://www.suse.com/security/cve/CVE-2024-26698

https://www.suse.com/security/cve/CVE-2024-26700

https://www.suse.com/security/cve/CVE-2024-26715

https://www.suse.com/security/cve/CVE-2024-26739

https://www.suse.com/security/cve/CVE-2024-26742

https://www.suse.com/security/cve/CVE-2024-26748

https://www.suse.com/security/cve/CVE-2024-26758

https://www.suse.com/security/cve/CVE-2024-26764

https://www.suse.com/security/cve/CVE-2024-26775

https://www.suse.com/security/cve/CVE-2024-26777

https://www.suse.com/security/cve/CVE-2024-26778

https://www.suse.com/security/cve/CVE-2024-26788

https://www.suse.com/security/cve/CVE-2024-26791

https://www.suse.com/security/cve/CVE-2024-26801

https://www.suse.com/security/cve/CVE-2024-26822

https://www.suse.com/security/cve/CVE-2024-26828

https://www.suse.com/security/cve/CVE-2024-26829

https://www.suse.com/security/cve/CVE-2024-26838

https://www.suse.com/security/cve/CVE-2024-26839

https://www.suse.com/security/cve/CVE-2024-26840

https://www.suse.com/security/cve/CVE-2024-26846

https://www.suse.com/security/cve/CVE-2024-26859

https://www.suse.com/security/cve/CVE-2024-26870

https://www.suse.com/security/cve/CVE-2024-26874

https://www.suse.com/security/cve/CVE-2024-26876

https://www.suse.com/security/cve/CVE-2024-26877

https://www.suse.com/security/cve/CVE-2024-26880

https://www.suse.com/security/cve/CVE-2024-26889

https://www.suse.com/security/cve/CVE-2024-26894

https://www.suse.com/security/cve/CVE-2024-26900

https://www.suse.com/security/cve/CVE-2024-26907

https://www.suse.com/security/cve/CVE-2024-26915

https://www.suse.com/security/cve/CVE-2024-26916

https://www.suse.com/security/cve/CVE-2024-26919

https://www.suse.com/security/cve/CVE-2024-26920

https://www.suse.com/security/cve/CVE-2024-26921

https://www.suse.com/security/cve/CVE-2024-26922

https://www.suse.com/security/cve/CVE-2024-26925

https://www.suse.com/security/cve/CVE-2024-26928

https://www.suse.com/security/cve/CVE-2024-26929

https://www.suse.com/security/cve/CVE-2024-26930

https://www.suse.com/security/cve/CVE-2024-26931

https://www.suse.com/security/cve/CVE-2024-26933

https://www.suse.com/security/cve/CVE-2024-26934

https://www.suse.com/security/cve/CVE-2024-26935

https://www.suse.com/security/cve/CVE-2024-26937

https://www.suse.com/security/cve/CVE-2024-26938

https://www.suse.com/security/cve/CVE-2024-26939

https://www.suse.com/security/cve/CVE-2024-26940

https://www.suse.com/security/cve/CVE-2024-26943

https://www.suse.com/security/cve/CVE-2024-26957

https://www.suse.com/security/cve/CVE-2024-26958

https://www.suse.com/security/cve/CVE-2024-26964

https://www.suse.com/security/cve/CVE-2024-26974

https://www.suse.com/security/cve/CVE-2024-26977

https://www.suse.com/security/cve/CVE-2024-26979

https://www.suse.com/security/cve/CVE-2024-26984

https://www.suse.com/security/cve/CVE-2024-26988

https://www.suse.com/security/cve/CVE-2024-26989

https://www.suse.com/security/cve/CVE-2024-26994

https://www.suse.com/security/cve/CVE-2024-26996

