SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:2939-1)

high Nessus Plugin ID 205734

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2939-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47546: ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869).
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52762: virtio-blk: fix implicit overflow on virtio_max_dma_size (bsc#1225573).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282, bsc#1222072).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (bsc#1222323).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26842: scsi: target: core: Add TMF to tmr_list handling (bsc#1223013).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703).
- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35961: net/mlx5: Register devlink first under devlink lock (bsc#1224585).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (bsc#1226911).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103).
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722).
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: use set_bit() and test_bit() at worker->flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591).
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1082555

https://bugzilla.suse.com/1156395

https://bugzilla.suse.com/1190336

https://bugzilla.suse.com/1191958

https://bugzilla.suse.com/1193454

https://bugzilla.suse.com/1193554

https://bugzilla.suse.com/1193787

https://bugzilla.suse.com/1193883

https://bugzilla.suse.com/1194324

https://bugzilla.suse.com/1194826

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195065

https://bugzilla.suse.com/1195254

https://bugzilla.suse.com/1195341

https://bugzilla.suse.com/1195349

https://bugzilla.suse.com/1195357

https://bugzilla.suse.com/1195668

https://bugzilla.suse.com/1195775

https://bugzilla.suse.com/1195927

https://bugzilla.suse.com/1195957

https://bugzilla.suse.com/1196018

https://bugzilla.suse.com/1196746

https://bugzilla.suse.com/1196823

https://bugzilla.suse.com/1197146

https://bugzilla.suse.com/1197246

https://bugzilla.suse.com/1197762

https://bugzilla.suse.com/1197915

https://bugzilla.suse.com/1198014

https://bugzilla.suse.com/1199295

https://bugzilla.suse.com/1202346

https://bugzilla.suse.com/1202686

https://bugzilla.suse.com/1202767

https://bugzilla.suse.com/1202780

https://bugzilla.suse.com/1205205

https://bugzilla.suse.com/1207361

https://bugzilla.suse.com/1208783

https://bugzilla.suse.com/1209636

https://bugzilla.suse.com/1213123

https://bugzilla.suse.com/1215492

https://bugzilla.suse.com/1215587

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1217912

https://bugzilla.suse.com/1218148

https://bugzilla.suse.com/1218570

https://bugzilla.suse.com/1218820

https://bugzilla.suse.com/1219224

https://bugzilla.suse.com/1219633

https://bugzilla.suse.com/1219832

https://bugzilla.suse.com/1219847

https://bugzilla.suse.com/1220138

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1220368

https://bugzilla.suse.com/1220812

https://bugzilla.suse.com/1220869

https://bugzilla.suse.com/1220876

https://bugzilla.suse.com/1220942

https://bugzilla.suse.com/1220952

https://bugzilla.suse.com/1220958

https://bugzilla.suse.com/1221010

https://bugzilla.suse.com/1221086

https://bugzilla.suse.com/1221282

https://bugzilla.suse.com/1221647

https://bugzilla.suse.com/1221654

https://bugzilla.suse.com/1221656

https://bugzilla.suse.com/1221659

https://bugzilla.suse.com/1221958

https://bugzilla.suse.com/1222015

https://bugzilla.suse.com/1222072

https://bugzilla.suse.com/1222080

https://bugzilla.suse.com/1222241

https://bugzilla.suse.com/1222254

https://bugzilla.suse.com/1222323

https://bugzilla.suse.com/1222326

https://bugzilla.suse.com/1222328

https://bugzilla.suse.com/1222364

https://bugzilla.suse.com/1222625

https://bugzilla.suse.com/1222702

https://bugzilla.suse.com/1222728

https://bugzilla.suse.com/1222799

https://bugzilla.suse.com/1222809

https://bugzilla.suse.com/1222810

https://bugzilla.suse.com/1222893

https://bugzilla.suse.com/1223013

https://bugzilla.suse.com/1223018

https://bugzilla.suse.com/1223021

https://bugzilla.suse.com/1223180

https://bugzilla.suse.com/1223265

https://bugzilla.suse.com/1223384

https://bugzilla.suse.com/1223635

https://bugzilla.suse.com/1223641

https://bugzilla.suse.com/1223652

https://bugzilla.suse.com/1223675

https://bugzilla.suse.com/1223778

https://bugzilla.suse.com/1223806

https://bugzilla.suse.com/1223813

https://bugzilla.suse.com/1223815

https://bugzilla.suse.com/1223836

https://bugzilla.suse.com/1223863

https://bugzilla.suse.com/1224020

https://bugzilla.suse.com/1224331

https://bugzilla.suse.com/1224414

https://bugzilla.suse.com/1224488

https://bugzilla.suse.com/1224497

https://bugzilla.suse.com/1224498

https://bugzilla.suse.com/1224499

https://bugzilla.suse.com/1224500

https://bugzilla.suse.com/1224504

https://bugzilla.suse.com/1224512

https://bugzilla.suse.com/1224516

https://bugzilla.suse.com/1224517

https://bugzilla.suse.com/1224520

https://bugzilla.suse.com/1224539

https://bugzilla.suse.com/1226750

https://bugzilla.suse.com/1226754

https://bugzilla.suse.com/1226757

https://bugzilla.suse.com/1226762

https://bugzilla.suse.com/1226764

https://bugzilla.suse.com/1226767

https://bugzilla.suse.com/1226768

https://bugzilla.suse.com/1226769

https://bugzilla.suse.com/1226771

https://bugzilla.suse.com/1226774

https://bugzilla.suse.com/1226775

https://bugzilla.suse.com/1226777

https://bugzilla.suse.com/1226780

https://bugzilla.suse.com/1226781

https://bugzilla.suse.com/1226783

https://bugzilla.suse.com/1226785

https://bugzilla.suse.com/1226786

https://bugzilla.suse.com/1226789

https://bugzilla.suse.com/1226791

https://bugzilla.suse.com/1226834

https://bugzilla.suse.com/1226837

https://bugzilla.suse.com/1226839

https://bugzilla.suse.com/1226840

https://bugzilla.suse.com/1226841

https://bugzilla.suse.com/1226842

https://bugzilla.suse.com/1226848

https://bugzilla.suse.com/1226852

https://bugzilla.suse.com/1226857

https://bugzilla.suse.com/1224540

https://bugzilla.suse.com/1224545

https://bugzilla.suse.com/1224548

https://bugzilla.suse.com/1224552

https://bugzilla.suse.com/1224557

https://bugzilla.suse.com/1224572

https://bugzilla.suse.com/1224573

https://bugzilla.suse.com/1224583

https://bugzilla.suse.com/1224585

https://bugzilla.suse.com/1224588

https://bugzilla.suse.com/1224602

https://bugzilla.suse.com/1224603

https://bugzilla.suse.com/1224604

https://bugzilla.suse.com/1224605

https://bugzilla.suse.com/1224612

https://bugzilla.suse.com/1224614

https://bugzilla.suse.com/1224619

https://bugzilla.suse.com/1224636

https://bugzilla.suse.com/1224641

https://bugzilla.suse.com/1224661

https://bugzilla.suse.com/1224662

https://bugzilla.suse.com/1224670

https://bugzilla.suse.com/1224671

https://bugzilla.suse.com/1224674

https://bugzilla.suse.com/1224677

https://bugzilla.suse.com/1224679

https://bugzilla.suse.com/1224683

https://bugzilla.suse.com/1224694

https://bugzilla.suse.com/1224696

