SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:2947-1)

high Nessus Plugin ID 205747

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2947-1 advisory.

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: ipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47546: Kabi fix for ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571)
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071)
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869)
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in (bsc#1222323)
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700)
- CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in register devlink flow (bsc#1224585).
- CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers (bsc#1224557).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (bsc#1226911).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722)
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage (bsc#1228020).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: add bounds checking to ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518)
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520)
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565)
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580)
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617)
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470)
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591)
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723)
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1082555

https://bugzilla.suse.com/1193454

https://bugzilla.suse.com/1193554

https://bugzilla.suse.com/1193787

https://bugzilla.suse.com/1194324

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195357

https://bugzilla.suse.com/1195668

https://bugzilla.suse.com/1195927

https://bugzilla.suse.com/1195957

https://bugzilla.suse.com/1196018

https://bugzilla.suse.com/1196823

https://bugzilla.suse.com/1197146

https://bugzilla.suse.com/1197246

https://bugzilla.suse.com/1197762

https://bugzilla.suse.com/1202346

https://bugzilla.suse.com/1202686

https://bugzilla.suse.com/1208783

https://bugzilla.suse.com/1227952

https://bugzilla.suse.com/1227953

https://bugzilla.suse.com/1227954

https://bugzilla.suse.com/1227956

https://bugzilla.suse.com/1227957

https://bugzilla.suse.com/1227963

https://bugzilla.suse.com/1227964

https://bugzilla.suse.com/1227965

https://bugzilla.suse.com/1227968

https://bugzilla.suse.com/1227969

https://bugzilla.suse.com/1227970

https://bugzilla.suse.com/1227971

https://bugzilla.suse.com/1227972

https://bugzilla.suse.com/1227975

https://bugzilla.suse.com/1227976

https://bugzilla.suse.com/1227981

https://bugzilla.suse.com/1227982

https://bugzilla.suse.com/1227985

https://bugzilla.suse.com/1227986

https://bugzilla.suse.com/1227987

https://bugzilla.suse.com/1227988

https://bugzilla.suse.com/1227989

https://bugzilla.suse.com/1227990

https://bugzilla.suse.com/1227991

https://bugzilla.suse.com/1227992

https://bugzilla.suse.com/1227993

https://bugzilla.suse.com/1227995

https://bugzilla.suse.com/1227996

https://bugzilla.suse.com/1227997

https://bugzilla.suse.com/1228000

https://bugzilla.suse.com/1228002

https://bugzilla.suse.com/1228003

https://bugzilla.suse.com/1228004

https://bugzilla.suse.com/1228005

https://bugzilla.suse.com/1228006

https://bugzilla.suse.com/1228007

https://bugzilla.suse.com/1228008

https://bugzilla.suse.com/1228009

https://bugzilla.suse.com/1228010

https://bugzilla.suse.com/1228011

https://bugzilla.suse.com/1228013

https://bugzilla.suse.com/1228014

https://bugzilla.suse.com/1228015

https://bugzilla.suse.com/1228019

https://bugzilla.suse.com/1228020

https://bugzilla.suse.com/1228025

https://bugzilla.suse.com/1228028

https://bugzilla.suse.com/1228035

https://bugzilla.suse.com/1228037

https://bugzilla.suse.com/1228038

https://bugzilla.suse.com/1228039

https://bugzilla.suse.com/1228040

https://bugzilla.suse.com/1228045

https://bugzilla.suse.com/1228054

https://bugzilla.suse.com/1228055

https://bugzilla.suse.com/1228056

https://bugzilla.suse.com/1228060

https://bugzilla.suse.com/1228061

https://bugzilla.suse.com/1228062