https://www.suse.com/security/cve/CVE-2024-26997

https://www.suse.com/security/cve/CVE-2024-26999

https://www.suse.com/security/cve/CVE-2024-27000

https://www.suse.com/security/cve/CVE-2024-27001

https://www.suse.com/security/cve/CVE-2024-27004

https://www.suse.com/security/cve/CVE-2024-27008

https://www.suse.com/security/cve/CVE-2024-27028

https://www.suse.com/security/cve/CVE-2024-27037

https://www.suse.com/security/cve/CVE-2024-27042

https://www.suse.com/security/cve/CVE-2024-27045

https://www.suse.com/security/cve/CVE-2024-27047

https://www.suse.com/security/cve/CVE-2024-27051

https://www.suse.com/security/cve/CVE-2024-27052

https://www.suse.com/security/cve/CVE-2024-27053

https://www.suse.com/security/cve/CVE-2024-27054

https://www.suse.com/security/cve/CVE-2024-27059

https://www.suse.com/security/cve/CVE-2024-27072

https://www.suse.com/security/cve/CVE-2024-27073

https://www.suse.com/security/cve/CVE-2024-27074

https://www.suse.com/security/cve/CVE-2024-27075

https://www.suse.com/security/cve/CVE-2024-27076

https://www.suse.com/security/cve/CVE-2024-27077

https://www.suse.com/security/cve/CVE-2024-27078

https://www.suse.com/security/cve/CVE-2024-27388

https://www.suse.com/security/cve/CVE-2024-27393

https://www.suse.com/security/cve/CVE-2024-27395

https://www.suse.com/security/cve/CVE-2024-27396

https://www.suse.com/security/cve/CVE-2024-27398

https://www.suse.com/security/cve/CVE-2024-27399

https://www.suse.com/security/cve/CVE-2024-27400

https://www.suse.com/security/cve/CVE-2024-27401

https://www.suse.com/security/cve/CVE-2024-27405

https://www.suse.com/security/cve/CVE-2024-27410

https://www.suse.com/security/cve/CVE-2024-27412

https://www.suse.com/security/cve/CVE-2024-27413

https://www.suse.com/security/cve/CVE-2024-27416

https://www.suse.com/security/cve/CVE-2024-27417

https://www.suse.com/security/cve/CVE-2024-27419

https://www.suse.com/security/cve/CVE-2024-27431

https://www.suse.com/security/cve/CVE-2024-27435

https://www.suse.com/security/cve/CVE-2024-27436

https://www.suse.com/security/cve/CVE-2024-35789

https://www.suse.com/security/cve/CVE-2024-35791

https://www.suse.com/security/cve/CVE-2024-35796

https://www.suse.com/security/cve/CVE-2024-35799

https://www.suse.com/security/cve/CVE-2024-35801

https://www.suse.com/security/cve/CVE-2024-35804

https://www.suse.com/security/cve/CVE-2024-35806

https://www.suse.com/security/cve/CVE-2024-35809

https://www.suse.com/security/cve/CVE-2024-35811

https://www.suse.com/security/cve/CVE-2024-35812

https://www.suse.com/security/cve/CVE-2024-35813

https://www.suse.com/security/cve/CVE-2024-35815

https://www.suse.com/security/cve/CVE-2024-35817

https://www.suse.com/security/cve/CVE-2024-35821

https://www.suse.com/security/cve/CVE-2024-35822

https://www.suse.com/security/cve/CVE-2024-35823

https://www.suse.com/security/cve/CVE-2024-35825

https://www.suse.com/security/cve/CVE-2024-35828

https://www.suse.com/security/cve/CVE-2024-35829

https://www.suse.com/security/cve/CVE-2024-35830

https://www.suse.com/security/cve/CVE-2024-35833