https://bugzilla.suse.com/1224700

https://bugzilla.suse.com/1224703

https://bugzilla.suse.com/1224712

https://bugzilla.suse.com/1224716

https://bugzilla.suse.com/1224719

https://bugzilla.suse.com/1224735

https://bugzilla.suse.com/1224743

https://bugzilla.suse.com/1224749

https://bugzilla.suse.com/1224764

https://bugzilla.suse.com/1224765

https://bugzilla.suse.com/1224766

https://bugzilla.suse.com/1224935

https://bugzilla.suse.com/1224946

https://bugzilla.suse.com/1224951

https://bugzilla.suse.com/1225050

https://bugzilla.suse.com/1225088

https://bugzilla.suse.com/1225098

https://bugzilla.suse.com/1225105

https://bugzilla.suse.com/1225272

https://bugzilla.suse.com/1225300

https://bugzilla.suse.com/1225389

https://bugzilla.suse.com/1225391

https://bugzilla.suse.com/1225419

https://bugzilla.suse.com/1225426

https://bugzilla.suse.com/1225448

https://bugzilla.suse.com/1225452

https://bugzilla.suse.com/1225467

https://bugzilla.suse.com/1225475

https://bugzilla.suse.com/1225484

https://bugzilla.suse.com/1225487

https://bugzilla.suse.com/1225489

https://bugzilla.suse.com/1225504

https://bugzilla.suse.com/1225505

https://bugzilla.suse.com/1225514

https://bugzilla.suse.com/1225518

https://bugzilla.suse.com/1225535

https://bugzilla.suse.com/1225564

https://bugzilla.suse.com/1225573

https://bugzilla.suse.com/1225581

https://bugzilla.suse.com/1225585

https://bugzilla.suse.com/1225586

https://bugzilla.suse.com/1225602

https://bugzilla.suse.com/1225611

https://bugzilla.suse.com/1225681

https://bugzilla.suse.com/1225692

https://bugzilla.suse.com/1225698

https://bugzilla.suse.com/1225699

https://bugzilla.suse.com/1225704

https://bugzilla.suse.com/1225711

https://bugzilla.suse.com/1225714

https://bugzilla.suse.com/1225717

https://bugzilla.suse.com/1225719

https://bugzilla.suse.com/1225726

https://bugzilla.suse.com/1225732

https://bugzilla.suse.com/1225737

https://bugzilla.suse.com/1225744

https://bugzilla.suse.com/1225745

https://bugzilla.suse.com/1225746

https://bugzilla.suse.com/1225749

https://bugzilla.suse.com/1225752

https://bugzilla.suse.com/1225753

https://bugzilla.suse.com/1225757

https://bugzilla.suse.com/1225758

https://bugzilla.suse.com/1225759

https://bugzilla.suse.com/1225760

https://bugzilla.suse.com/1225767

https://bugzilla.suse.com/1225770

https://bugzilla.suse.com/1225815

https://bugzilla.suse.com/1225823

https://bugzilla.suse.com/1225834

https://bugzilla.suse.com/1225838

https://bugzilla.suse.com/1225840

https://bugzilla.suse.com/1225851

https://bugzilla.suse.com/1225866

https://bugzilla.suse.com/1225872

https://bugzilla.suse.com/1225894

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226022

https://bugzilla.suse.com/1226131

https://bugzilla.suse.com/1226145

https://bugzilla.suse.com/1226149

https://bugzilla.suse.com/1226155

https://bugzilla.suse.com/1226202

https://bugzilla.suse.com/1226211

https://bugzilla.suse.com/1226212

https://bugzilla.suse.com/1226226

https://bugzilla.suse.com/1226502

https://bugzilla.suse.com/1226514

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1226520

https://bugzilla.suse.com/1226537

https://bugzilla.suse.com/1226538

https://bugzilla.suse.com/1226539

https://bugzilla.suse.com/1226550

https://bugzilla.suse.com/1226551

https://bugzilla.suse.com/1226552

https://bugzilla.suse.com/1226553

https://bugzilla.suse.com/1226554

https://bugzilla.suse.com/1226555

https://bugzilla.suse.com/1226556

https://bugzilla.suse.com/1226557

https://bugzilla.suse.com/1226558

https://bugzilla.suse.com/1226559

https://bugzilla.suse.com/1226561

https://bugzilla.suse.com/1226562

https://bugzilla.suse.com/1226563

https://bugzilla.suse.com/1226564

https://bugzilla.suse.com/1226565

https://bugzilla.suse.com/1226566

https://bugzilla.suse.com/1226567

https://bugzilla.suse.com/1226568

https://bugzilla.suse.com/1226569

https://bugzilla.suse.com/1226570

https://bugzilla.suse.com/1226571

https://bugzilla.suse.com/1226572

https://bugzilla.suse.com/1226574

https://bugzilla.suse.com/1226575

https://bugzilla.suse.com/1226576

https://bugzilla.suse.com/1226577

https://bugzilla.suse.com/1226579

https://bugzilla.suse.com/1226580

https://bugzilla.suse.com/1226581

https://bugzilla.suse.com/1226582

https://bugzilla.suse.com/1226583

https://bugzilla.suse.com/1226585

https://bugzilla.suse.com/1226587

https://bugzilla.suse.com/1226588

https://bugzilla.suse.com/1226593

https://bugzilla.suse.com/1226595

https://bugzilla.suse.com/1226597

https://bugzilla.suse.com/1226601

https://bugzilla.suse.com/1226602

https://bugzilla.suse.com/1226603

https://bugzilla.suse.com/1226607

https://bugzilla.suse.com/1226610

https://bugzilla.suse.com/1226614

https://bugzilla.suse.com/1226616

https://bugzilla.suse.com/1226617

https://bugzilla.suse.com/1226861

https://bugzilla.suse.com/1226863

https://bugzilla.suse.com/1226864

https://bugzilla.suse.com/1226867

https://bugzilla.suse.com/1226868

https://bugzilla.suse.com/1226876

https://bugzilla.suse.com/1226878

https://bugzilla.suse.com/1226883

https://bugzilla.suse.com/1226886

https://bugzilla.suse.com/1226890

https://bugzilla.suse.com/1226891

https://bugzilla.suse.com/1226895

https://bugzilla.suse.com/1226908

https://bugzilla.suse.com/1226911

https://bugzilla.suse.com/1226915

https://bugzilla.suse.com/1226928

https://bugzilla.suse.com/1226948

https://bugzilla.suse.com/1226949

https://bugzilla.suse.com/1226950

https://bugzilla.suse.com/1226953

https://bugzilla.suse.com/1226962

https://bugzilla.suse.com/1226976

https://bugzilla.suse.com/1226990

https://bugzilla.suse.com/1226992

https://bugzilla.suse.com/1226993

https://bugzilla.suse.com/1226994

https://bugzilla.suse.com/1226996

https://bugzilla.suse.com/1227066

https://bugzilla.suse.com/1227090

https://bugzilla.suse.com/1227096

https://bugzilla.suse.com/1227101

https://bugzilla.suse.com/1227103

https://bugzilla.suse.com/1227121

https://bugzilla.suse.com/1227157

https://bugzilla.suse.com/1227162

https://bugzilla.suse.com/1227274

https://bugzilla.suse.com/1227362

https://bugzilla.suse.com/1227383

https://bugzilla.suse.com/1227432

https://bugzilla.suse.com/1227435

https://bugzilla.suse.com/1227447

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227573

https://bugzilla.suse.com/1227618

https://bugzilla.suse.com/1227620

https://bugzilla.suse.com/1227626

https://bugzilla.suse.com/1227635

https://bugzilla.suse.com/1227661

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227722

https://bugzilla.suse.com/1227724

https://bugzilla.suse.com/1227725

https://bugzilla.suse.com/1227728

https://bugzilla.suse.com/1227729

https://bugzilla.suse.com/1227730

https://bugzilla.suse.com/1227732

https://bugzilla.suse.com/1227733

https://bugzilla.suse.com/1227750

https://bugzilla.suse.com/1227754

https://bugzilla.suse.com/1227755

https://bugzilla.suse.com/1227760

https://bugzilla.suse.com/1227762

https://bugzilla.suse.com/1227763

https://bugzilla.suse.com/1227764

https://bugzilla.suse.com/1227766