https://bugzilla.suse.com/1228063

https://bugzilla.suse.com/1228064

https://bugzilla.suse.com/1228066

https://bugzilla.suse.com/1228067

https://bugzilla.suse.com/1228068

https://bugzilla.suse.com/1228071

https://bugzilla.suse.com/1228079

https://bugzilla.suse.com/1228090

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228140

https://bugzilla.suse.com/1228190

https://bugzilla.suse.com/1228191

https://bugzilla.suse.com/1228195

https://bugzilla.suse.com/1228202

https://bugzilla.suse.com/1228226

https://bugzilla.suse.com/1228235

https://bugzilla.suse.com/1228237

https://bugzilla.suse.com/1228247

https://bugzilla.suse.com/1228327

https://bugzilla.suse.com/1228328

https://bugzilla.suse.com/1228330

https://bugzilla.suse.com/1228403

https://bugzilla.suse.com/1228405

https://bugzilla.suse.com/1228408

https://bugzilla.suse.com/1228409

https://bugzilla.suse.com/1228410

https://bugzilla.suse.com/1228418

https://bugzilla.suse.com/1228440

https://bugzilla.suse.com/1228459

https://bugzilla.suse.com/1228462

https://bugzilla.suse.com/1228470

https://bugzilla.suse.com/1228518

https://bugzilla.suse.com/1228520

https://bugzilla.suse.com/1228530

https://bugzilla.suse.com/1228561

https://bugzilla.suse.com/1228565

https://bugzilla.suse.com/1228580

https://bugzilla.suse.com/1228581

https://bugzilla.suse.com/1228591

https://bugzilla.suse.com/1228599

https://bugzilla.suse.com/1228617

https://bugzilla.suse.com/1228625

https://bugzilla.suse.com/1228626

https://bugzilla.suse.com/1228633

https://bugzilla.suse.com/1228640

https://bugzilla.suse.com/1228644

https://bugzilla.suse.com/1228649

https://bugzilla.suse.com/1228655

https://bugzilla.suse.com/1228665

https://bugzilla.suse.com/1228672

https://bugzilla.suse.com/1228680

https://bugzilla.suse.com/1228705

https://bugzilla.suse.com/1228723

https://bugzilla.suse.com/1228743

https://bugzilla.suse.com/1228756

https://bugzilla.suse.com/1228801

https://bugzilla.suse.com/1228850

https://bugzilla.suse.com/1228857

https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html

https://www.suse.com/security/cve/CVE-2021-47086

https://www.suse.com/security/cve/CVE-2021-47103

https://www.suse.com/security/cve/CVE-2021-47186

https://www.suse.com/security/cve/CVE-2021-47402

https://www.suse.com/security/cve/CVE-2021-47546

https://www.suse.com/security/cve/CVE-2021-47547

https://www.suse.com/security/cve/CVE-2021-47588

https://www.suse.com/security/cve/CVE-2021-47590

https://www.suse.com/security/cve/CVE-2021-47591

https://www.suse.com/security/cve/CVE-2021-47593

https://www.suse.com/security/cve/CVE-2021-47598

https://bugzilla.suse.com/1209636

https://bugzilla.suse.com/1213123

https://bugzilla.suse.com/1215492

https://bugzilla.suse.com/1215587

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1219832

https://bugzilla.suse.com/1220138

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1220187

https://bugzilla.suse.com/1220869

https://bugzilla.suse.com/1220876

https://bugzilla.suse.com/1220942

https://bugzilla.suse.com/1220952

https://bugzilla.suse.com/1221010

https://bugzilla.suse.com/1221044

https://bugzilla.suse.com/1221647

https://bugzilla.suse.com/1221654

https://bugzilla.suse.com/1221656

https://bugzilla.suse.com/1221659

https://bugzilla.suse.com/1221777

https://bugzilla.suse.com/1222011

https://bugzilla.suse.com/1222323

https://bugzilla.suse.com/1222326

https://bugzilla.suse.com/1222328

https://bugzilla.suse.com/1222625

https://bugzilla.suse.com/1222702

https://bugzilla.suse.com/1222728

https://bugzilla.suse.com/1222799

https://bugzilla.suse.com/1222809

https://bugzilla.suse.com/1222810

https://bugzilla.suse.com/1223021

https://bugzilla.suse.com/1223180

https://bugzilla.suse.com/1223635

https://bugzilla.suse.com/1223652

https://bugzilla.suse.com/1223675

https://bugzilla.suse.com/1223778

https://bugzilla.suse.com/1223806

https://bugzilla.suse.com/1223813

https://bugzilla.suse.com/1223815

https://bugzilla.suse.com/1223836

https://bugzilla.suse.com/1223863

https://bugzilla.suse.com/1224414

https://bugzilla.suse.com/1224499

https://bugzilla.suse.com/1224500

https://bugzilla.suse.com/1224512

https://bugzilla.suse.com/1224516

