SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2024:4364-1)

critical Nessus Plugin ID 213129

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:4364-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).
- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233).
- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).
- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).
- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).
- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).
- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).
- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).
- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46828: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1231114).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496).
- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).
- CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944).
- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).
- CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043).
- CVE-2024-47727: x86/tdx: Fix 'in-kernel MMIO' check (bsc#1232116).
- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).
- CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114).
- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).
- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).
- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).
- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).
- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369).
- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).
- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).
- CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).
- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).
- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).
- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).
- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).
- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).
- CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).
- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).
- CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
- CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501).
- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).
- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).
- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).
- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).
- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).
- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).
- CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110).
- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).
- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).
- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).
- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).
- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).
- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).
- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).
- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1054914

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1082555

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1204171

https://bugzilla.suse.com/1205796

https://bugzilla.suse.com/1206188

https://bugzilla.suse.com/1206344

https://bugzilla.suse.com/1209290

https://bugzilla.suse.com/1210449

https://bugzilla.suse.com/1210627

https://bugzilla.suse.com/1213034

https://bugzilla.suse.com/1216813

https://bugzilla.suse.com/1218562

https://bugzilla.suse.com/1218644

https://bugzilla.suse.com/1220382

https://bugzilla.suse.com/1221309

https://bugzilla.suse.com/1221333

https://bugzilla.suse.com/1222364

https://bugzilla.suse.com/1222590

https://bugzilla.suse.com/1223202

https://bugzilla.suse.com/1223384

https://bugzilla.suse.com/1223524

https://bugzilla.suse.com/1223656

https://bugzilla.suse.com/1223824

https://bugzilla.suse.com/1223848

https://bugzilla.suse.com/1223919

https://bugzilla.suse.com/1223942

https://bugzilla.suse.com/1224518

https://bugzilla.suse.com/1224526

https://bugzilla.suse.com/1224574

https://bugzilla.suse.com/1225189

https://bugzilla.suse.com/1225336

https://bugzilla.suse.com/1225611

https://bugzilla.suse.com/1225725

https://bugzilla.suse.com/1225730

https://bugzilla.suse.com/1225742

https://bugzilla.suse.com/1225762

https://bugzilla.suse.com/1225764

https://bugzilla.suse.com/1225812

https://bugzilla.suse.com/1226498

https://bugzilla.suse.com/1226560

https://bugzilla.suse.com/1226592

https://bugzilla.suse.com/1226631

https://bugzilla.suse.com/1226748

https://bugzilla.suse.com/1226797

https://bugzilla.suse.com/1226872

https://bugzilla.suse.com/1227437

https://bugzilla.suse.com/1227853

https://bugzilla.suse.com/1227885

https://bugzilla.suse.com/1228119

https://bugzilla.suse.com/1228269

https://bugzilla.suse.com/1228410