https://bugzilla.suse.com/1227770

https://bugzilla.suse.com/1227771

https://bugzilla.suse.com/1227772

https://bugzilla.suse.com/1227774

https://bugzilla.suse.com/1227779

https://bugzilla.suse.com/1227780

https://bugzilla.suse.com/1227783

https://bugzilla.suse.com/1227786

https://bugzilla.suse.com/1227787

https://bugzilla.suse.com/1227790

https://bugzilla.suse.com/1227792

https://bugzilla.suse.com/1227796

https://bugzilla.suse.com/1227981

https://bugzilla.suse.com/1227982

https://bugzilla.suse.com/1227985

https://bugzilla.suse.com/1227986

https://bugzilla.suse.com/1227987

https://bugzilla.suse.com/1227988

https://bugzilla.suse.com/1227989

https://bugzilla.suse.com/1227990

https://bugzilla.suse.com/1227991

https://bugzilla.suse.com/1227992

https://bugzilla.suse.com/1227993

https://bugzilla.suse.com/1227995

https://bugzilla.suse.com/1227996

https://bugzilla.suse.com/1227997

https://bugzilla.suse.com/1228000

https://bugzilla.suse.com/1228002

https://bugzilla.suse.com/1228003

https://bugzilla.suse.com/1228004

https://bugzilla.suse.com/1228005

https://bugzilla.suse.com/1228006

https://bugzilla.suse.com/1228007

https://bugzilla.suse.com/1228008

https://bugzilla.suse.com/1228009

https://bugzilla.suse.com/1228010

https://bugzilla.suse.com/1228011

https://bugzilla.suse.com/1228013

https://bugzilla.suse.com/1228014

https://bugzilla.suse.com/1228015

https://bugzilla.suse.com/1228019

https://bugzilla.suse.com/1228020

https://bugzilla.suse.com/1228025

https://bugzilla.suse.com/1228028

https://bugzilla.suse.com/1228035

https://bugzilla.suse.com/1228037

https://bugzilla.suse.com/1228038

https://bugzilla.suse.com/1228039

https://bugzilla.suse.com/1228040

https://bugzilla.suse.com/1228045

https://bugzilla.suse.com/1228054

https://bugzilla.suse.com/1228055

https://bugzilla.suse.com/1228056

https://bugzilla.suse.com/1228060

https://bugzilla.suse.com/1228061

https://bugzilla.suse.com/1228062

https://bugzilla.suse.com/1228063

https://bugzilla.suse.com/1228064

https://bugzilla.suse.com/1228066

https://bugzilla.suse.com/1228067

https://bugzilla.suse.com/1228068

https://bugzilla.suse.com/1228071

https://bugzilla.suse.com/1228079

https://bugzilla.suse.com/1228090

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228140

https://bugzilla.suse.com/1228190

https://bugzilla.suse.com/1226618

https://bugzilla.suse.com/1226619

https://bugzilla.suse.com/1226621

https://bugzilla.suse.com/1226622

https://bugzilla.suse.com/1226624

https://bugzilla.suse.com/1226626

https://bugzilla.suse.com/1226628

https://bugzilla.suse.com/1226629

https://bugzilla.suse.com/1226632

https://bugzilla.suse.com/1226633

https://bugzilla.suse.com/1226634

https://bugzilla.suse.com/1226637

https://bugzilla.suse.com/1226643

https://bugzilla.suse.com/1226644

https://bugzilla.suse.com/1226645

https://bugzilla.suse.com/1226647

https://bugzilla.suse.com/1226650

https://bugzilla.suse.com/1226653

https://bugzilla.suse.com/1226657

https://bugzilla.suse.com/1226658

https://bugzilla.suse.com/1226669

https://bugzilla.suse.com/1226670

https://bugzilla.suse.com/1226672

https://bugzilla.suse.com/1226673

https://bugzilla.suse.com/1226674

https://bugzilla.suse.com/1226675

https://bugzilla.suse.com/1226678

https://bugzilla.suse.com/1226679

https://bugzilla.suse.com/1226683

https://bugzilla.suse.com/1226685

https://bugzilla.suse.com/1226686

https://bugzilla.suse.com/1226690

https://bugzilla.suse.com/1226691

https://bugzilla.suse.com/1226692

https://bugzilla.suse.com/1226693

https://bugzilla.suse.com/1226696

https://bugzilla.suse.com/1226697

https://bugzilla.suse.com/1226698

https://bugzilla.suse.com/1226699

https://bugzilla.suse.com/1226701

https://bugzilla.suse.com/1226702

https://bugzilla.suse.com/1226703

https://bugzilla.suse.com/1226704

https://bugzilla.suse.com/1226705

https://bugzilla.suse.com/1226706

https://bugzilla.suse.com/1226708

https://bugzilla.suse.com/1226709

https://bugzilla.suse.com/1226710

https://bugzilla.suse.com/1226711

https://bugzilla.suse.com/1226712

https://bugzilla.suse.com/1226713

https://bugzilla.suse.com/1226715

https://bugzilla.suse.com/1226716

https://bugzilla.suse.com/1226718

https://bugzilla.suse.com/1226719

https://bugzilla.suse.com/1226720

https://bugzilla.suse.com/1226721

https://bugzilla.suse.com/1226730

https://bugzilla.suse.com/1226732

https://bugzilla.suse.com/1226734

https://bugzilla.suse.com/1226735

https://bugzilla.suse.com/1226737

https://bugzilla.suse.com/1226738

https://bugzilla.suse.com/1226739

https://bugzilla.suse.com/1226740

https://bugzilla.suse.com/1226744

https://bugzilla.suse.com/1226746

https://bugzilla.suse.com/1226747

https://bugzilla.suse.com/1226749

https://bugzilla.suse.com/1227797

https://bugzilla.suse.com/1227798

https://bugzilla.suse.com/1227800

https://bugzilla.suse.com/1227802

https://bugzilla.suse.com/1227806

https://bugzilla.suse.com/1227808

https://bugzilla.suse.com/1227810

https://bugzilla.suse.com/1227812

https://bugzilla.suse.com/1227813

https://bugzilla.suse.com/1227814

https://bugzilla.suse.com/1227816

https://bugzilla.suse.com/1227820

https://bugzilla.suse.com/1227823

https://bugzilla.suse.com/1227824

https://bugzilla.suse.com/1227828

https://bugzilla.suse.com/1227829

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1227846

https://bugzilla.suse.com/1227849

https://bugzilla.suse.com/1227851

https://bugzilla.suse.com/1227862

https://bugzilla.suse.com/1227864

https://bugzilla.suse.com/1227865

https://bugzilla.suse.com/1227866

https://bugzilla.suse.com/1227870

https://bugzilla.suse.com/1227884

https://bugzilla.suse.com/1227886

https://bugzilla.suse.com/1227891

https://bugzilla.suse.com/1227893

https://bugzilla.suse.com/1227899

https://bugzilla.suse.com/1227900

https://bugzilla.suse.com/1227910

https://bugzilla.suse.com/1227913

https://bugzilla.suse.com/1227917

https://bugzilla.suse.com/1227919

https://bugzilla.suse.com/1227920

https://bugzilla.suse.com/1227921

https://bugzilla.suse.com/1227922

https://bugzilla.suse.com/1227923

https://bugzilla.suse.com/1227924

https://bugzilla.suse.com/1227925

https://bugzilla.suse.com/1227927

https://bugzilla.suse.com/1227928

https://bugzilla.suse.com/1227931

https://bugzilla.suse.com/1227932

https://bugzilla.suse.com/1227933

https://bugzilla.suse.com/1227935

https://bugzilla.suse.com/1227936

https://bugzilla.suse.com/1227938

https://bugzilla.suse.com/1227941

https://bugzilla.suse.com/1227942

https://bugzilla.suse.com/1227944

https://bugzilla.suse.com/1227945

https://bugzilla.suse.com/1227947

https://bugzilla.suse.com/1227948

https://bugzilla.suse.com/1227949

https://bugzilla.suse.com/1227950

https://bugzilla.suse.com/1227952

https://bugzilla.suse.com/1227953

https://bugzilla.suse.com/1227954

https://bugzilla.suse.com/1227956

https://bugzilla.suse.com/1227957

https://bugzilla.suse.com/1227963

https://bugzilla.suse.com/1227964

https://bugzilla.suse.com/1227965

https://bugzilla.suse.com/1227968

https://bugzilla.suse.com/1227969

https://bugzilla.suse.com/1227970