https://bugzilla.suse.com/1224517

https://bugzilla.suse.com/1224545

https://bugzilla.suse.com/1224548

https://bugzilla.suse.com/1224557

https://bugzilla.suse.com/1224572

https://bugzilla.suse.com/1224573

https://bugzilla.suse.com/1224585

https://bugzilla.suse.com/1224604

https://bugzilla.suse.com/1224636

https://bugzilla.suse.com/1224641

https://bugzilla.suse.com/1224683

https://bugzilla.suse.com/1224694

https://bugzilla.suse.com/1224700

https://bugzilla.suse.com/1224743

https://bugzilla.suse.com/1225088

https://bugzilla.suse.com/1225272

https://bugzilla.suse.com/1225301

https://bugzilla.suse.com/1225475

https://bugzilla.suse.com/1225489

https://bugzilla.suse.com/1225504

https://bugzilla.suse.com/1225505

https://bugzilla.suse.com/1225564

https://bugzilla.suse.com/1225573

https://bugzilla.suse.com/1225581

https://bugzilla.suse.com/1225586

https://bugzilla.suse.com/1225711

https://bugzilla.suse.com/1225717

https://bugzilla.suse.com/1225719

https://bugzilla.suse.com/1225744

https://bugzilla.suse.com/1225745

https://bugzilla.suse.com/1225746

https://bugzilla.suse.com/1225752

https://bugzilla.suse.com/1225753

https://bugzilla.suse.com/1225757

https://bugzilla.suse.com/1225767

https://bugzilla.suse.com/1225810

https://bugzilla.suse.com/1225815

https://bugzilla.suse.com/1225820

https://bugzilla.suse.com/1225829

https://bugzilla.suse.com/1225835

https://bugzilla.suse.com/1225838

https://bugzilla.suse.com/1225839

https://bugzilla.suse.com/1225843

https://bugzilla.suse.com/1225847

https://bugzilla.suse.com/1225851

https://bugzilla.suse.com/1225856

https://bugzilla.suse.com/1225895

https://bugzilla.suse.com/1225898

https://bugzilla.suse.com/1225903

https://bugzilla.suse.com/1226202

https://bugzilla.suse.com/1226502

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1226551

https://bugzilla.suse.com/1226555

https://bugzilla.suse.com/1226565

https://bugzilla.suse.com/1226568

https://bugzilla.suse.com/1226570

https://bugzilla.suse.com/1226571

https://bugzilla.suse.com/1226574

https://bugzilla.suse.com/1226588

https://bugzilla.suse.com/1226607

https://bugzilla.suse.com/1226650

https://bugzilla.suse.com/1226698

https://bugzilla.suse.com/1226713

https://bugzilla.suse.com/1226716

https://bugzilla.suse.com/1226750

https://bugzilla.suse.com/1226757

https://bugzilla.suse.com/1226758

https://bugzilla.suse.com/1226775

https://bugzilla.suse.com/1226783

https://bugzilla.suse.com/1226785

https://bugzilla.suse.com/1226834

https://bugzilla.suse.com/1226837

https://bugzilla.suse.com/1226911

https://bugzilla.suse.com/1226990

https://bugzilla.suse.com/1226993

https://bugzilla.suse.com/1227090

https://bugzilla.suse.com/1227121

https://bugzilla.suse.com/1227157

https://bugzilla.suse.com/1227162

https://bugzilla.suse.com/1227362

https://bugzilla.suse.com/1227383

https://bugzilla.suse.com/1227432

https://bugzilla.suse.com/1227435

https://bugzilla.suse.com/1227447

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227549

https://bugzilla.suse.com/1227573

https://bugzilla.suse.com/1227618

https://bugzilla.suse.com/1227620

https://bugzilla.suse.com/1227626

https://bugzilla.suse.com/1227635

https://bugzilla.suse.com/1227661

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227722

https://bugzilla.suse.com/1227724

https://bugzilla.suse.com/1227725

https://bugzilla.suse.com/1227728

https://bugzilla.suse.com/1227729

https://bugzilla.suse.com/1227730

https://bugzilla.suse.com/1227732

https://bugzilla.suse.com/1227733

https://bugzilla.suse.com/1227750

https://bugzilla.suse.com/1227754

https://bugzilla.suse.com/1227755

https://bugzilla.suse.com/1227760

https://bugzilla.suse.com/1227762

https://bugzilla.suse.com/1227763

https://bugzilla.suse.com/1227764

https://bugzilla.suse.com/1227766

https://bugzilla.suse.com/1227770

https://bugzilla.suse.com/1227771

https://bugzilla.suse.com/1227772

https://bugzilla.suse.com/1227774

https://bugzilla.suse.com/1227779

https://bugzilla.suse.com/1227780

https://bugzilla.suse.com/1227783

https://bugzilla.suse.com/1227786

https://bugzilla.suse.com/1227787

https://bugzilla.suse.com/1227790

https://bugzilla.suse.com/1227792