https://bugzilla.suse.com/1228430

https://bugzilla.suse.com/1228486

https://bugzilla.suse.com/1228650

https://bugzilla.suse.com/1228709

https://bugzilla.suse.com/1228743

https://bugzilla.suse.com/1228747

https://bugzilla.suse.com/1228857

https://bugzilla.suse.com/1229005

https://bugzilla.suse.com/1229019

https://bugzilla.suse.com/1229312

https://bugzilla.suse.com/1229429

https://bugzilla.suse.com/1229450

https://bugzilla.suse.com/1229454

https://bugzilla.suse.com/1229456

https://bugzilla.suse.com/1229556

https://bugzilla.suse.com/1229585

https://bugzilla.suse.com/1229752

https://bugzilla.suse.com/1229769

https://bugzilla.suse.com/1229808

https://bugzilla.suse.com/1229837

https://bugzilla.suse.com/1229891

https://bugzilla.suse.com/1230055

https://bugzilla.suse.com/1230179

https://bugzilla.suse.com/1230220

https://bugzilla.suse.com/1230231

https://bugzilla.suse.com/1230270

https://bugzilla.suse.com/1230289

https://bugzilla.suse.com/1230405

https://bugzilla.suse.com/1230414

https://bugzilla.suse.com/1230429

https://bugzilla.suse.com/1230456

https://bugzilla.suse.com/1230550

https://bugzilla.suse.com/1230558

https://bugzilla.suse.com/1230600

https://bugzilla.suse.com/1230620

https://bugzilla.suse.com/1230715

https://bugzilla.suse.com/1230722

https://bugzilla.suse.com/1230763

https://bugzilla.suse.com/1230773

https://bugzilla.suse.com/1230774

https://bugzilla.suse.com/1230801

https://bugzilla.suse.com/1230827

https://bugzilla.suse.com/1230903

https://bugzilla.suse.com/1230918

https://bugzilla.suse.com/1231016

https://bugzilla.suse.com/1231072

https://bugzilla.suse.com/1231073

https://bugzilla.suse.com/1231083

https://bugzilla.suse.com/1231084

https://bugzilla.suse.com/1231085

https://bugzilla.suse.com/1231087

https://bugzilla.suse.com/1231089

https://bugzilla.suse.com/1231094

https://bugzilla.suse.com/1231096

https://bugzilla.suse.com/1231098

https://bugzilla.suse.com/1231101

https://bugzilla.suse.com/1231105

https://bugzilla.suse.com/1231108

https://bugzilla.suse.com/1231111

https://bugzilla.suse.com/1231114

https://bugzilla.suse.com/1231115

https://bugzilla.suse.com/1231132

https://bugzilla.suse.com/1231135

https://bugzilla.suse.com/1231138

https://bugzilla.suse.com/1231148

https://bugzilla.suse.com/1231169

https://bugzilla.suse.com/1231178

https://bugzilla.suse.com/1231179

https://bugzilla.suse.com/1231180

https://bugzilla.suse.com/1231181

https://bugzilla.suse.com/1231187

https://bugzilla.suse.com/1231191

https://bugzilla.suse.com/1231193

https://bugzilla.suse.com/1231195

https://bugzilla.suse.com/1231197

https://bugzilla.suse.com/1231200

https://bugzilla.suse.com/1231202

https://bugzilla.suse.com/1231203

https://bugzilla.suse.com/1231277

https://bugzilla.suse.com/1231293

https://bugzilla.suse.com/1231327

https://bugzilla.suse.com/1231344

https://bugzilla.suse.com/1231375

https://bugzilla.suse.com/1231383

https://bugzilla.suse.com/1231434

https://bugzilla.suse.com/1231439

https://bugzilla.suse.com/1231441

https://bugzilla.suse.com/1231442

https://bugzilla.suse.com/1231452

https://bugzilla.suse.com/1231465

https://bugzilla.suse.com/1231474

https://bugzilla.suse.com/1231481

https://bugzilla.suse.com/1231496

https://bugzilla.suse.com/1231502

https://bugzilla.suse.com/1231537

https://bugzilla.suse.com/1231539

https://bugzilla.suse.com/1231540

https://bugzilla.suse.com/1231541

https://bugzilla.suse.com/1231578

https://bugzilla.suse.com/1231646

https://bugzilla.suse.com/1231673

https://bugzilla.suse.com/1231849

https://bugzilla.suse.com/1231856

https://bugzilla.suse.com/1231857

https://bugzilla.suse.com/1231858

https://bugzilla.suse.com/1231859

https://bugzilla.suse.com/1231861

https://bugzilla.suse.com/1231864

https://bugzilla.suse.com/1231872

https://bugzilla.suse.com/1231883

https://bugzilla.suse.com/1231885

https://bugzilla.suse.com/1231887

https://bugzilla.suse.com/1231888

https://bugzilla.suse.com/1231889

https://bugzilla.suse.com/1231890

https://bugzilla.suse.com/1231892

https://bugzilla.suse.com/1231893

https://bugzilla.suse.com/1231895

https://bugzilla.suse.com/1231896

https://bugzilla.suse.com/1231897

https://bugzilla.suse.com/1231902

https://bugzilla.suse.com/1231903

https://bugzilla.suse.com/1231904

https://bugzilla.suse.com/1231907

https://bugzilla.suse.com/1231914

https://bugzilla.suse.com/1231916

https://bugzilla.suse.com/1231920

https://bugzilla.suse.com/1231923

https://bugzilla.suse.com/1231929

https://bugzilla.suse.com/1231930

https://bugzilla.suse.com/1231931

https://bugzilla.suse.com/1231935

https://bugzilla.suse.com/1231936

https://bugzilla.suse.com/1231937

https://bugzilla.suse.com/1231938

https://bugzilla.suse.com/1231939

https://bugzilla.suse.com/1231940

https://bugzilla.suse.com/1231941

https://bugzilla.suse.com/1231942