https://bugzilla.suse.com/1227971

https://bugzilla.suse.com/1227972

https://bugzilla.suse.com/1227975

https://bugzilla.suse.com/1227976

https://www.suse.com/security/cve/CVE-2022-48714

https://www.suse.com/security/cve/CVE-2022-48715

https://www.suse.com/security/cve/CVE-2022-48716

https://www.suse.com/security/cve/CVE-2022-48717

https://www.suse.com/security/cve/CVE-2022-48718

https://www.suse.com/security/cve/CVE-2022-48720

https://www.suse.com/security/cve/CVE-2022-48721

https://www.suse.com/security/cve/CVE-2022-48722

https://www.suse.com/security/cve/CVE-2022-48723

https://www.suse.com/security/cve/CVE-2022-48724

https://www.suse.com/security/cve/CVE-2022-48725

https://www.suse.com/security/cve/CVE-2022-48726

https://www.suse.com/security/cve/CVE-2022-48727

https://www.suse.com/security/cve/CVE-2022-48728

https://www.suse.com/security/cve/CVE-2022-48729

https://www.suse.com/security/cve/CVE-2022-48730

https://www.suse.com/security/cve/CVE-2022-48732

https://www.suse.com/security/cve/CVE-2022-48733

https://www.suse.com/security/cve/CVE-2022-48734

https://www.suse.com/security/cve/CVE-2022-48735

https://www.suse.com/security/cve/CVE-2022-48736

https://www.suse.com/security/cve/CVE-2022-48737

https://www.suse.com/security/cve/CVE-2022-48738

https://www.suse.com/security/cve/CVE-2022-48739

https://www.suse.com/security/cve/CVE-2022-48740

https://www.suse.com/security/cve/CVE-2022-48743

https://www.suse.com/security/cve/CVE-2022-48744

https://www.suse.com/security/cve/CVE-2022-48745

https://www.suse.com/security/cve/CVE-2022-48746

https://www.suse.com/security/cve/CVE-2022-48747

https://www.suse.com/security/cve/CVE-2022-48748

https://www.suse.com/security/cve/CVE-2022-48749

https://www.suse.com/security/cve/CVE-2022-48751

https://www.suse.com/security/cve/CVE-2022-48752

https://www.suse.com/security/cve/CVE-2022-48753

https://www.suse.com/security/cve/CVE-2022-48754

https://www.suse.com/security/cve/CVE-2022-48755

https://www.suse.com/security/cve/CVE-2022-48756

https://www.suse.com/security/cve/CVE-2022-48758

https://www.suse.com/security/cve/CVE-2022-48759

https://www.suse.com/security/cve/CVE-2022-48760

https://www.suse.com/security/cve/CVE-2022-48761

https://www.suse.com/security/cve/CVE-2022-48763

https://www.suse.com/security/cve/CVE-2022-48765

https://www.suse.com/security/cve/CVE-2022-48766

https://www.suse.com/security/cve/CVE-2022-48767

https://www.suse.com/security/cve/CVE-2022-48768

https://www.suse.com/security/cve/CVE-2022-48769

https://www.suse.com/security/cve/CVE-2022-48770

https://www.suse.com/security/cve/CVE-2022-48771

https://www.suse.com/security/cve/CVE-2022-48772

https://www.suse.com/security/cve/CVE-2022-48773

https://www.suse.com/security/cve/CVE-2022-48774

https://www.suse.com/security/cve/CVE-2022-48775

https://bugzilla.suse.com/1228191

https://bugzilla.suse.com/1228226

https://bugzilla.suse.com/1228235

https://bugzilla.suse.com/1228247

https://bugzilla.suse.com/1228327

https://bugzilla.suse.com/1228328

https://bugzilla.suse.com/1228330

https://bugzilla.suse.com/1228403

https://bugzilla.suse.com/1228405

https://bugzilla.suse.com/1228408

https://bugzilla.suse.com/1228409

https://bugzilla.suse.com/1228410

https://bugzilla.suse.com/1228418

https://bugzilla.suse.com/1228459

https://bugzilla.suse.com/1228462

https://bugzilla.suse.com/1228470

https://bugzilla.suse.com/1228518

https://bugzilla.suse.com/1228520

https://bugzilla.suse.com/1228530

https://bugzilla.suse.com/1228561

https://bugzilla.suse.com/1228565

https://bugzilla.suse.com/1228580

https://bugzilla.suse.com/1228581

https://bugzilla.suse.com/1228591

https://bugzilla.suse.com/1228599

https://bugzilla.suse.com/1228617

https://bugzilla.suse.com/1228625

https://bugzilla.suse.com/1228626

https://bugzilla.suse.com/1228633

https://bugzilla.suse.com/1228640

https://bugzilla.suse.com/1228644

https://bugzilla.suse.com/1228649

https://bugzilla.suse.com/1228655

https://bugzilla.suse.com/1228665

https://bugzilla.suse.com/1228672

https://bugzilla.suse.com/1228680

https://bugzilla.suse.com/1228705

https://bugzilla.suse.com/1228723

https://bugzilla.suse.com/1228743

https://bugzilla.suse.com/1228756

https://bugzilla.suse.com/1228801

https://bugzilla.suse.com/1228850

https://bugzilla.suse.com/1228857

http://www.nessus.org/u?7101909b

https://www.suse.com/security/cve/CVE-2021-4439

https://www.suse.com/security/cve/CVE-2021-47086

https://www.suse.com/security/cve/CVE-2021-47089

https://www.suse.com/security/cve/CVE-2021-47103

https://www.suse.com/security/cve/CVE-2021-47186

https://www.suse.com/security/cve/CVE-2021-47432

https://www.suse.com/security/cve/CVE-2021-47515

https://www.suse.com/security/cve/CVE-2021-47534

https://www.suse.com/security/cve/CVE-2021-47538

https://www.suse.com/security/cve/CVE-2021-47539

https://www.suse.com/security/cve/CVE-2021-47546

https://www.suse.com/security/cve/CVE-2021-47547

https://www.suse.com/security/cve/CVE-2021-47555

https://www.suse.com/security/cve/CVE-2021-47566

https://www.suse.com/security/cve/CVE-2021-47571

https://www.suse.com/security/cve/CVE-2021-47572

https://www.suse.com/security/cve/CVE-2021-47576

https://www.suse.com/security/cve/CVE-2021-47577

https://www.suse.com/security/cve/CVE-2021-47578

https://www.suse.com/security/cve/CVE-2021-47580

https://www.suse.com/security/cve/CVE-2021-47582

https://www.suse.com/security/cve/CVE-2021-47583

https://www.suse.com/security/cve/CVE-2021-47584

https://www.suse.com/security/cve/CVE-2021-47585

https://www.suse.com/security/cve/CVE-2021-47586

https://www.suse.com/security/cve/CVE-2021-47587

https://www.suse.com/security/cve/CVE-2021-47588

https://www.suse.com/security/cve/CVE-2021-47589

https://www.suse.com/security/cve/CVE-2021-47590

https://www.suse.com/security/cve/CVE-2021-47591

https://www.suse.com/security/cve/CVE-2021-47592

https://www.suse.com/security/cve/CVE-2021-47593

https://www.suse.com/security/cve/CVE-2021-47595

https://www.suse.com/security/cve/CVE-2021-47596

https://www.suse.com/security/cve/CVE-2021-47597

https://www.suse.com/security/cve/CVE-2021-47598

https://www.suse.com/security/cve/CVE-2021-47599

https://www.suse.com/security/cve/CVE-2021-47600

https://www.suse.com/security/cve/CVE-2021-47601

https://www.suse.com/security/cve/CVE-2021-47602

https://www.suse.com/security/cve/CVE-2021-47603

https://www.suse.com/security/cve/CVE-2021-47604

https://www.suse.com/security/cve/CVE-2021-47605

https://www.suse.com/security/cve/CVE-2021-47606

https://www.suse.com/security/cve/CVE-2021-47607

https://www.suse.com/security/cve/CVE-2021-47608

https://www.suse.com/security/cve/CVE-2022-48776

https://www.suse.com/security/cve/CVE-2022-48777

https://www.suse.com/security/cve/CVE-2022-48778

https://www.suse.com/security/cve/CVE-2022-48780

https://www.suse.com/security/cve/CVE-2022-48783

https://www.suse.com/security/cve/CVE-2022-48784

https://www.suse.com/security/cve/CVE-2022-48785

https://www.suse.com/security/cve/CVE-2022-48786