https://www.suse.com/security/cve/CVE-2024-35845

https://www.suse.com/security/cve/CVE-2024-35847

https://www.suse.com/security/cve/CVE-2024-35849

https://www.suse.com/security/cve/CVE-2024-35851

https://www.suse.com/security/cve/CVE-2024-35852

https://www.suse.com/security/cve/CVE-2024-35854

https://www.suse.com/security/cve/CVE-2024-35860

https://www.suse.com/security/cve/CVE-2024-35861

https://www.suse.com/security/cve/CVE-2024-35862

https://www.suse.com/security/cve/CVE-2024-35863

https://www.suse.com/security/cve/CVE-2024-35864

https://www.suse.com/security/cve/CVE-2024-35865

https://www.suse.com/security/cve/CVE-2024-35866

https://www.suse.com/security/cve/CVE-2024-35867

https://www.suse.com/security/cve/CVE-2024-35868

https://www.suse.com/security/cve/CVE-2024-35869

https://www.suse.com/security/cve/CVE-2024-35870

https://www.suse.com/security/cve/CVE-2024-35872

https://www.suse.com/security/cve/CVE-2024-35875

https://www.suse.com/security/cve/CVE-2024-35877

https://www.suse.com/security/cve/CVE-2024-35878

https://www.suse.com/security/cve/CVE-2024-35879

https://www.suse.com/security/cve/CVE-2024-35885

https://www.suse.com/security/cve/CVE-2024-35887

https://www.suse.com/security/cve/CVE-2024-35895

https://www.suse.com/security/cve/CVE-2024-35901

https://www.suse.com/security/cve/CVE-2024-36007

https://www.suse.com/security/cve/CVE-2024-36012

https://www.suse.com/security/cve/CVE-2024-36014

https://www.suse.com/security/cve/CVE-2024-36015

https://www.suse.com/security/cve/CVE-2024-36016

https://www.suse.com/security/cve/CVE-2024-36026

https://www.suse.com/security/cve/CVE-2024-36029

https://www.suse.com/security/cve/CVE-2024-36032

https://www.suse.com/security/cve/CVE-2024-36880

https://www.suse.com/security/cve/CVE-2024-36893

https://www.suse.com/security/cve/CVE-2024-36896

https://www.suse.com/security/cve/CVE-2024-36897

https://www.suse.com/security/cve/CVE-2024-36906

https://www.suse.com/security/cve/CVE-2024-36918

https://www.suse.com/security/cve/CVE-2024-36924

https://www.suse.com/security/cve/CVE-2024-36926

https://www.suse.com/security/cve/CVE-2024-36928

https://www.suse.com/security/cve/CVE-2024-36931

https://www.suse.com/security/cve/CVE-2024-36938

https://www.suse.com/security/cve/CVE-2024-36940

https://www.suse.com/security/cve/CVE-2024-36941

https://www.suse.com/security/cve/CVE-2024-36942

https://www.suse.com/security/cve/CVE-2024-36944

https://www.suse.com/security/cve/CVE-2024-36947

https://www.suse.com/security/cve/CVE-2024-36950

https://www.suse.com/security/cve/CVE-2024-36952

https://www.suse.com/security/cve/CVE-2024-36955

https://www.suse.com/security/cve/CVE-2024-36959

Plugin Details

Severity: Critical

ID: 201009

File Name: suse_SU-2024-2190-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 6/26/2024

Updated: 6/26/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-43527

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_68-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/25/2024