https://bugzilla.suse.com/1231944

https://bugzilla.suse.com/1231947

https://bugzilla.suse.com/1231950

https://bugzilla.suse.com/1231952

https://bugzilla.suse.com/1231953

https://bugzilla.suse.com/1231954

https://bugzilla.suse.com/1231958

https://bugzilla.suse.com/1231959

https://bugzilla.suse.com/1231960

https://bugzilla.suse.com/1231961

https://bugzilla.suse.com/1231962

https://bugzilla.suse.com/1231965

https://bugzilla.suse.com/1231967

https://bugzilla.suse.com/1231968

https://bugzilla.suse.com/1231972

https://bugzilla.suse.com/1231973

https://bugzilla.suse.com/1231976

https://bugzilla.suse.com/1231978

https://bugzilla.suse.com/1231979

https://bugzilla.suse.com/1231987

https://bugzilla.suse.com/1231988

https://bugzilla.suse.com/1231990

https://bugzilla.suse.com/1231991

https://bugzilla.suse.com/1231992

https://bugzilla.suse.com/1231995

https://bugzilla.suse.com/1231996

https://bugzilla.suse.com/1231997

https://bugzilla.suse.com/1231998

https://bugzilla.suse.com/1232001

https://bugzilla.suse.com/1232004

https://bugzilla.suse.com/1232005

https://bugzilla.suse.com/1232006

https://bugzilla.suse.com/1232007

https://bugzilla.suse.com/1232013

https://bugzilla.suse.com/1232015

https://bugzilla.suse.com/1232016

https://bugzilla.suse.com/1232017

https://bugzilla.suse.com/1232025

https://bugzilla.suse.com/1232026

https://bugzilla.suse.com/1232027

https://bugzilla.suse.com/1232028

https://bugzilla.suse.com/1232033

https://bugzilla.suse.com/1232034

https://bugzilla.suse.com/1232035

https://bugzilla.suse.com/1232036

https://bugzilla.suse.com/1232037

https://bugzilla.suse.com/1232038

https://bugzilla.suse.com/1232039

https://bugzilla.suse.com/1232043

https://bugzilla.suse.com/1232047

https://bugzilla.suse.com/1232048

https://bugzilla.suse.com/1232049

https://bugzilla.suse.com/1232050

https://bugzilla.suse.com/1232056

https://bugzilla.suse.com/1232067

https://bugzilla.suse.com/1232069

https://bugzilla.suse.com/1232070

https://bugzilla.suse.com/1232071

https://bugzilla.suse.com/1232075

https://bugzilla.suse.com/1232076

https://bugzilla.suse.com/1232080

https://bugzilla.suse.com/1232083

https://bugzilla.suse.com/1232084

https://bugzilla.suse.com/1232085

https://bugzilla.suse.com/1232089

https://bugzilla.suse.com/1232094

https://bugzilla.suse.com/1232096

https://bugzilla.suse.com/1232097

https://bugzilla.suse.com/1232098

https://bugzilla.suse.com/1232104

https://bugzilla.suse.com/1232105

https://bugzilla.suse.com/1232108

https://bugzilla.suse.com/1232111

https://bugzilla.suse.com/1232114

https://bugzilla.suse.com/1232116

https://bugzilla.suse.com/1232119

https://bugzilla.suse.com/1232120

https://bugzilla.suse.com/1232123

https://bugzilla.suse.com/1232124

https://bugzilla.suse.com/1232126

https://bugzilla.suse.com/1232133

https://bugzilla.suse.com/1232134

https://bugzilla.suse.com/1232135

https://bugzilla.suse.com/1232136

https://bugzilla.suse.com/1232140

https://bugzilla.suse.com/1232141

https://bugzilla.suse.com/1232142

https://bugzilla.suse.com/1232145

https://bugzilla.suse.com/1232147

https://bugzilla.suse.com/1232149

https://bugzilla.suse.com/1232150

https://bugzilla.suse.com/1232151

https://bugzilla.suse.com/1232152

https://bugzilla.suse.com/1232154

https://bugzilla.suse.com/1232155

https://bugzilla.suse.com/1232159

https://bugzilla.suse.com/1232160

https://bugzilla.suse.com/1232162

https://bugzilla.suse.com/1232163

https://bugzilla.suse.com/1232164

https://bugzilla.suse.com/1232165

https://bugzilla.suse.com/1232170

https://bugzilla.suse.com/1232172

https://bugzilla.suse.com/1232174

https://bugzilla.suse.com/1232175

https://bugzilla.suse.com/1232180

https://bugzilla.suse.com/1232185

https://bugzilla.suse.com/1232187

https://bugzilla.suse.com/1232189

https://bugzilla.suse.com/1232191

https://bugzilla.suse.com/1232195

https://bugzilla.suse.com/1232196

https://bugzilla.suse.com/1232198

https://bugzilla.suse.com/1232199

https://bugzilla.suse.com/1232200

https://bugzilla.suse.com/1232201

https://bugzilla.suse.com/1232217

https://bugzilla.suse.com/1232218

https://bugzilla.suse.com/1232220

https://bugzilla.suse.com/1232221

https://bugzilla.suse.com/1232224

https://bugzilla.suse.com/1232309

https://bugzilla.suse.com/1232310

https://bugzilla.suse.com/1232312

https://bugzilla.suse.com/1232313

https://bugzilla.suse.com/1232314

https://bugzilla.suse.com/1232316

https://bugzilla.suse.com/1232317

https://bugzilla.suse.com/1232318

https://bugzilla.suse.com/1232329

https://bugzilla.suse.com/1232332

https://bugzilla.suse.com/1232333

https://bugzilla.suse.com/1232334

https://bugzilla.suse.com/1232335

https://bugzilla.suse.com/1232337

https://bugzilla.suse.com/1232339

https://bugzilla.suse.com/1232342

https://bugzilla.suse.com/1232345

https://bugzilla.suse.com/1232349