https://bugzilla.suse.com/1227796

https://bugzilla.suse.com/1227797

https://bugzilla.suse.com/1227798

https://bugzilla.suse.com/1227800

https://bugzilla.suse.com/1227802

https://bugzilla.suse.com/1227806

https://bugzilla.suse.com/1227808

https://bugzilla.suse.com/1227810

https://bugzilla.suse.com/1227812

https://bugzilla.suse.com/1227813

https://bugzilla.suse.com/1227814

https://bugzilla.suse.com/1227816

https://www.suse.com/security/cve/CVE-2021-47599

https://www.suse.com/security/cve/CVE-2021-47606

https://www.suse.com/security/cve/CVE-2021-47622

https://www.suse.com/security/cve/CVE-2021-47623

https://www.suse.com/security/cve/CVE-2021-47624

https://www.suse.com/security/cve/CVE-2022-48713

https://www.suse.com/security/cve/CVE-2022-48730

https://www.suse.com/security/cve/CVE-2022-48732

https://www.suse.com/security/cve/CVE-2022-48749

https://www.suse.com/security/cve/CVE-2022-48756

https://www.suse.com/security/cve/CVE-2022-48773

https://www.suse.com/security/cve/CVE-2022-48774

https://www.suse.com/security/cve/CVE-2022-48775

https://www.suse.com/security/cve/CVE-2022-48776

https://www.suse.com/security/cve/CVE-2022-48777

https://www.suse.com/security/cve/CVE-2022-48778

https://www.suse.com/security/cve/CVE-2022-48780

https://www.suse.com/security/cve/CVE-2022-48783

https://www.suse.com/security/cve/CVE-2022-48784

https://www.suse.com/security/cve/CVE-2022-48785

https://www.suse.com/security/cve/CVE-2022-48786

https://www.suse.com/security/cve/CVE-2022-48787

https://www.suse.com/security/cve/CVE-2022-48788

https://www.suse.com/security/cve/CVE-2022-48789

https://www.suse.com/security/cve/CVE-2022-48790

https://www.suse.com/security/cve/CVE-2022-48791

https://www.suse.com/security/cve/CVE-2022-48792

https://www.suse.com/security/cve/CVE-2022-48793

https://www.suse.com/security/cve/CVE-2022-48794

https://www.suse.com/security/cve/CVE-2022-48796

https://www.suse.com/security/cve/CVE-2022-48797

https://www.suse.com/security/cve/CVE-2022-48798

https://www.suse.com/security/cve/CVE-2022-48799

https://www.suse.com/security/cve/CVE-2022-48800

https://www.suse.com/security/cve/CVE-2022-48801

https://www.suse.com/security/cve/CVE-2022-48802

https://www.suse.com/security/cve/CVE-2022-48803

https://www.suse.com/security/cve/CVE-2022-48804

https://www.suse.com/security/cve/CVE-2022-48805

https://www.suse.com/security/cve/CVE-2022-48806

https://www.suse.com/security/cve/CVE-2022-48807

https://www.suse.com/security/cve/CVE-2022-48809

https://www.suse.com/security/cve/CVE-2022-48810

https://www.suse.com/security/cve/CVE-2022-48811

https://www.suse.com/security/cve/CVE-2022-48812

https://www.suse.com/security/cve/CVE-2022-48813

https://www.suse.com/security/cve/CVE-2022-48814

https://www.suse.com/security/cve/CVE-2022-48815

https://www.suse.com/security/cve/CVE-2022-48816

https://www.suse.com/security/cve/CVE-2022-48817

https://www.suse.com/security/cve/CVE-2022-48818

https://www.suse.com/security/cve/CVE-2022-48820

https://www.suse.com/security/cve/CVE-2022-48821

https://www.suse.com/security/cve/CVE-2022-48822

https://www.suse.com/security/cve/CVE-2022-48823

https://www.suse.com/security/cve/CVE-2022-48824

https://www.suse.com/security/cve/CVE-2022-48825

https://www.suse.com/security/cve/CVE-2022-48826

https://www.suse.com/security/cve/CVE-2022-48827

https://www.suse.com/security/cve/CVE-2022-48828

https://www.suse.com/security/cve/CVE-2022-48829

https://www.suse.com/security/cve/CVE-2022-48830

https://www.suse.com/security/cve/CVE-2022-48831

https://www.suse.com/security/cve/CVE-2022-48834

https://www.suse.com/security/cve/CVE-2022-48835

https://www.suse.com/security/cve/CVE-2022-48836

https://www.suse.com/security/cve/CVE-2022-48837

https://www.suse.com/security/cve/CVE-2022-48838

https://www.suse.com/security/cve/CVE-2022-48839

https://www.suse.com/security/cve/CVE-2022-48840

https://www.suse.com/security/cve/CVE-2022-48841

https://www.suse.com/security/cve/CVE-2022-48842

https://www.suse.com/security/cve/CVE-2022-48843

https://www.suse.com/security/cve/CVE-2022-48844

https://www.suse.com/security/cve/CVE-2022-48846

https://www.suse.com/security/cve/CVE-2022-48847