https://www.suse.com/security/cve/CVE-2022-48787

https://www.suse.com/security/cve/CVE-2022-48788

https://www.suse.com/security/cve/CVE-2022-48789

https://www.suse.com/security/cve/CVE-2022-48790

https://www.suse.com/security/cve/CVE-2022-48791

https://www.suse.com/security/cve/CVE-2022-48792

https://www.suse.com/security/cve/CVE-2022-48793

https://www.suse.com/security/cve/CVE-2022-48794

https://www.suse.com/security/cve/CVE-2022-48796

https://www.suse.com/security/cve/CVE-2022-48797

https://www.suse.com/security/cve/CVE-2022-48798

https://www.suse.com/security/cve/CVE-2022-48799

https://www.suse.com/security/cve/CVE-2022-48800

https://www.suse.com/security/cve/CVE-2022-48801

https://www.suse.com/security/cve/CVE-2022-48802

https://www.suse.com/security/cve/CVE-2022-48803

https://www.suse.com/security/cve/CVE-2022-48804

https://www.suse.com/security/cve/CVE-2022-48805

https://www.suse.com/security/cve/CVE-2022-48806

https://www.suse.com/security/cve/CVE-2022-48807

https://www.suse.com/security/cve/CVE-2022-48809

https://www.suse.com/security/cve/CVE-2022-48810

https://www.suse.com/security/cve/CVE-2022-48811

https://www.suse.com/security/cve/CVE-2022-48812

https://www.suse.com/security/cve/CVE-2022-48813

https://www.suse.com/security/cve/CVE-2022-48814

https://www.suse.com/security/cve/CVE-2022-48815

https://www.suse.com/security/cve/CVE-2022-48816

https://www.suse.com/security/cve/CVE-2022-48817

https://www.suse.com/security/cve/CVE-2022-48818

https://www.suse.com/security/cve/CVE-2022-48820

https://www.suse.com/security/cve/CVE-2022-48821

https://www.suse.com/security/cve/CVE-2022-48822

https://www.suse.com/security/cve/CVE-2022-48823

https://www.suse.com/security/cve/CVE-2022-48824

https://www.suse.com/security/cve/CVE-2022-48825

https://www.suse.com/security/cve/CVE-2022-48826

https://www.suse.com/security/cve/CVE-2022-48827

https://www.suse.com/security/cve/CVE-2022-48828

https://www.suse.com/security/cve/CVE-2022-48829

https://www.suse.com/security/cve/CVE-2022-48830

https://www.suse.com/security/cve/CVE-2022-48831

https://www.suse.com/security/cve/CVE-2022-48834

https://www.suse.com/security/cve/CVE-2022-48835

https://www.suse.com/security/cve/CVE-2022-48836

https://www.suse.com/security/cve/CVE-2022-48837

https://www.suse.com/security/cve/CVE-2022-48838

https://www.suse.com/security/cve/CVE-2022-48839

https://www.suse.com/security/cve/CVE-2022-48840

https://www.suse.com/security/cve/CVE-2022-48841

https://www.suse.com/security/cve/CVE-2022-48842

https://www.suse.com/security/cve/CVE-2022-48843

https://www.suse.com/security/cve/CVE-2022-48844

https://www.suse.com/security/cve/CVE-2022-48846

https://www.suse.com/security/cve/CVE-2022-48847

https://www.suse.com/security/cve/CVE-2022-48849

https://www.suse.com/security/cve/CVE-2022-48850

https://www.suse.com/security/cve/CVE-2022-48851

https://www.suse.com/security/cve/CVE-2022-48852

https://www.suse.com/security/cve/CVE-2022-48853

https://www.suse.com/security/cve/CVE-2022-48855

https://www.suse.com/security/cve/CVE-2022-48856

https://www.suse.com/security/cve/CVE-2022-48857

https://www.suse.com/security/cve/CVE-2022-48858

https://www.suse.com/security/cve/CVE-2022-48859

https://www.suse.com/security/cve/CVE-2022-48860

https://www.suse.com/security/cve/CVE-2022-48861

https://www.suse.com/security/cve/CVE-2022-48862

https://www.suse.com/security/cve/CVE-2022-48863

https://www.suse.com/security/cve/CVE-2022-48864

https://www.suse.com/security/cve/CVE-2022-48866

https://www.suse.com/security/cve/CVE-2023-24023

https://www.suse.com/security/cve/CVE-2023-52435

https://www.suse.com/security/cve/CVE-2023-52573

https://www.suse.com/security/cve/CVE-2023-52580

https://www.suse.com/security/cve/CVE-2023-52622

https://www.suse.com/security/cve/CVE-2023-52658

https://www.suse.com/security/cve/CVE-2023-52667

https://www.suse.com/security/cve/CVE-2023-52670

https://www.suse.com/security/cve/CVE-2023-52672

https://www.suse.com/security/cve/CVE-2023-52675

https://www.suse.com/security/cve/CVE-2023-52735

https://www.suse.com/security/cve/CVE-2023-52737

https://www.suse.com/security/cve/CVE-2023-52751

https://www.suse.com/security/cve/CVE-2023-52752

https://www.suse.com/security/cve/CVE-2023-52762

https://www.suse.com/security/cve/CVE-2023-52766

https://www.suse.com/security/cve/CVE-2023-52775

https://www.suse.com/security/cve/CVE-2023-52784

https://www.suse.com/security/cve/CVE-2023-52787

https://www.suse.com/security/cve/CVE-2023-52800

https://www.suse.com/security/cve/CVE-2023-52812

https://www.suse.com/security/cve/CVE-2023-52835

https://www.suse.com/security/cve/CVE-2023-52837

https://www.suse.com/security/cve/CVE-2023-52843

https://www.suse.com/security/cve/CVE-2023-52845

https://www.suse.com/security/cve/CVE-2023-52846

https://www.suse.com/security/cve/CVE-2023-52857

https://www.suse.com/security/cve/CVE-2023-52863

https://www.suse.com/security/cve/CVE-2023-52869

https://www.suse.com/security/cve/CVE-2023-52881

https://www.suse.com/security/cve/CVE-2023-52882

https://www.suse.com/security/cve/CVE-2023-52884

https://www.suse.com/security/cve/CVE-2023-52885

https://www.suse.com/security/cve/CVE-2023-52886

https://www.suse.com/security/cve/CVE-2024-25741

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26615

https://www.suse.com/security/cve/CVE-2024-26625

https://www.suse.com/security/cve/CVE-2024-26633

https://www.suse.com/security/cve/CVE-2024-26635

https://www.suse.com/security/cve/CVE-2024-26636

https://www.suse.com/security/cve/CVE-2024-26641

https://www.suse.com/security/cve/CVE-2024-26644

https://www.suse.com/security/cve/CVE-2024-26661

https://www.suse.com/security/cve/CVE-2024-26663

https://www.suse.com/security/cve/CVE-2024-26665

https://www.suse.com/security/cve/CVE-2024-26720

https://www.suse.com/security/cve/CVE-2024-26800

https://www.suse.com/security/cve/CVE-2024-26802

https://www.suse.com/security/cve/CVE-2024-26813

https://www.suse.com/security/cve/CVE-2024-26814

https://www.suse.com/security/cve/CVE-2024-26842

https://www.suse.com/security/cve/CVE-2024-26845

https://www.suse.com/security/cve/CVE-2024-26863

https://www.suse.com/security/cve/CVE-2024-26923

https://www.suse.com/security/cve/CVE-2024-26935

https://www.suse.com/security/cve/CVE-2024-26961

https://www.suse.com/security/cve/CVE-2024-26973

https://www.suse.com/security/cve/CVE-2024-26976

https://www.suse.com/security/cve/CVE-2024-27015

https://www.suse.com/security/cve/CVE-2024-27019

https://www.suse.com/security/cve/CVE-2024-27020

https://www.suse.com/security/cve/CVE-2024-27025

https://www.suse.com/security/cve/CVE-2024-27065

https://www.suse.com/security/cve/CVE-2024-27402

https://www.suse.com/security/cve/CVE-2024-27432

https://www.suse.com/security/cve/CVE-2024-27437

https://www.suse.com/security/cve/CVE-2024-33619

https://www.suse.com/security/cve/CVE-2024-35247

https://www.suse.com/security/cve/CVE-2024-35789

https://www.suse.com/security/cve/CVE-2024-35790

https://www.suse.com/security/cve/CVE-2024-35805