https://bugzilla.suse.com/1232352

https://bugzilla.suse.com/1232354

https://bugzilla.suse.com/1232355

https://bugzilla.suse.com/1232357

https://bugzilla.suse.com/1232358

https://bugzilla.suse.com/1232359

https://bugzilla.suse.com/1232361

https://bugzilla.suse.com/1232362

https://bugzilla.suse.com/1232364

https://bugzilla.suse.com/1232366

https://bugzilla.suse.com/1232367

https://bugzilla.suse.com/1232368

https://bugzilla.suse.com/1232369

https://bugzilla.suse.com/1232370

https://bugzilla.suse.com/1232371

https://bugzilla.suse.com/1232374

https://bugzilla.suse.com/1232378

https://bugzilla.suse.com/1232381

https://bugzilla.suse.com/1232383

https://bugzilla.suse.com/1232385

https://bugzilla.suse.com/1232387

https://bugzilla.suse.com/1232392

https://bugzilla.suse.com/1232394

https://bugzilla.suse.com/1232395

https://bugzilla.suse.com/1232413

https://bugzilla.suse.com/1232416

https://bugzilla.suse.com/1232418

https://bugzilla.suse.com/1232424

https://bugzilla.suse.com/1232432

https://bugzilla.suse.com/1232885

https://bugzilla.suse.com/1232887

https://bugzilla.suse.com/1232888

https://bugzilla.suse.com/1232890

https://bugzilla.suse.com/1232892

https://bugzilla.suse.com/1232896

https://bugzilla.suse.com/1232897

https://bugzilla.suse.com/1232905

https://bugzilla.suse.com/1232907

https://bugzilla.suse.com/1232919

https://bugzilla.suse.com/1232926

https://bugzilla.suse.com/1232928

https://bugzilla.suse.com/1232935

https://bugzilla.suse.com/1233035

https://bugzilla.suse.com/1233049

https://bugzilla.suse.com/1233051

https://bugzilla.suse.com/1233056

https://bugzilla.suse.com/1233057

https://bugzilla.suse.com/1234085

https://bugzilla.suse.com/1234093

https://bugzilla.suse.com/1234098

https://bugzilla.suse.com/1234108

http://www.nessus.org/u?2d70561b

https://www.suse.com/security/cve/CVE-2021-47416

https://www.suse.com/security/cve/CVE-2021-47534

https://www.suse.com/security/cve/CVE-2021-47594

https://www.suse.com/security/cve/CVE-2022-3435

https://www.suse.com/security/cve/CVE-2022-45934

https://www.suse.com/security/cve/CVE-2022-48664

https://www.suse.com/security/cve/CVE-2022-48674

https://www.suse.com/security/cve/CVE-2022-48879

https://www.suse.com/security/cve/CVE-2022-48946

https://www.suse.com/security/cve/CVE-2022-48947

https://www.suse.com/security/cve/CVE-2022-48948

https://www.suse.com/security/cve/CVE-2022-48949

https://www.suse.com/security/cve/CVE-2022-48951

https://www.suse.com/security/cve/CVE-2022-48953

https://www.suse.com/security/cve/CVE-2022-48954

https://www.suse.com/security/cve/CVE-2022-48955

https://www.suse.com/security/cve/CVE-2022-48956

https://www.suse.com/security/cve/CVE-2022-48957

https://www.suse.com/security/cve/CVE-2022-48958

https://www.suse.com/security/cve/CVE-2022-48959

https://www.suse.com/security/cve/CVE-2022-48960

https://www.suse.com/security/cve/CVE-2022-48961

https://www.suse.com/security/cve/CVE-2022-48962

https://www.suse.com/security/cve/CVE-2022-48966

https://www.suse.com/security/cve/CVE-2022-48967

https://www.suse.com/security/cve/CVE-2022-48968

https://www.suse.com/security/cve/CVE-2022-48969

https://www.suse.com/security/cve/CVE-2022-48970

https://www.suse.com/security/cve/CVE-2022-48971

https://www.suse.com/security/cve/CVE-2022-48972

https://www.suse.com/security/cve/CVE-2022-48973

https://www.suse.com/security/cve/CVE-2022-48975

https://www.suse.com/security/cve/CVE-2022-48977

https://www.suse.com/security/cve/CVE-2022-48978

https://www.suse.com/security/cve/CVE-2022-48979

https://www.suse.com/security/cve/CVE-2022-48980

https://www.suse.com/security/cve/CVE-2022-48981

https://www.suse.com/security/cve/CVE-2022-48982

https://www.suse.com/security/cve/CVE-2022-48983

https://www.suse.com/security/cve/CVE-2022-48985

https://www.suse.com/security/cve/CVE-2022-48987

https://www.suse.com/security/cve/CVE-2022-48988

https://www.suse.com/security/cve/CVE-2022-48989

https://www.suse.com/security/cve/CVE-2022-48990

https://www.suse.com/security/cve/CVE-2022-48991

https://www.suse.com/security/cve/CVE-2022-48992

https://www.suse.com/security/cve/CVE-2022-48994

https://www.suse.com/security/cve/CVE-2022-48995

https://www.suse.com/security/cve/CVE-2022-48997

https://www.suse.com/security/cve/CVE-2022-48999

https://www.suse.com/security/cve/CVE-2022-49000

https://www.suse.com/security/cve/CVE-2022-49002

https://www.suse.com/security/cve/CVE-2022-49003

https://www.suse.com/security/cve/CVE-2022-49005

https://www.suse.com/security/cve/CVE-2022-49006

https://www.suse.com/security/cve/CVE-2022-49007

https://www.suse.com/security/cve/CVE-2022-49010

https://www.suse.com/security/cve/CVE-2022-49011

https://www.suse.com/security/cve/CVE-2022-49012

https://www.suse.com/security/cve/CVE-2022-49014

https://www.suse.com/security/cve/CVE-2022-49015