https://www.suse.com/security/cve/CVE-2022-48849

https://www.suse.com/security/cve/CVE-2022-48850

https://www.suse.com/security/cve/CVE-2022-48851

https://www.suse.com/security/cve/CVE-2022-48852

https://www.suse.com/security/cve/CVE-2022-48853

https://www.suse.com/security/cve/CVE-2022-48855

https://www.suse.com/security/cve/CVE-2022-48856

https://www.suse.com/security/cve/CVE-2022-48857

https://www.suse.com/security/cve/CVE-2022-48858

https://www.suse.com/security/cve/CVE-2022-48859

https://www.suse.com/security/cve/CVE-2022-48860

https://www.suse.com/security/cve/CVE-2022-48861

https://www.suse.com/security/cve/CVE-2022-48862

https://www.suse.com/security/cve/CVE-2022-48863

https://www.suse.com/security/cve/CVE-2022-48864

https://www.suse.com/security/cve/CVE-2022-48866

https://www.suse.com/security/cve/CVE-2023-1582

https://www.suse.com/security/cve/CVE-2023-37453

https://www.suse.com/security/cve/CVE-2023-52435

https://www.suse.com/security/cve/CVE-2023-52573

https://www.suse.com/security/cve/CVE-2023-52580

https://bugzilla.suse.com/1227820

https://bugzilla.suse.com/1227823

https://bugzilla.suse.com/1227824

https://bugzilla.suse.com/1227828

https://bugzilla.suse.com/1227829

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1227846

https://bugzilla.suse.com/1227849

https://bugzilla.suse.com/1227851

https://bugzilla.suse.com/1227862

https://bugzilla.suse.com/1227864

https://bugzilla.suse.com/1227865

https://bugzilla.suse.com/1227866

https://bugzilla.suse.com/1227870

https://bugzilla.suse.com/1227884

https://bugzilla.suse.com/1227886

https://bugzilla.suse.com/1227891

https://bugzilla.suse.com/1227893

https://bugzilla.suse.com/1227899

https://bugzilla.suse.com/1227900

https://bugzilla.suse.com/1227910

https://bugzilla.suse.com/1227913

https://bugzilla.suse.com/1227917

https://bugzilla.suse.com/1227919

https://bugzilla.suse.com/1227920

https://bugzilla.suse.com/1227921

https://bugzilla.suse.com/1227922

https://bugzilla.suse.com/1227923

https://bugzilla.suse.com/1227924

https://bugzilla.suse.com/1227925

https://bugzilla.suse.com/1227927

https://bugzilla.suse.com/1227928

https://bugzilla.suse.com/1227931

https://bugzilla.suse.com/1227932

https://bugzilla.suse.com/1227933

https://bugzilla.suse.com/1227935

https://bugzilla.suse.com/1227936

https://bugzilla.suse.com/1227938

https://bugzilla.suse.com/1227941

https://bugzilla.suse.com/1227942

https://bugzilla.suse.com/1227944

https://bugzilla.suse.com/1227945

https://bugzilla.suse.com/1227947

https://bugzilla.suse.com/1227948

https://bugzilla.suse.com/1227949

https://bugzilla.suse.com/1227950

https://www.suse.com/security/cve/CVE-2023-52591

https://www.suse.com/security/cve/CVE-2023-52735

https://www.suse.com/security/cve/CVE-2023-52751

https://www.suse.com/security/cve/CVE-2023-52762

https://www.suse.com/security/cve/CVE-2023-52775

https://www.suse.com/security/cve/CVE-2023-52812

https://www.suse.com/security/cve/CVE-2023-52857

https://www.suse.com/security/cve/CVE-2023-52863

https://www.suse.com/security/cve/CVE-2023-52885

https://www.suse.com/security/cve/CVE-2023-52886

https://www.suse.com/security/cve/CVE-2024-25741

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26585

https://www.suse.com/security/cve/CVE-2024-26615

https://www.suse.com/security/cve/CVE-2024-26633

https://www.suse.com/security/cve/CVE-2024-26635

https://www.suse.com/security/cve/CVE-2024-26636

https://www.suse.com/security/cve/CVE-2024-26641

https://www.suse.com/security/cve/CVE-2024-26661

https://www.suse.com/security/cve/CVE-2024-26663

https://www.suse.com/security/cve/CVE-2024-26665

https://www.suse.com/security/cve/CVE-2024-26800

https://www.suse.com/security/cve/CVE-2024-26802

https://www.suse.com/security/cve/CVE-2024-26813

https://www.suse.com/security/cve/CVE-2024-26814

https://www.suse.com/security/cve/CVE-2024-26863

https://www.suse.com/security/cve/CVE-2024-26889

https://www.suse.com/security/cve/CVE-2024-26920

https://www.suse.com/security/cve/CVE-2024-26935

https://www.suse.com/security/cve/CVE-2024-26961

https://www.suse.com/security/cve/CVE-2024-26976

https://www.suse.com/security/cve/CVE-2024-27015