Vulnerability Publication Date: 12/1/2021

Reference Information

CVE: CVE-2020-36788, CVE-2021-4148, CVE-2021-43527, CVE-2021-47358, CVE-2021-47359, CVE-2021-47360, CVE-2021-47361, CVE-2021-47362, CVE-2021-47363, CVE-2021-47364, CVE-2021-47365, CVE-2021-47366, CVE-2021-47367, CVE-2021-47368, CVE-2021-47369, CVE-2021-47370, CVE-2021-47371, CVE-2021-47372, CVE-2021-47373, CVE-2021-47374, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47380, CVE-2021-47381, CVE-2021-47382, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47391, CVE-2021-47392, CVE-2021-47393, CVE-2021-47394, CVE-2021-47395, CVE-2021-47396, CVE-2021-47397, CVE-2021-47398, CVE-2021-47399, CVE-2021-47400, CVE-2021-47401, CVE-2021-47402, CVE-2021-47403, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47409, CVE-2021-47410, CVE-2021-47412, CVE-2021-47413, CVE-2021-47414, CVE-2021-47415, CVE-2021-47416, CVE-2021-47417, CVE-2021-47418, CVE-2021-47419, CVE-2021-47420, CVE-2021-47421, CVE-2021-47422, CVE-2021-47423, CVE-2021-47424, CVE-2021-47425, CVE-2021-47426, CVE-2021-47427, CVE-2021-47428, CVE-2021-47429, CVE-2021-47430, CVE-2021-47431, CVE-2021-47433, CVE-2021-47434, CVE-2021-47435, CVE-2021-47436, CVE-2021-47437, CVE-2021-47438, CVE-2021-47439, CVE-2021-47440, CVE-2021-47441, CVE-2021-47442, CVE-2021-47443, CVE-2021-47444, CVE-2021-47445, CVE-2021-47446, CVE-2021-47447, CVE-2021-47448, CVE-2021-47449, CVE-2021-47450, CVE-2021-47451, CVE-2021-47452, CVE-2021-47453, CVE-2021-47454, CVE-2021-47455, CVE-2021-47456, CVE-2021-47457, CVE-2021-47458, CVE-2021-47459, CVE-2021-47460, CVE-2021-47461, CVE-2021-47462, CVE-2021-47463, CVE-2021-47464, CVE-2021-47465, CVE-2021-47466, CVE-2021-47467, CVE-2021-47468, CVE-2021-47469, CVE-2021-47470, CVE-2021-47471, CVE-2021-47472, CVE-2021-47473, CVE-2021-47474, CVE-2021-47475, CVE-2021-47476, CVE-2021-47477, CVE-2021-47478, CVE-2021-47479, CVE-2021-47480, CVE-2021-47481, CVE-2021-47482, CVE-2021-47483, CVE-2021-47484, CVE-2021-47485, CVE-2021-47486, CVE-2021-47488, CVE-2021-47489, CVE-2021-47490, CVE-2021-47491, CVE-2021-47492, CVE-2021-47493, CVE-2021-47494, CVE-2021-47495, CVE-2021-47496, CVE-2021-47497, CVE-2021-47498, CVE-2021-47499, CVE-2021-47500, CVE-2021-47501, CVE-2021-47502, CVE-2021-47503, CVE-2021-47504, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47508, CVE-2021-47509, CVE-2021-47510, CVE-2021-47511, CVE-2021-47512, CVE-2021-47513, CVE-2021-47514, CVE-2021-47516, CVE-2021-47518, CVE-2021-47520, CVE-2021-47521, CVE-2021-47522, CVE-2021-47523, CVE-2021-47524, CVE-2021-47525, CVE-2021-47526, CVE-2021-47528, CVE-2021-47529, CVE-2021-47530, CVE-2021-47531, CVE-2021-47532, CVE-2021-47533, CVE-2021-47534, CVE-2021-47535, CVE-2021-47536, CVE-2021-47537, CVE-2021-47540, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47548, CVE-2021-47549, CVE-2021-47550, CVE-2021-47551, CVE-2021-47552, CVE-2021-47553, CVE-2021-47554, CVE-2021-47555, CVE-2021-47556, CVE-2021-47557, CVE-2021-47558, CVE-2021-47559, CVE-2021-47560, CVE-2021-47562, CVE-2021-47563, CVE-2021-47564, CVE-2021-47565, CVE-2021-47569, CVE-2022-48633, CVE-2022-48662, CVE-2022-48669, CVE-2022-48689, CVE-2022-48691, CVE-2022-48699, CVE-2022-48705, CVE-2022-48708, CVE-2022-48709, CVE-2022-48710, CVE-2023-0160, CVE-2023-1829, CVE-2023-42755, CVE-2023-47233, CVE-2023-52586, CVE-2023-52591, CVE-2023-52618, CVE-2023-52642, CVE-2023-52643, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52656, CVE-2023-52657, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52664, CVE-2023-52669, CVE-2023-52671, CVE-2023-52674, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52696, CVE-2023-52698, CVE-2023-52699, CVE-2023-52702, CVE-2023-52703, CVE-2023-52705, CVE-2023-52707, CVE-2023-52708, CVE-2023-52730, CVE-2023-52731, CVE-2023-52732, CVE-2023-52733, CVE-2023-52736, CVE-2023-52738, CVE-2023-52739, CVE-2023-52740, CVE-2023-52741, CVE-2023-52742, CVE-2023-52743, CVE-2023-52744, CVE-2023-52745, CVE-2023-52746, CVE-2023-52747, CVE-2023-52753, CVE-2023-52754, CVE-2023-52756, CVE-2023-52757, CVE-2023-52759, CVE-2023-52763, CVE-2023-52764, CVE-2023-52766, CVE-2023-52773, CVE-2023-52774, CVE-2023-52777, CVE-2023-52781, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52803, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52807, CVE-2023-52808, CVE-2023-52809, CVE-2023-52810, CVE-2023-52811, CVE-2023-52814, CVE-2023-52815, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52844, CVE-2023-52847, CVE-2023-52851, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52858, CVE-2023-52860, CVE-2023-52861, CVE-2023-52864, CVE-2023-52865, CVE-2023-52867, CVE-2023-52868, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52880, CVE-2023-6531, CVE-2024-2201, CVE-2024-26597, CVE-2024-26643, CVE-2024-26679, CVE-2024-26692, CVE-2024-26698, CVE-2024-26700, CVE-2024-26715, CVE-2024-26739, CVE-2024-26742, CVE-2024-26748, CVE-2024-26758, CVE-2024-26764, CVE-2024-26775, CVE-2024-26777, CVE-2024-26778, CVE-2024-26788, CVE-2024-26791, CVE-2024-26801, CVE-2024-26822, CVE-2024-26828, CVE-2024-26829, CVE-2024-26838, CVE-2024-26839, CVE-2024-26840, CVE-2024-26846, CVE-2024-26859, CVE-2024-26870, CVE-2024-26874, CVE-2024-26876, CVE-2024-26877, CVE-2024-26880, CVE-2024-26889, CVE-2024-26894, CVE-2024-26900, CVE-2024-26907, CVE-2024-26915, CVE-2024-26916, CVE-2024-26919, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26925, CVE-2024-26928, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26939, CVE-2024-26940, CVE-2024-26943, CVE-2024-26957, CVE-2024-26958, CVE-2024-26964, CVE-2024-26974, CVE-2024-26977, CVE-2024-26979, CVE-2024-26984, CVE-2024-26988, CVE-2024-26989, CVE-2024-26994, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27028, CVE-2024-27037, CVE-2024-27042, CVE-2024-27045, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27054, CVE-2024-27059, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27419, CVE-2024-27431, CVE-2024-27435, CVE-2024-27436, CVE-2024-35789, CVE-2024-35791, CVE-2024-35796, CVE-2024-35799, CVE-2024-35801, CVE-2024-35804, CVE-2024-35806, CVE-2024-35809, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35815, CVE-2024-35817, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35885, CVE-2024-35887, CVE-2024-35895, CVE-2024-35901, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35922, CVE-2024-35924, CVE-2024-35930, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35938, CVE-2024-35939, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35955, CVE-2024-35959, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35973, CVE-2024-35976, CVE-2024-35978, CVE-2024-35982, CVE-2024-35984, CVE-2024-35989, CVE-2024-35990, CVE-2024-35998, CVE-2024-35999, CVE-2024-36006, CVE-2024-36007, CVE-2024-36012, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36026, CVE-2024-36029, CVE-2024-36032, CVE-2024-36880, CVE-2024-36893, CVE-2024-36896, CVE-2024-36897, CVE-2024-36906, CVE-2024-36918, CVE-2024-36924, CVE-2024-36926, CVE-2024-36928, CVE-2024-36931, CVE-2024-36938, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36950, CVE-2024-36952, CVE-2024-36955, CVE-2024-36959

SuSE: SUSE-SU-2024:2190-1