https://www.suse.com/security/cve/CVE-2024-46777

https://www.suse.com/security/cve/CVE-2024-46800

https://www.suse.com/security/cve/CVE-2024-46802

https://www.suse.com/security/cve/CVE-2024-46804

https://www.suse.com/security/cve/CVE-2024-46805

https://www.suse.com/security/cve/CVE-2024-46807

https://www.suse.com/security/cve/CVE-2024-46809

https://www.suse.com/security/cve/CVE-2024-46810

https://www.suse.com/security/cve/CVE-2024-46811

https://www.suse.com/security/cve/CVE-2024-46812

https://www.suse.com/security/cve/CVE-2024-46813

https://www.suse.com/security/cve/CVE-2024-46814

https://www.suse.com/security/cve/CVE-2024-46815

https://www.suse.com/security/cve/CVE-2024-46816

https://www.suse.com/security/cve/CVE-2024-46817

https://www.suse.com/security/cve/CVE-2024-46818

https://www.suse.com/security/cve/CVE-2024-46819

https://www.suse.com/security/cve/CVE-2024-46821

https://www.suse.com/security/cve/CVE-2024-46826

https://www.suse.com/security/cve/CVE-2024-46828

https://www.suse.com/security/cve/CVE-2024-46834

https://www.suse.com/security/cve/CVE-2024-46835

https://www.suse.com/security/cve/CVE-2024-46840

https://www.suse.com/security/cve/CVE-2024-46841

https://www.suse.com/security/cve/CVE-2024-46842

https://www.suse.com/security/cve/CVE-2024-46848

https://www.suse.com/security/cve/CVE-2024-46849

https://www.suse.com/security/cve/CVE-2024-46853

https://www.suse.com/security/cve/CVE-2024-46854

https://www.suse.com/security/cve/CVE-2024-46855

https://www.suse.com/security/cve/CVE-2024-46857

https://www.suse.com/security/cve/CVE-2024-46859

https://www.suse.com/security/cve/CVE-2024-46864

https://www.suse.com/security/cve/CVE-2024-46871

https://www.suse.com/security/cve/CVE-2024-47660

https://www.suse.com/security/cve/CVE-2024-47661

https://www.suse.com/security/cve/CVE-2024-47663

https://www.suse.com/security/cve/CVE-2024-47664

https://www.suse.com/security/cve/CVE-2024-47665

https://www.suse.com/security/cve/CVE-2024-47667

https://www.suse.com/security/cve/CVE-2024-47668

https://www.suse.com/security/cve/CVE-2024-47669

https://www.suse.com/security/cve/CVE-2024-47670

https://www.suse.com/security/cve/CVE-2024-47671

https://www.suse.com/security/cve/CVE-2024-47672

https://www.suse.com/security/cve/CVE-2024-47673

https://www.suse.com/security/cve/CVE-2024-47674

https://www.suse.com/security/cve/CVE-2024-47679

https://www.suse.com/security/cve/CVE-2024-47682

https://www.suse.com/security/cve/CVE-2024-47684

https://www.suse.com/security/cve/CVE-2024-47685

https://www.suse.com/security/cve/CVE-2024-47692

https://www.suse.com/security/cve/CVE-2024-47693

https://www.suse.com/security/cve/CVE-2024-47695

https://www.suse.com/security/cve/CVE-2024-47696

https://www.suse.com/security/cve/CVE-2024-47697

https://www.suse.com/security/cve/CVE-2024-47698

https://www.suse.com/security/cve/CVE-2024-47699

https://www.suse.com/security/cve/CVE-2024-47701

https://www.suse.com/security/cve/CVE-2024-47704

https://www.suse.com/security/cve/CVE-2024-47705

https://www.suse.com/security/cve/CVE-2024-47706

https://www.suse.com/security/cve/CVE-2024-47707

https://bugzilla.suse.com/1232229

https://bugzilla.suse.com/1232232

https://bugzilla.suse.com/1232233

https://bugzilla.suse.com/1232237

https://bugzilla.suse.com/1232251

https://bugzilla.suse.com/1232253

https://bugzilla.suse.com/1232254

https://bugzilla.suse.com/1232255

https://bugzilla.suse.com/1232259

https://bugzilla.suse.com/1232260

https://bugzilla.suse.com/1232262

https://bugzilla.suse.com/1232263

https://bugzilla.suse.com/1232264

https://bugzilla.suse.com/1232272

https://bugzilla.suse.com/1232279

https://bugzilla.suse.com/1232282

https://bugzilla.suse.com/1232285

https://bugzilla.suse.com/1232286

https://bugzilla.suse.com/1232287

https://bugzilla.suse.com/1232293

https://bugzilla.suse.com/1232304

https://bugzilla.suse.com/1232305

https://bugzilla.suse.com/1232307

https://bugzilla.suse.com/1232435

https://bugzilla.suse.com/1232436

https://bugzilla.suse.com/1232442

https://bugzilla.suse.com/1232446

https://bugzilla.suse.com/1232483

https://bugzilla.suse.com/1232500

https://bugzilla.suse.com/1232501

https://bugzilla.suse.com/1232503

https://bugzilla.suse.com/1232504

https://bugzilla.suse.com/1232507

https://bugzilla.suse.com/1232519

https://bugzilla.suse.com/1232520

https://bugzilla.suse.com/1232552

https://bugzilla.suse.com/1232630

https://bugzilla.suse.com/1232631

https://bugzilla.suse.com/1232632

https://bugzilla.suse.com/1232757

https://bugzilla.suse.com/1232819

https://bugzilla.suse.com/1232860

https://bugzilla.suse.com/1232870

https://bugzilla.suse.com/1232873

https://bugzilla.suse.com/1232877

https://bugzilla.suse.com/1232878

https://bugzilla.suse.com/1232881

https://bugzilla.suse.com/1232884

https://bugzilla.suse.com/1233061