https://www.suse.com/security/cve/CVE-2024-27019

https://www.suse.com/security/cve/CVE-2024-27020

https://www.suse.com/security/cve/CVE-2024-27025

https://www.suse.com/security/cve/CVE-2024-27065

https://www.suse.com/security/cve/CVE-2024-27402

https://www.suse.com/security/cve/CVE-2024-27437

https://www.suse.com/security/cve/CVE-2024-35805

https://www.suse.com/security/cve/CVE-2024-35819

https://www.suse.com/security/cve/CVE-2024-35837

https://www.suse.com/security/cve/CVE-2024-35853

https://www.suse.com/security/cve/CVE-2024-35854

https://www.suse.com/security/cve/CVE-2024-35855

https://www.suse.com/security/cve/CVE-2024-35889

https://www.suse.com/security/cve/CVE-2024-35890

https://www.suse.com/security/cve/CVE-2024-35893

https://www.suse.com/security/cve/CVE-2024-35899

https://www.suse.com/security/cve/CVE-2024-35934

https://www.suse.com/security/cve/CVE-2024-35949

https://www.suse.com/security/cve/CVE-2024-35961

https://www.suse.com/security/cve/CVE-2024-35979

https://www.suse.com/security/cve/CVE-2024-35995

https://www.suse.com/security/cve/CVE-2024-36000

https://www.suse.com/security/cve/CVE-2024-36004

https://www.suse.com/security/cve/CVE-2024-36288

https://www.suse.com/security/cve/CVE-2024-36889

https://www.suse.com/security/cve/CVE-2024-36901

https://www.suse.com/security/cve/CVE-2024-36902

https://www.suse.com/security/cve/CVE-2024-36909

https://www.suse.com/security/cve/CVE-2024-36910

https://www.suse.com/security/cve/CVE-2024-36911

https://www.suse.com/security/cve/CVE-2024-36912

https://www.suse.com/security/cve/CVE-2024-36913

https://www.suse.com/security/cve/CVE-2024-36914

https://www.suse.com/security/cve/CVE-2024-36919

https://www.suse.com/security/cve/CVE-2024-36923

https://www.suse.com/security/cve/CVE-2024-36924

https://www.suse.com/security/cve/CVE-2024-36926

https://www.suse.com/security/cve/CVE-2024-36939

https://www.suse.com/security/cve/CVE-2024-36941

https://www.suse.com/security/cve/CVE-2024-36942

https://www.suse.com/security/cve/CVE-2024-36944

https://www.suse.com/security/cve/CVE-2024-36946

https://www.suse.com/security/cve/CVE-2024-36947

https://www.suse.com/security/cve/CVE-2024-36950

https://www.suse.com/security/cve/CVE-2024-36952

https://www.suse.com/security/cve/CVE-2024-36955

https://www.suse.com/security/cve/CVE-2024-36959

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-38548

https://www.suse.com/security/cve/CVE-2024-38555

https://www.suse.com/security/cve/CVE-2024-38558

https://www.suse.com/security/cve/CVE-2024-38559

https://www.suse.com/security/cve/CVE-2024-38570

https://www.suse.com/security/cve/CVE-2024-38586

https://www.suse.com/security/cve/CVE-2024-38588

https://www.suse.com/security/cve/CVE-2024-38598

https://www.suse.com/security/cve/CVE-2024-38628

https://www.suse.com/security/cve/CVE-2024-39276

https://www.suse.com/security/cve/CVE-2024-39371

https://www.suse.com/security/cve/CVE-2024-39463

https://www.suse.com/security/cve/CVE-2024-39472

https://www.suse.com/security/cve/CVE-2024-39475

https://www.suse.com/security/cve/CVE-2024-39482

https://www.suse.com/security/cve/CVE-2024-39487

https://www.suse.com/security/cve/CVE-2024-39488

https://www.suse.com/security/cve/CVE-2024-39490

https://www.suse.com/security/cve/CVE-2024-39493

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-39497

https://www.suse.com/security/cve/CVE-2024-39499

https://www.suse.com/security/cve/CVE-2024-39500

https://www.suse.com/security/cve/CVE-2024-39501

https://www.suse.com/security/cve/CVE-2024-39502

https://www.suse.com/security/cve/CVE-2024-39505

https://www.suse.com/security/cve/CVE-2024-39506

https://www.suse.com/security/cve/CVE-2024-39507

https://www.suse.com/security/cve/CVE-2024-39508

https://www.suse.com/security/cve/CVE-2024-39509

https://www.suse.com/security/cve/CVE-2024-40900

https://www.suse.com/security/cve/CVE-2024-40901

https://www.suse.com/security/cve/CVE-2024-40902

https://www.suse.com/security/cve/CVE-2024-40903

https://www.suse.com/security/cve/CVE-2024-40904

https://www.suse.com/security/cve/CVE-2024-40906

https://www.suse.com/security/cve/CVE-2024-40908

https://www.suse.com/security/cve/CVE-2024-40909