https://www.suse.com/security/cve/CVE-2024-35807

https://www.suse.com/security/cve/CVE-2024-35814

https://www.suse.com/security/cve/CVE-2024-35819

https://www.suse.com/security/cve/CVE-2024-35835

https://www.suse.com/security/cve/CVE-2024-35837

https://www.suse.com/security/cve/CVE-2024-35848

https://www.suse.com/security/cve/CVE-2024-35853

https://www.suse.com/security/cve/CVE-2024-35855

https://www.suse.com/security/cve/CVE-2024-35857

https://www.suse.com/security/cve/CVE-2024-35861

https://www.suse.com/security/cve/CVE-2024-35862

https://www.suse.com/security/cve/CVE-2024-35864

https://www.suse.com/security/cve/CVE-2024-35869

https://www.suse.com/security/cve/CVE-2024-35878

https://www.suse.com/security/cve/CVE-2024-35884

https://www.suse.com/security/cve/CVE-2024-35886

https://www.suse.com/security/cve/CVE-2024-35889

https://www.suse.com/security/cve/CVE-2024-35890

https://www.suse.com/security/cve/CVE-2024-35893

https://www.suse.com/security/cve/CVE-2024-35896

https://www.suse.com/security/cve/CVE-2024-35898

https://www.suse.com/security/cve/CVE-2024-35899

https://www.suse.com/security/cve/CVE-2024-35900

https://www.suse.com/security/cve/CVE-2024-35905

https://www.suse.com/security/cve/CVE-2024-35925

https://www.suse.com/security/cve/CVE-2024-35934

https://www.suse.com/security/cve/CVE-2024-35949

https://www.suse.com/security/cve/CVE-2024-35950

https://www.suse.com/security/cve/CVE-2024-35956

https://www.suse.com/security/cve/CVE-2024-35958

https://www.suse.com/security/cve/CVE-2024-35960

https://www.suse.com/security/cve/CVE-2024-35961

https://www.suse.com/security/cve/CVE-2024-35962

https://www.suse.com/security/cve/CVE-2024-35979

https://www.suse.com/security/cve/CVE-2024-35995

https://www.suse.com/security/cve/CVE-2024-35997

https://www.suse.com/security/cve/CVE-2024-36000

https://www.suse.com/security/cve/CVE-2024-36004

https://www.suse.com/security/cve/CVE-2024-36005

https://www.suse.com/security/cve/CVE-2024-36008

https://www.suse.com/security/cve/CVE-2024-36017

https://www.suse.com/security/cve/CVE-2024-36020

https://www.suse.com/security/cve/CVE-2024-36021

https://www.suse.com/security/cve/CVE-2024-36025

https://www.suse.com/security/cve/CVE-2024-36288

https://www.suse.com/security/cve/CVE-2024-36477

https://www.suse.com/security/cve/CVE-2024-36478

https://www.suse.com/security/cve/CVE-2024-36479

https://www.suse.com/security/cve/CVE-2024-36889

https://www.suse.com/security/cve/CVE-2024-36890

https://www.suse.com/security/cve/CVE-2024-36894

https://www.suse.com/security/cve/CVE-2024-36899

https://www.suse.com/security/cve/CVE-2024-36900

https://www.suse.com/security/cve/CVE-2024-36901

https://www.suse.com/security/cve/CVE-2024-36902

https://www.suse.com/security/cve/CVE-2024-36904

https://www.suse.com/security/cve/CVE-2024-36909

https://www.suse.com/security/cve/CVE-2024-36910

https://www.suse.com/security/cve/CVE-2024-36911

https://www.suse.com/security/cve/CVE-2024-36912

https://www.suse.com/security/cve/CVE-2024-36913

https://www.suse.com/security/cve/CVE-2024-36914

https://www.suse.com/security/cve/CVE-2024-36915

https://www.suse.com/security/cve/CVE-2024-36916

https://www.suse.com/security/cve/CVE-2024-36917

https://www.suse.com/security/cve/CVE-2024-36919

https://www.suse.com/security/cve/CVE-2024-36923

https://www.suse.com/security/cve/CVE-2024-36934

https://www.suse.com/security/cve/CVE-2024-36937

https://www.suse.com/security/cve/CVE-2024-36939

https://www.suse.com/security/cve/CVE-2024-36940

https://www.suse.com/security/cve/CVE-2024-36945

https://www.suse.com/security/cve/CVE-2024-36946

https://www.suse.com/security/cve/CVE-2024-36949

https://www.suse.com/security/cve/CVE-2024-36960

https://www.suse.com/security/cve/CVE-2024-36964

https://www.suse.com/security/cve/CVE-2024-36965

https://www.suse.com/security/cve/CVE-2024-36967

https://www.suse.com/security/cve/CVE-2024-36969

https://www.suse.com/security/cve/CVE-2024-36971

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-36975

https://www.suse.com/security/cve/CVE-2024-36978

https://www.suse.com/security/cve/CVE-2024-37021

https://www.suse.com/security/cve/CVE-2024-37078

https://www.suse.com/security/cve/CVE-2024-37354

https://www.suse.com/security/cve/CVE-2024-38381

https://www.suse.com/security/cve/CVE-2024-38388

https://www.suse.com/security/cve/CVE-2024-38390

https://www.suse.com/security/cve/CVE-2024-38540

https://www.suse.com/security/cve/CVE-2024-38541

https://www.suse.com/security/cve/CVE-2024-38544

https://www.suse.com/security/cve/CVE-2024-38545

https://www.suse.com/security/cve/CVE-2024-38546

https://www.suse.com/security/cve/CVE-2024-38547

https://www.suse.com/security/cve/CVE-2024-38548

https://www.suse.com/security/cve/CVE-2024-38549

https://www.suse.com/security/cve/CVE-2024-38550

https://www.suse.com/security/cve/CVE-2024-38552

https://www.suse.com/security/cve/CVE-2024-38553

https://www.suse.com/security/cve/CVE-2024-38555

https://www.suse.com/security/cve/CVE-2024-38556

https://www.suse.com/security/cve/CVE-2024-38557

https://www.suse.com/security/cve/CVE-2024-38558

https://www.suse.com/security/cve/CVE-2024-38559

https://www.suse.com/security/cve/CVE-2024-38560

https://www.suse.com/security/cve/CVE-2024-38564

https://www.suse.com/security/cve/CVE-2024-38565

https://www.suse.com/security/cve/CVE-2024-38567

https://www.suse.com/security/cve/CVE-2024-38568

https://www.suse.com/security/cve/CVE-2024-38570

https://www.suse.com/security/cve/CVE-2024-38571

https://www.suse.com/security/cve/CVE-2024-38573

https://www.suse.com/security/cve/CVE-2024-38578

https://www.suse.com/security/cve/CVE-2024-38579

https://www.suse.com/security/cve/CVE-2024-38580

https://www.suse.com/security/cve/CVE-2024-38581

https://www.suse.com/security/cve/CVE-2024-38582

https://www.suse.com/security/cve/CVE-2024-38583

https://www.suse.com/security/cve/CVE-2024-38586

https://www.suse.com/security/cve/CVE-2024-38587

https://www.suse.com/security/cve/CVE-2024-38588

https://www.suse.com/security/cve/CVE-2024-38590

https://www.suse.com/security/cve/CVE-2024-38591

https://www.suse.com/security/cve/CVE-2024-38594

https://www.suse.com/security/cve/CVE-2024-38597

https://www.suse.com/security/cve/CVE-2024-38598

https://www.suse.com/security/cve/CVE-2024-38599

https://www.suse.com/security/cve/CVE-2024-38600

https://www.suse.com/security/cve/CVE-2024-38601

https://www.suse.com/security/cve/CVE-2024-38603

https://www.suse.com/security/cve/CVE-2024-38605

https://www.suse.com/security/cve/CVE-2024-38608

https://www.suse.com/security/cve/CVE-2024-38616

https://www.suse.com/security/cve/CVE-2024-38618

https://www.suse.com/security/cve/CVE-2024-38619

https://www.suse.com/security/cve/CVE-2024-38621

https://www.suse.com/security/cve/CVE-2024-38627

https://www.suse.com/security/cve/CVE-2024-38628

https://www.suse.com/security/cve/CVE-2024-38630

https://www.suse.com/security/cve/CVE-2024-38633

https://www.suse.com/security/cve/CVE-2024-38634

https://www.suse.com/security/cve/CVE-2024-38635