https://bugzilla.suse.com/1233063

https://bugzilla.suse.com/1233065

https://bugzilla.suse.com/1233067

https://bugzilla.suse.com/1233070

https://bugzilla.suse.com/1233073

https://bugzilla.suse.com/1233074

https://bugzilla.suse.com/1233100

https://bugzilla.suse.com/1233103

https://bugzilla.suse.com/1233104

https://bugzilla.suse.com/1233105

https://bugzilla.suse.com/1233106

https://bugzilla.suse.com/1233107

https://bugzilla.suse.com/1233108

https://bugzilla.suse.com/1233110

https://bugzilla.suse.com/1233111

https://bugzilla.suse.com/1233113

https://bugzilla.suse.com/1233114

https://bugzilla.suse.com/1233117

https://bugzilla.suse.com/1233123

https://bugzilla.suse.com/1233125

https://bugzilla.suse.com/1233129

https://bugzilla.suse.com/1233130

https://bugzilla.suse.com/1233134

https://bugzilla.suse.com/1233135

https://bugzilla.suse.com/1233150

https://bugzilla.suse.com/1233189

https://bugzilla.suse.com/1233191

https://bugzilla.suse.com/1233197

https://bugzilla.suse.com/1233205

https://bugzilla.suse.com/1233206

https://bugzilla.suse.com/1233209

https://bugzilla.suse.com/1233210

https://bugzilla.suse.com/1233211

https://bugzilla.suse.com/1233212

https://bugzilla.suse.com/1233214

https://bugzilla.suse.com/1233216

https://bugzilla.suse.com/1233238

https://bugzilla.suse.com/1233241

https://bugzilla.suse.com/1233253

https://bugzilla.suse.com/1233255

https://bugzilla.suse.com/1233293

https://bugzilla.suse.com/1233350

https://bugzilla.suse.com/1233452

https://bugzilla.suse.com/1233453

https://bugzilla.suse.com/1233454

https://bugzilla.suse.com/1233456

https://bugzilla.suse.com/1233457

https://bugzilla.suse.com/1233458

https://bugzilla.suse.com/1233460

https://bugzilla.suse.com/1233462

https://bugzilla.suse.com/1233463

https://bugzilla.suse.com/1233468

https://bugzilla.suse.com/1233471

https://bugzilla.suse.com/1233476

https://bugzilla.suse.com/1233478

https://bugzilla.suse.com/1233479

https://bugzilla.suse.com/1233481

https://bugzilla.suse.com/1233484

https://bugzilla.suse.com/1233487

https://bugzilla.suse.com/1233490

https://bugzilla.suse.com/1233491

https://bugzilla.suse.com/1233528

https://bugzilla.suse.com/1233548

https://bugzilla.suse.com/1233552

https://bugzilla.suse.com/1233553

https://bugzilla.suse.com/1233554

https://bugzilla.suse.com/1233555

https://bugzilla.suse.com/1233557

https://bugzilla.suse.com/1233560

https://bugzilla.suse.com/1233561

https://bugzilla.suse.com/1233570

https://bugzilla.suse.com/1233577

https://bugzilla.suse.com/1233580

https://bugzilla.suse.com/1233977

https://bugzilla.suse.com/1234012

https://bugzilla.suse.com/1234025

https://www.suse.com/security/cve/CVE-2022-49016

https://www.suse.com/security/cve/CVE-2022-49017

https://www.suse.com/security/cve/CVE-2022-49019

https://www.suse.com/security/cve/CVE-2022-49020

https://www.suse.com/security/cve/CVE-2022-49021

https://www.suse.com/security/cve/CVE-2022-49022

https://www.suse.com/security/cve/CVE-2022-49023

https://www.suse.com/security/cve/CVE-2022-49024

https://www.suse.com/security/cve/CVE-2022-49025

https://www.suse.com/security/cve/CVE-2022-49026

https://www.suse.com/security/cve/CVE-2022-49027

https://www.suse.com/security/cve/CVE-2022-49028

https://www.suse.com/security/cve/CVE-2022-49029

https://www.suse.com/security/cve/CVE-2022-49031

https://www.suse.com/security/cve/CVE-2022-49032

https://www.suse.com/security/cve/CVE-2023-2166

https://www.suse.com/security/cve/CVE-2023-28327

https://www.suse.com/security/cve/CVE-2023-52766

https://www.suse.com/security/cve/CVE-2023-52800

https://www.suse.com/security/cve/CVE-2023-52881

https://www.suse.com/security/cve/CVE-2023-52915

https://www.suse.com/security/cve/CVE-2023-52917

https://www.suse.com/security/cve/CVE-2023-52918

https://www.suse.com/security/cve/CVE-2023-52919

https://www.suse.com/security/cve/CVE-2023-52921

https://www.suse.com/security/cve/CVE-2023-52922

https://www.suse.com/security/cve/CVE-2023-6270

https://www.suse.com/security/cve/CVE-2024-26782

https://www.suse.com/security/cve/CVE-2024-26906

https://www.suse.com/security/cve/CVE-2024-26953

https://www.suse.com/security/cve/CVE-2024-27043

https://www.suse.com/security/cve/CVE-2024-35888

https://www.suse.com/security/cve/CVE-2024-35937

https://www.suse.com/security/cve/CVE-2024-35980

https://www.suse.com/security/cve/CVE-2024-36244

https://www.suse.com/security/cve/CVE-2024-36484

https://www.suse.com/security/cve/CVE-2024-36883

https://www.suse.com/security/cve/CVE-2024-36886

https://www.suse.com/security/cve/CVE-2024-36905

https://www.suse.com/security/cve/CVE-2024-36953

https://www.suse.com/security/cve/CVE-2024-36954

https://www.suse.com/security/cve/CVE-2024-36957

https://www.suse.com/security/cve/CVE-2024-38577

https://www.suse.com/security/cve/CVE-2024-38589