https://www.suse.com/security/cve/CVE-2024-40911

https://www.suse.com/security/cve/CVE-2024-40912

https://www.suse.com/security/cve/CVE-2024-40916

https://www.suse.com/security/cve/CVE-2024-40919

https://www.suse.com/security/cve/CVE-2024-40923

https://www.suse.com/security/cve/CVE-2024-40924

https://www.suse.com/security/cve/CVE-2024-40927

https://www.suse.com/security/cve/CVE-2024-40929

https://www.suse.com/security/cve/CVE-2024-40931

https://www.suse.com/security/cve/CVE-2024-40932

https://www.suse.com/security/cve/CVE-2024-40934

https://www.suse.com/security/cve/CVE-2024-40935

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-40940

https://www.suse.com/security/cve/CVE-2024-40941

https://www.suse.com/security/cve/CVE-2024-40942

https://www.suse.com/security/cve/CVE-2024-40943

https://www.suse.com/security/cve/CVE-2024-40945

https://www.suse.com/security/cve/CVE-2024-40953

https://www.suse.com/security/cve/CVE-2024-40954

https://www.suse.com/security/cve/CVE-2024-40956

https://www.suse.com/security/cve/CVE-2024-40958

https://www.suse.com/security/cve/CVE-2024-40959

https://www.suse.com/security/cve/CVE-2024-40960

https://www.suse.com/security/cve/CVE-2024-40961

https://www.suse.com/security/cve/CVE-2024-40966

https://www.suse.com/security/cve/CVE-2024-40967

https://www.suse.com/security/cve/CVE-2024-40970

https://www.suse.com/security/cve/CVE-2024-40972

https://www.suse.com/security/cve/CVE-2024-40976

https://www.suse.com/security/cve/CVE-2024-40977

https://www.suse.com/security/cve/CVE-2024-40981

https://www.suse.com/security/cve/CVE-2024-40982

https://www.suse.com/security/cve/CVE-2024-40984

https://www.suse.com/security/cve/CVE-2024-40987

https://www.suse.com/security/cve/CVE-2024-40988

https://www.suse.com/security/cve/CVE-2024-40989

https://www.suse.com/security/cve/CVE-2024-40990

https://www.suse.com/security/cve/CVE-2024-40994

https://www.suse.com/security/cve/CVE-2024-40998

https://www.suse.com/security/cve/CVE-2024-40999

https://www.suse.com/security/cve/CVE-2024-41002

https://www.suse.com/security/cve/CVE-2024-41004

https://www.suse.com/security/cve/CVE-2024-41006

https://www.suse.com/security/cve/CVE-2024-41009

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41012

https://www.suse.com/security/cve/CVE-2024-41013

https://www.suse.com/security/cve/CVE-2024-41014

https://www.suse.com/security/cve/CVE-2024-41015

https://www.suse.com/security/cve/CVE-2024-41016

https://www.suse.com/security/cve/CVE-2024-41017

https://www.suse.com/security/cve/CVE-2024-41040

https://www.suse.com/security/cve/CVE-2024-41041

https://www.suse.com/security/cve/CVE-2024-41044

https://www.suse.com/security/cve/CVE-2024-41048

https://www.suse.com/security/cve/CVE-2024-41057

https://www.suse.com/security/cve/CVE-2024-41058

https://www.suse.com/security/cve/CVE-2024-41059

https://www.suse.com/security/cve/CVE-2024-41063

https://www.suse.com/security/cve/CVE-2024-41064

https://www.suse.com/security/cve/CVE-2024-41066

https://www.suse.com/security/cve/CVE-2024-41069

https://www.suse.com/security/cve/CVE-2024-41070

https://www.suse.com/security/cve/CVE-2024-41071

https://www.suse.com/security/cve/CVE-2024-41072

https://www.suse.com/security/cve/CVE-2024-41076

https://www.suse.com/security/cve/CVE-2024-41078

https://www.suse.com/security/cve/CVE-2024-41081

https://www.suse.com/security/cve/CVE-2024-41087

https://www.suse.com/security/cve/CVE-2024-41090

https://www.suse.com/security/cve/CVE-2024-41091

https://www.suse.com/security/cve/CVE-2024-42070

https://www.suse.com/security/cve/CVE-2024-42079

https://www.suse.com/security/cve/CVE-2024-42093

https://www.suse.com/security/cve/CVE-2024-42096

https://www.suse.com/security/cve/CVE-2024-42105

https://www.suse.com/security/cve/CVE-2024-42122

https://www.suse.com/security/cve/CVE-2024-42124

https://www.suse.com/security/cve/CVE-2024-42145

https://www.suse.com/security/cve/CVE-2024-42161

https://www.suse.com/security/cve/CVE-2024-42224

https://www.suse.com/security/cve/CVE-2024-42230

Plugin Details

Severity: High

ID: 205747

File Name: suse_SU-2024-2947-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/17/2024