https://www.suse.com/security/cve/CVE-2024-38659

https://www.suse.com/security/cve/CVE-2024-38661

https://www.suse.com/security/cve/CVE-2024-38780

https://www.suse.com/security/cve/CVE-2024-39276

https://www.suse.com/security/cve/CVE-2024-39301

https://www.suse.com/security/cve/CVE-2024-39371

https://www.suse.com/security/cve/CVE-2024-39463

https://www.suse.com/security/cve/CVE-2024-39468

https://www.suse.com/security/cve/CVE-2024-39469

https://www.suse.com/security/cve/CVE-2024-39471

https://www.suse.com/security/cve/CVE-2024-39472

https://www.suse.com/security/cve/CVE-2024-39475

https://www.suse.com/security/cve/CVE-2024-39482

https://www.suse.com/security/cve/CVE-2024-39487

https://www.suse.com/security/cve/CVE-2024-39488

https://www.suse.com/security/cve/CVE-2024-39490

https://www.suse.com/security/cve/CVE-2024-39493

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-39497

https://www.suse.com/security/cve/CVE-2024-39499

https://www.suse.com/security/cve/CVE-2024-39500

https://www.suse.com/security/cve/CVE-2024-39501

https://www.suse.com/security/cve/CVE-2024-39502

https://www.suse.com/security/cve/CVE-2024-39505

https://www.suse.com/security/cve/CVE-2024-39506

https://www.suse.com/security/cve/CVE-2024-39507

https://www.suse.com/security/cve/CVE-2024-39508

https://www.suse.com/security/cve/CVE-2024-39509

https://www.suse.com/security/cve/CVE-2024-40900

https://www.suse.com/security/cve/CVE-2024-40901

https://www.suse.com/security/cve/CVE-2024-40902

https://www.suse.com/security/cve/CVE-2024-40903

https://www.suse.com/security/cve/CVE-2024-40904

https://www.suse.com/security/cve/CVE-2024-40906

https://www.suse.com/security/cve/CVE-2024-40908

https://www.suse.com/security/cve/CVE-2024-40909

https://www.suse.com/security/cve/CVE-2024-40911

https://www.suse.com/security/cve/CVE-2024-40912

https://www.suse.com/security/cve/CVE-2024-40916

https://www.suse.com/security/cve/CVE-2024-40919

https://www.suse.com/security/cve/CVE-2024-40923

https://www.suse.com/security/cve/CVE-2024-40924

https://www.suse.com/security/cve/CVE-2024-40927

https://www.suse.com/security/cve/CVE-2024-40929

https://www.suse.com/security/cve/CVE-2024-40931

https://www.suse.com/security/cve/CVE-2024-40932

https://www.suse.com/security/cve/CVE-2024-40934

https://www.suse.com/security/cve/CVE-2024-40935

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-40940

https://www.suse.com/security/cve/CVE-2024-40941

https://www.suse.com/security/cve/CVE-2024-40942

https://www.suse.com/security/cve/CVE-2024-40943

https://www.suse.com/security/cve/CVE-2024-40945

https://www.suse.com/security/cve/CVE-2024-40953

https://www.suse.com/security/cve/CVE-2024-40954

https://www.suse.com/security/cve/CVE-2024-40956

https://www.suse.com/security/cve/CVE-2024-40958

https://www.suse.com/security/cve/CVE-2024-40959

https://www.suse.com/security/cve/CVE-2024-40960

https://www.suse.com/security/cve/CVE-2024-40961

https://www.suse.com/security/cve/CVE-2024-40966

https://www.suse.com/security/cve/CVE-2024-40967

https://www.suse.com/security/cve/CVE-2024-40970

https://www.suse.com/security/cve/CVE-2024-40972

https://www.suse.com/security/cve/CVE-2024-40976

https://www.suse.com/security/cve/CVE-2024-40977

https://www.suse.com/security/cve/CVE-2024-40981

https://www.suse.com/security/cve/CVE-2024-40982

https://www.suse.com/security/cve/CVE-2024-40984

https://www.suse.com/security/cve/CVE-2024-40987

https://www.suse.com/security/cve/CVE-2024-40988

https://www.suse.com/security/cve/CVE-2024-40989

https://www.suse.com/security/cve/CVE-2024-40990

https://www.suse.com/security/cve/CVE-2024-40994

https://www.suse.com/security/cve/CVE-2024-40998

https://www.suse.com/security/cve/CVE-2024-40999

https://www.suse.com/security/cve/CVE-2024-41002

https://www.suse.com/security/cve/CVE-2024-41004

https://www.suse.com/security/cve/CVE-2024-41006

https://www.suse.com/security/cve/CVE-2024-41009

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41012

https://www.suse.com/security/cve/CVE-2024-41013

https://www.suse.com/security/cve/CVE-2024-41014

https://www.suse.com/security/cve/CVE-2024-41015

https://www.suse.com/security/cve/CVE-2024-41016

https://www.suse.com/security/cve/CVE-2024-41017

https://www.suse.com/security/cve/CVE-2024-41040

https://www.suse.com/security/cve/CVE-2024-41041

https://www.suse.com/security/cve/CVE-2024-41044

https://www.suse.com/security/cve/CVE-2024-41048

https://www.suse.com/security/cve/CVE-2024-41057

https://www.suse.com/security/cve/CVE-2024-41058

https://www.suse.com/security/cve/CVE-2024-41059

https://www.suse.com/security/cve/CVE-2024-41063

https://www.suse.com/security/cve/CVE-2024-41064

https://www.suse.com/security/cve/CVE-2024-41066

https://www.suse.com/security/cve/CVE-2024-41069

https://www.suse.com/security/cve/CVE-2024-41070

https://www.suse.com/security/cve/CVE-2024-41071

https://www.suse.com/security/cve/CVE-2024-41072

https://www.suse.com/security/cve/CVE-2024-41076

https://www.suse.com/security/cve/CVE-2024-41078

https://www.suse.com/security/cve/CVE-2024-41081

https://www.suse.com/security/cve/CVE-2024-41087

https://www.suse.com/security/cve/CVE-2024-41090

https://www.suse.com/security/cve/CVE-2024-41091

https://www.suse.com/security/cve/CVE-2024-42070

https://www.suse.com/security/cve/CVE-2024-42079

https://www.suse.com/security/cve/CVE-2024-42093

https://www.suse.com/security/cve/CVE-2024-42096

https://www.suse.com/security/cve/CVE-2024-42105

https://www.suse.com/security/cve/CVE-2024-42122

https://www.suse.com/security/cve/CVE-2024-42124

https://www.suse.com/security/cve/CVE-2024-42145

https://www.suse.com/security/cve/CVE-2024-42161

https://www.suse.com/security/cve/CVE-2024-42224

https://www.suse.com/security/cve/CVE-2024-42230

https://www.suse.com/security/cve/CVE-2021-47609

https://www.suse.com/security/cve/CVE-2021-47610

https://www.suse.com/security/cve/CVE-2021-47611

https://www.suse.com/security/cve/CVE-2021-47612

https://www.suse.com/security/cve/CVE-2021-47614

https://www.suse.com/security/cve/CVE-2021-47615

https://www.suse.com/security/cve/CVE-2021-47616

https://www.suse.com/security/cve/CVE-2021-47617

https://www.suse.com/security/cve/CVE-2021-47618

https://www.suse.com/security/cve/CVE-2021-47619

https://www.suse.com/security/cve/CVE-2021-47620

https://www.suse.com/security/cve/CVE-2021-47622

https://www.suse.com/security/cve/CVE-2021-47623

https://www.suse.com/security/cve/CVE-2021-47624

https://www.suse.com/security/cve/CVE-2022-48711

https://www.suse.com/security/cve/CVE-2022-48712

https://www.suse.com/security/cve/CVE-2022-48713

Plugin Details

Severity: High

ID: 205734

File Name: suse_SU-2024-2939-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/17/2024

Updated: 9/26/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-42093

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_73-default, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-extra, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-64kb