https://www.suse.com/security/cve/CVE-2024-38615

https://www.suse.com/security/cve/CVE-2024-39476

https://www.suse.com/security/cve/CVE-2024-40965

https://www.suse.com/security/cve/CVE-2024-40997

https://www.suse.com/security/cve/CVE-2024-41016

https://www.suse.com/security/cve/CVE-2024-41023

https://www.suse.com/security/cve/CVE-2024-41049

https://www.suse.com/security/cve/CVE-2024-42131

https://www.suse.com/security/cve/CVE-2024-42145

https://www.suse.com/security/cve/CVE-2024-42226

https://www.suse.com/security/cve/CVE-2024-42253

https://www.suse.com/security/cve/CVE-2024-43817

https://www.suse.com/security/cve/CVE-2024-43897

https://www.suse.com/security/cve/CVE-2024-44931

https://www.suse.com/security/cve/CVE-2024-44932

https://www.suse.com/security/cve/CVE-2024-44947

https://www.suse.com/security/cve/CVE-2024-44958

https://www.suse.com/security/cve/CVE-2024-44964

https://www.suse.com/security/cve/CVE-2024-44995

https://www.suse.com/security/cve/CVE-2024-45016

https://www.suse.com/security/cve/CVE-2024-45025

https://www.suse.com/security/cve/CVE-2024-46678

https://www.suse.com/security/cve/CVE-2024-46681

https://www.suse.com/security/cve/CVE-2024-47709

https://www.suse.com/security/cve/CVE-2024-47710

https://www.suse.com/security/cve/CVE-2024-47712

https://www.suse.com/security/cve/CVE-2024-47713

https://www.suse.com/security/cve/CVE-2024-47718

https://www.suse.com/security/cve/CVE-2024-47720

https://www.suse.com/security/cve/CVE-2024-47723

https://www.suse.com/security/cve/CVE-2024-47727

https://www.suse.com/security/cve/CVE-2024-47728

https://www.suse.com/security/cve/CVE-2024-47730

https://www.suse.com/security/cve/CVE-2024-47735

https://www.suse.com/security/cve/CVE-2024-47737

https://www.suse.com/security/cve/CVE-2024-47738

https://www.suse.com/security/cve/CVE-2024-49909

https://www.suse.com/security/cve/CVE-2024-49911

https://www.suse.com/security/cve/CVE-2024-49912

https://www.suse.com/security/cve/CVE-2024-49913

https://www.suse.com/security/cve/CVE-2024-49914

https://www.suse.com/security/cve/CVE-2024-49917

https://www.suse.com/security/cve/CVE-2024-49918

https://www.suse.com/security/cve/CVE-2024-49919

https://www.suse.com/security/cve/CVE-2024-49920

https://www.suse.com/security/cve/CVE-2024-49921

https://www.suse.com/security/cve/CVE-2024-49922

https://www.suse.com/security/cve/CVE-2024-49923

https://www.suse.com/security/cve/CVE-2024-49924

https://www.suse.com/security/cve/CVE-2024-49925

https://www.suse.com/security/cve/CVE-2024-49929

https://www.suse.com/security/cve/CVE-2024-49930

https://www.suse.com/security/cve/CVE-2024-49933

https://www.suse.com/security/cve/CVE-2024-49934

https://www.suse.com/security/cve/CVE-2024-49935

https://www.suse.com/security/cve/CVE-2024-49936

https://www.suse.com/security/cve/CVE-2024-49938

https://www.suse.com/security/cve/CVE-2024-49939

https://www.suse.com/security/cve/CVE-2024-49945

https://www.suse.com/security/cve/CVE-2024-49946

https://www.suse.com/security/cve/CVE-2024-49947

https://www.suse.com/security/cve/CVE-2024-49949

https://www.suse.com/security/cve/CVE-2024-49950

https://www.suse.com/security/cve/CVE-2024-49954

https://www.suse.com/security/cve/CVE-2024-49955

https://www.suse.com/security/cve/CVE-2024-49957

https://www.suse.com/security/cve/CVE-2024-49958

https://www.suse.com/security/cve/CVE-2024-49959

https://www.suse.com/security/cve/CVE-2024-49960

https://www.suse.com/security/cve/CVE-2024-49962

https://www.suse.com/security/cve/CVE-2024-49963

https://www.suse.com/security/cve/CVE-2024-49965

https://www.suse.com/security/cve/CVE-2024-49966

https://www.suse.com/security/cve/CVE-2024-49967

https://www.suse.com/security/cve/CVE-2024-49968

https://www.suse.com/security/cve/CVE-2024-49969

https://www.suse.com/security/cve/CVE-2024-49973

https://www.suse.com/security/cve/CVE-2024-49974

https://www.suse.com/security/cve/CVE-2024-49975

https://www.suse.com/security/cve/CVE-2024-49981

https://www.suse.com/security/cve/CVE-2024-49982

https://www.suse.com/security/cve/CVE-2024-49983

https://www.suse.com/security/cve/CVE-2024-49985

https://www.suse.com/security/cve/CVE-2024-49989

https://www.suse.com/security/cve/CVE-2024-49991

https://www.suse.com/security/cve/CVE-2024-49993

https://www.suse.com/security/cve/CVE-2024-49995

https://www.suse.com/security/cve/CVE-2024-49996

https://www.suse.com/security/cve/CVE-2024-50000

https://www.suse.com/security/cve/CVE-2024-50001

https://www.suse.com/security/cve/CVE-2024-50002

https://www.suse.com/security/cve/CVE-2024-50003

https://www.suse.com/security/cve/CVE-2024-50006

https://www.suse.com/security/cve/CVE-2024-50007

https://www.suse.com/security/cve/CVE-2024-50008

https://www.suse.com/security/cve/CVE-2024-50196

https://www.suse.com/security/cve/CVE-2024-50198

https://www.suse.com/security/cve/CVE-2024-50201