Updated: 9/26/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-42093

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/16/2024

Vulnerability Publication Date: 3/7/2022

Reference Information

CVE: CVE-2021-47086, CVE-2021-47103, CVE-2021-47186, CVE-2021-47402, CVE-2021-47546, CVE-2021-47547, CVE-2021-47588, CVE-2021-47590, CVE-2021-47591, CVE-2021-47593, CVE-2021-47598, CVE-2021-47599, CVE-2021-47606, CVE-2021-47622, CVE-2021-47623, CVE-2021-47624, CVE-2022-48713, CVE-2022-48730, CVE-2022-48732, CVE-2022-48749, CVE-2022-48756, CVE-2022-48773, CVE-2022-48774, CVE-2022-48775, CVE-2022-48776, CVE-2022-48777, CVE-2022-48778, CVE-2022-48780, CVE-2022-48783, CVE-2022-48784, CVE-2022-48785, CVE-2022-48786, CVE-2022-48787, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48791, CVE-2022-48792, CVE-2022-48793, CVE-2022-48794, CVE-2022-48796, CVE-2022-48797, CVE-2022-48798, CVE-2022-48799, CVE-2022-48800, CVE-2022-48801, CVE-2022-48802, CVE-2022-48803, CVE-2022-48804, CVE-2022-48805, CVE-2022-48806, CVE-2022-48807, CVE-2022-48809, CVE-2022-48810, CVE-2022-48811, CVE-2022-48812, CVE-2022-48813, CVE-2022-48814, CVE-2022-48815, CVE-2022-48816, CVE-2022-48817, CVE-2022-48818, CVE-2022-48820, CVE-2022-48821, CVE-2022-48822, CVE-2022-48823, CVE-2022-48824, CVE-2022-48825, CVE-2022-48826, CVE-2022-48827, CVE-2022-48828, CVE-2022-48829, CVE-2022-48830, CVE-2022-48831, CVE-2022-48834, CVE-2022-48835, CVE-2022-48836, CVE-2022-48837, CVE-2022-48838, CVE-2022-48839, CVE-2022-48840, CVE-2022-48841, CVE-2022-48842, CVE-2022-48843, CVE-2022-48844, CVE-2022-48846, CVE-2022-48847, CVE-2022-48849, CVE-2022-48850, CVE-2022-48851, CVE-2022-48852, CVE-2022-48853, CVE-2022-48855, CVE-2022-48856, CVE-2022-48857, CVE-2022-48858, CVE-2022-48859, CVE-2022-48860, CVE-2022-48861, CVE-2022-48862, CVE-2022-48863, CVE-2022-48864, CVE-2022-48866, CVE-2023-1582, CVE-2023-37453, CVE-2023-52435, CVE-2023-52573, CVE-2023-52580, CVE-2023-52591, CVE-2023-52735, CVE-2023-52751, CVE-2023-52762, CVE-2023-52775, CVE-2023-52812, CVE-2023-52857, CVE-2023-52863, CVE-2023-52885, CVE-2023-52886, CVE-2024-25741, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-26615, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26661, CVE-2024-26663, CVE-2024-26665, CVE-2024-26800, CVE-2024-26802, CVE-2024-26813, CVE-2024-26814, CVE-2024-26863, CVE-2024-26889, CVE-2024-26920, CVE-2024-26935, CVE-2024-26961, CVE-2024-26976, CVE-2024-27015, CVE-2024-27019, CVE-2024-27020, CVE-2024-27025, CVE-2024-27065, CVE-2024-27402, CVE-2024-27437, CVE-2024-35805, CVE-2024-35819, CVE-2024-35837, CVE-2024-35853, CVE-2024-35854, CVE-2024-35855, CVE-2024-35889, CVE-2024-35890, CVE-2024-35893, CVE-2024-35899, CVE-2024-35934, CVE-2024-35949, CVE-2024-35961, CVE-2024-35979, CVE-2024-35995, CVE-2024-36000, CVE-2024-36004, CVE-2024-36288, CVE-2024-36889, CVE-2024-36901, CVE-2024-36902, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36912, CVE-2024-36913, CVE-2024-36914, CVE-2024-36919, CVE-2024-36923, CVE-2024-36924, CVE-2024-36926, CVE-2024-36939, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36946, CVE-2024-36947, CVE-2024-36950, CVE-2024-36952, CVE-2024-36955, CVE-2024-36959, CVE-2024-36974, CVE-2024-38548, CVE-2024-38555, CVE-2024-38558, CVE-2024-38559, CVE-2024-38570, CVE-2024-38586, CVE-2024-38588, CVE-2024-38598, CVE-2024-38628, CVE-2024-39276, CVE-2024-39371, CVE-2024-39463, CVE-2024-39472, CVE-2024-39475, CVE-2024-39482, CVE-2024-39487, CVE-2024-39488, CVE-2024-39490, CVE-2024-39493, CVE-2024-39494, CVE-2024-39497, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39502, CVE-2024-39505, CVE-2024-39506, CVE-2024-39507, CVE-2024-39508, CVE-2024-39509, CVE-2024-40900, CVE-2024-40901, CVE-2024-40902, CVE-2024-40903, CVE-2024-40904, CVE-2024-40906, CVE-2024-40908, CVE-2024-40909, CVE-2024-40911, CVE-2024-40912, CVE-2024-40916, CVE-2024-40919, CVE-2024-40923, CVE-2024-40924, CVE-2024-40927, CVE-2024-40929, CVE-2024-40931, CVE-2024-40932, CVE-2024-40934, CVE-2024-40935, CVE-2024-40937, CVE-2024-40940, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40945, CVE-2024-40953, CVE-2024-40954, CVE-2024-40956, CVE-2024-40958, CVE-2024-40959, CVE-2024-40960, CVE-2024-40961, CVE-2024-40966, CVE-2024-40967, CVE-2024-40970, CVE-2024-40972, CVE-2024-40976, CVE-2024-40977, CVE-2024-40981, CVE-2024-40982, CVE-2024-40984, CVE-2024-40987, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40994, CVE-2024-40998, CVE-2024-40999, CVE-2024-41002, CVE-2024-41004, CVE-2024-41006, CVE-2024-41009, CVE-2024-41011, CVE-2024-41012, CVE-2024-41013, CVE-2024-41014, CVE-2024-41015, CVE-2024-41016, CVE-2024-41017, CVE-2024-41040, CVE-2024-41041, CVE-2024-41044, CVE-2024-41048, CVE-2024-41057, CVE-2024-41058, CVE-2024-41059, CVE-2024-41063, CVE-2024-41064, CVE-2024-41066, CVE-2024-41069, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41076, CVE-2024-41078, CVE-2024-41081, CVE-2024-41087, CVE-2024-41090, CVE-2024-41091, CVE-2024-42070, CVE-2024-42079, CVE-2024-42093, CVE-2024-42096, CVE-2024-42105, CVE-2024-42122, CVE-2024-42124, CVE-2024-42145, CVE-2024-42161, CVE-2024-42224, CVE-2024-42230

SuSE: SUSE-SU-2024:2947-1