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/16/2024

Vulnerability Publication Date: 3/7/2022

CISA Known Exploited Vulnerability Due Dates: 8/28/2024

Reference Information

CVE: CVE-2021-4439, CVE-2021-47086, CVE-2021-47089, CVE-2021-47103, CVE-2021-47186, CVE-2021-47432, CVE-2021-47515, CVE-2021-47534, CVE-2021-47538, CVE-2021-47539, CVE-2021-47546, CVE-2021-47547, CVE-2021-47555, CVE-2021-47566, CVE-2021-47571, CVE-2021-47572, CVE-2021-47576, CVE-2021-47577, CVE-2021-47578, CVE-2021-47580, CVE-2021-47582, CVE-2021-47583, CVE-2021-47584, CVE-2021-47585, CVE-2021-47586, CVE-2021-47587, CVE-2021-47588, CVE-2021-47589, CVE-2021-47590, CVE-2021-47591, CVE-2021-47592, CVE-2021-47593, CVE-2021-47595, CVE-2021-47596, CVE-2021-47597, CVE-2021-47598, CVE-2021-47599, CVE-2021-47600, CVE-2021-47601, CVE-2021-47602, CVE-2021-47603, CVE-2021-47604, CVE-2021-47605, CVE-2021-47606, CVE-2021-47607, CVE-2021-47608, CVE-2021-47609, CVE-2021-47610, CVE-2021-47611, CVE-2021-47612, CVE-2021-47614, CVE-2021-47615, CVE-2021-47616, CVE-2021-47617, CVE-2021-47618, CVE-2021-47619, CVE-2021-47620, CVE-2021-47622, CVE-2021-47623, CVE-2021-47624, CVE-2022-48711, CVE-2022-48712, CVE-2022-48713, CVE-2022-48714, CVE-2022-48715, CVE-2022-48716, CVE-2022-48717, CVE-2022-48718, CVE-2022-48720, CVE-2022-48721, CVE-2022-48722, CVE-2022-48723, CVE-2022-48724, CVE-2022-48725, CVE-2022-48726, CVE-2022-48727, CVE-2022-48728, CVE-2022-48729, CVE-2022-48730, CVE-2022-48732, CVE-2022-48733, CVE-2022-48734, CVE-2022-48735, CVE-2022-48736, CVE-2022-48737, CVE-2022-48738, CVE-2022-48739, CVE-2022-48740, CVE-2022-48743, CVE-2022-48744, CVE-2022-48745, CVE-2022-48746, CVE-2022-48747, CVE-2022-48748, CVE-2022-48749, CVE-2022-48751, CVE-2022-48752, CVE-2022-48753, CVE-2022-48754, CVE-2022-48755, CVE-2022-48756, CVE-2022-48758, CVE-2022-48759, CVE-2022-48760, CVE-2022-48761, CVE-2022-48763, CVE-2022-48765, CVE-2022-48766, CVE-2022-48767, CVE-2022-48768, CVE-2022-48769, CVE-2022-48770, CVE-2022-48771, CVE-2022-48772, CVE-2022-48773, CVE-2022-48774, CVE-2022-48775, CVE-2022-48776, CVE-2022-48777, CVE-2022-48778, CVE-2022-48780, CVE-2022-48783, CVE-2022-48784, CVE-2022-48785, CVE-2022-48786, CVE-2022-48787, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48791, CVE-2022-48792, CVE-2022-48793, CVE-2022-48794, CVE-2022-48796, CVE-2022-48797, CVE-2022-48798, CVE-2022-48799, CVE-2022-48800, CVE-2022-48801, CVE-2022-48802, CVE-2022-48803, CVE-2022-48804, CVE-2022-48805, CVE-2022-48806, CVE-2022-48807, CVE-2022-48809, CVE-2022-48810, CVE-2022-48811, CVE-2022-48812, CVE-2022-48813, CVE-2022-48814, CVE-2022-48815, CVE-2022-48816, CVE-2022-48817, CVE-2022-48818, CVE-2022-48820, CVE-2022-48821, CVE-2022-48822, CVE-2022-48823, CVE-2022-48824, CVE-2022-48825, CVE-2022-48826, CVE-2022-48827, CVE-2022-48828, CVE-2022-48829, CVE-2022-48830, CVE-2022-48831, CVE-2022-48834, CVE-2022-48835, CVE-2022-48836, CVE-2022-48837, CVE-2022-48838, CVE-2022-48839, CVE-2022-48840, CVE-2022-48841, CVE-2022-48842, CVE-2022-48843, CVE-2022-48844, CVE-2022-48846, CVE-2022-48847, CVE-2022-48849, CVE-2022-48850, CVE-2022-48851, CVE-2022-48852, CVE-2022-48853, CVE-2022-48855, CVE-2022-48856, CVE-2022-48857, CVE-2022-48858, CVE-2022-48859, CVE-2022-48860, CVE-2022-48861, CVE-2022-48862, CVE-2022-48863, CVE-2022-48864, CVE-2022-48866, CVE-2023-24023, CVE-2023-52435, CVE-2023-52573, CVE-2023-52580, CVE-2023-52622, CVE-2023-52658, CVE-2023-52667, CVE-2023-52670, CVE-2023-52672, CVE-2023-52675, CVE-2023-52735, CVE-2023-52737, CVE-2023-52751, CVE-2023-52752, CVE-2023-52762, CVE-2023-52766, CVE-2023-52775, CVE-2023-52784, CVE-2023-52787, CVE-2023-52800, CVE-2023-52812, CVE-2023-52835, CVE-2023-52837, CVE-2023-52843, CVE-2023-52845, CVE-2023-52846, CVE-2023-52857, CVE-2023-52863, CVE-2023-52869, CVE-2023-52881, CVE-2023-52882, CVE-2023-52884, CVE-2023-52885, CVE-2023-52886, CVE-2024-25741, CVE-2024-26583, CVE-2024-26584, CVE-2024-26615, CVE-2024-26625, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26644, CVE-2024-26661, CVE-2024-26663, CVE-2024-26665, CVE-2024-26720, CVE-2024-26800, CVE-2024-26802, CVE-2024-26813, CVE-2024-26814, CVE-2024-26842, CVE-2024-26845, CVE-2024-26863, CVE-2024-26923, CVE-2024-26935, CVE-2024-26961, CVE-2024-26973, CVE-2024-26976, CVE-2024-27015, CVE-2024-27019, CVE-2024-27020, CVE-2024-27025, CVE-2024-27065, CVE-2024-27402, CVE-2024-27432, CVE-2024-27437, CVE-2024-33619, CVE-2024-35247, CVE-2024-35789, CVE-2024-35790, CVE-2024-35805, CVE-2024-35807, CVE-2024-35814, CVE-2024-35819, CVE-2024-35835, CVE-2024-35837, CVE-2024-35848, CVE-2024-35853, CVE-2024-35855, CVE-2024-35857, CVE-2024-35861, CVE-2024-35862, CVE-2024-35864, CVE-2024-35869, CVE-2024-35878, CVE-2024-35884, CVE-2024-35886, CVE-2024-35889, CVE-2024-35890, CVE-2024-35893, CVE-2024-35896, CVE-2024-35898, CVE-2024-35899, CVE-2024-35900, CVE-2024-35905, CVE-2024-35925, CVE-2024-35934, CVE-2024-35949, CVE-2024-35950, CVE-2024-35956, CVE-2024-35958, CVE-2024-35960, CVE-2024-35961, CVE-2024-35962, CVE-2024-35979, CVE-2024-35995, CVE-2024-35997, CVE-2024-36000, CVE-2024-36004, CVE-2024-36005, CVE-2024-36008, CVE-2024-36017, CVE-2024-36020, CVE-2024-36021, CVE-2024-36025, CVE-2024-36288, CVE-2024-36477, CVE-2024-36478, CVE-2024-36479, CVE-2024-36889, CVE-2024-36890, CVE-2024-36894, CVE-2024-36899, CVE-2024-36900, CVE-2024-36901, CVE-2024-36902, CVE-2024-36904, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36912, CVE-2024-36913, CVE-2024-36914, CVE-2024-36915, CVE-2024-36916, CVE-2024-36917, CVE-2024-36919, CVE-2024-36923, CVE-2024-36934, CVE-2024-36937, CVE-2024-36939, CVE-2024-36940, CVE-2024-36945, CVE-2024-36946, CVE-2024-36949, CVE-2024-36960, CVE-2024-36964, CVE-2024-36965, CVE-2024-36967, CVE-2024-36969, CVE-2024-36971, CVE-2024-36974, CVE-2024-36975, CVE-2024-36978, CVE-2024-37021, CVE-2024-37078, CVE-2024-37354, CVE-2024-38381, CVE-2024-38388, CVE-2024-38390, CVE-2024-38540, CVE-2024-38541, CVE-2024-38544, CVE-2024-38545, CVE-2024-38546, CVE-2024-38547, CVE-2024-38548, CVE-2024-38549, CVE-2024-38550, CVE-2024-38552, CVE-2024-38553, CVE-2024-38555, CVE-2024-38556, CVE-2024-38557, CVE-2024-38558, CVE-2024-38559, CVE-2024-38560, CVE-2024-38564, CVE-2024-38565, CVE-2024-38567, CVE-2024-38568, CVE-2024-38570, CVE-2024-38571, CVE-2024-38573, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38581, CVE-2024-38582, CVE-2024-38583, CVE-2024-38586, CVE-2024-38587, CVE-2024-38588, CVE-2024-38590, CVE-2024-38591, CVE-2024-38594, CVE-2024-38597, CVE-2024-38598, CVE-2024-38599, CVE-2024-38600, CVE-2024-38601, CVE-2024-38603, CVE-2024-38605, CVE-2024-38608, CVE-2024-38616, CVE-2024-38618, CVE-2024-38619, CVE-2024-38621, CVE-2024-38627, CVE-2024-38628, CVE-2024-38630, CVE-2024-38633, CVE-2024-38634, CVE-2024-38635, CVE-2024-38659, CVE-2024-38661, CVE-2024-38780, CVE-2024-39276, CVE-2024-39301, CVE-2024-39371, CVE-2024-39463, CVE-2024-39468, CVE-2024-39469, CVE-2024-39471, CVE-2024-39472, CVE-2024-39475, CVE-2024-39482, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39493, CVE-2024-39494, CVE-2024-39497, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39502, CVE-2024-39505, CVE-2024-39506, CVE-2024-39507, CVE-2024-39508, CVE-2024-39509, CVE-2024-40900, CVE-2024-40901, CVE-2024-40902, CVE-2024-40903, CVE-2024-40904, CVE-2024-40906, CVE-2024-40908, CVE-2024-40909, CVE-2024-40911, CVE-2024-40912, CVE-2024-40916, CVE-2024-40919, CVE-2024-40923, CVE-2024-40924, CVE-2024-40927, CVE-2024-40929, CVE-2024-40931, CVE-2024-40932, CVE-2024-40934, CVE-2024-40935, CVE-2024-40937, CVE-2024-40940, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40945, CVE-2024-40953, CVE-2024-40954, CVE-2024-40956, CVE-2024-40958, CVE-2024-40959, CVE-2024-40960, CVE-2024-40961, CVE-2024-40966, CVE-2024-40967, CVE-2024-40970, CVE-2024-40972, CVE-2024-40976, CVE-2024-40977, CVE-2024-40981, CVE-2024-40982, CVE-2024-40984, CVE-2024-40987, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40994, CVE-2024-40998, CVE-2024-40999, CVE-2024-41002, CVE-2024-41004, CVE-2024-41006, CVE-2024-41009, CVE-2024-41011, CVE-2024-41012, CVE-2024-41013, CVE-2024-41014, CVE-2024-41015, CVE-2024-41016, CVE-2024-41017, CVE-2024-41040, CVE-2024-41041, CVE-2024-41044, CVE-2024-41048, CVE-2024-41057, CVE-2024-41058, CVE-2024-41059, CVE-2024-41063, CVE-2024-41064, CVE-2024-41066, CVE-2024-41069, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41076, CVE-2024-41078, CVE-2024-41081, CVE-2024-41087, CVE-2024-41090, CVE-2024-41091, CVE-2024-42070, CVE-2024-42079, CVE-2024-42093, CVE-2024-42096, CVE-2024-42105, CVE-2024-42122, CVE-2024-42124, CVE-2024-42145, CVE-2024-42161, CVE-2024-42224, CVE-2024-42230

SuSE: SUSE-SU-2024:2939-1