https://www.suse.com/security/cve/CVE-2024-50205

https://www.suse.com/security/cve/CVE-2024-50208

https://www.suse.com/security/cve/CVE-2024-50209

https://www.suse.com/security/cve/CVE-2024-50215

https://www.suse.com/security/cve/CVE-2024-50218

https://www.suse.com/security/cve/CVE-2024-50229

https://www.suse.com/security/cve/CVE-2024-50230

https://www.suse.com/security/cve/CVE-2024-50264

https://www.suse.com/security/cve/CVE-2024-50265

https://www.suse.com/security/cve/CVE-2024-50267

https://www.suse.com/security/cve/CVE-2024-50268

https://www.suse.com/security/cve/CVE-2024-50269

https://www.suse.com/security/cve/CVE-2024-50271

https://www.suse.com/security/cve/CVE-2024-50273

https://www.suse.com/security/cve/CVE-2024-50274

https://www.suse.com/security/cve/CVE-2024-50279

https://www.suse.com/security/cve/CVE-2024-50282

https://www.suse.com/security/cve/CVE-2024-50287

https://www.suse.com/security/cve/CVE-2024-50289

https://www.suse.com/security/cve/CVE-2024-50290

https://www.suse.com/security/cve/CVE-2024-50292

https://www.suse.com/security/cve/CVE-2024-50295

https://www.suse.com/security/cve/CVE-2024-50298

https://www.suse.com/security/cve/CVE-2024-46716

https://www.suse.com/security/cve/CVE-2024-46719

https://www.suse.com/security/cve/CVE-2024-46754

https://www.suse.com/security/cve/CVE-2024-46770

https://www.suse.com/security/cve/CVE-2024-46775

https://www.suse.com/security/cve/CVE-2024-47739

https://www.suse.com/security/cve/CVE-2024-47742

https://www.suse.com/security/cve/CVE-2024-47745

https://www.suse.com/security/cve/CVE-2024-47747

https://www.suse.com/security/cve/CVE-2024-47748

https://www.suse.com/security/cve/CVE-2024-47749

https://www.suse.com/security/cve/CVE-2024-47756

https://www.suse.com/security/cve/CVE-2024-47757

https://www.suse.com/security/cve/CVE-2024-49850

https://www.suse.com/security/cve/CVE-2024-49851

https://www.suse.com/security/cve/CVE-2024-49852

https://www.suse.com/security/cve/CVE-2024-49855

https://www.suse.com/security/cve/CVE-2024-49858

https://www.suse.com/security/cve/CVE-2024-49860

https://www.suse.com/security/cve/CVE-2024-49861

https://www.suse.com/security/cve/CVE-2024-49863

https://www.suse.com/security/cve/CVE-2024-49866

https://www.suse.com/security/cve/CVE-2024-49867

https://www.suse.com/security/cve/CVE-2024-49868

https://www.suse.com/security/cve/CVE-2024-49870

https://www.suse.com/security/cve/CVE-2024-49871

https://www.suse.com/security/cve/CVE-2024-49875

https://www.suse.com/security/cve/CVE-2024-49877

https://www.suse.com/security/cve/CVE-2024-49879

https://www.suse.com/security/cve/CVE-2024-49881

https://www.suse.com/security/cve/CVE-2024-49882

https://www.suse.com/security/cve/CVE-2024-49883

https://www.suse.com/security/cve/CVE-2024-49884

https://www.suse.com/security/cve/CVE-2024-49886

https://www.suse.com/security/cve/CVE-2024-49890

https://www.suse.com/security/cve/CVE-2024-49891

https://www.suse.com/security/cve/CVE-2024-49892

https://www.suse.com/security/cve/CVE-2024-49894

https://www.suse.com/security/cve/CVE-2024-49895

https://www.suse.com/security/cve/CVE-2024-49896

https://www.suse.com/security/cve/CVE-2024-49897

https://www.suse.com/security/cve/CVE-2024-49899

https://www.suse.com/security/cve/CVE-2024-49900

https://www.suse.com/security/cve/CVE-2024-49901

https://www.suse.com/security/cve/CVE-2024-49902

https://www.suse.com/security/cve/CVE-2024-49903

https://www.suse.com/security/cve/CVE-2024-49905

https://www.suse.com/security/cve/CVE-2024-49906

https://www.suse.com/security/cve/CVE-2024-49907

https://www.suse.com/security/cve/CVE-2024-49908

https://www.suse.com/security/cve/CVE-2024-50009

https://www.suse.com/security/cve/CVE-2024-50013

https://www.suse.com/security/cve/CVE-2024-50014

https://www.suse.com/security/cve/CVE-2024-50017

https://www.suse.com/security/cve/CVE-2024-50019

https://www.suse.com/security/cve/CVE-2024-50024

https://www.suse.com/security/cve/CVE-2024-50025

https://www.suse.com/security/cve/CVE-2024-50026

https://www.suse.com/security/cve/CVE-2024-50028

https://www.suse.com/security/cve/CVE-2024-50031

https://www.suse.com/security/cve/CVE-2024-50033

https://www.suse.com/security/cve/CVE-2024-50035

https://www.suse.com/security/cve/CVE-2024-50041

https://www.suse.com/security/cve/CVE-2024-50044

https://www.suse.com/security/cve/CVE-2024-50045

https://www.suse.com/security/cve/CVE-2024-50046

https://www.suse.com/security/cve/CVE-2024-50047

https://www.suse.com/security/cve/CVE-2024-50048

https://www.suse.com/security/cve/CVE-2024-50049

https://www.suse.com/security/cve/CVE-2024-50055

https://www.suse.com/security/cve/CVE-2024-50058

https://www.suse.com/security/cve/CVE-2024-50059

https://www.suse.com/security/cve/CVE-2024-50061

https://www.suse.com/security/cve/CVE-2024-50062

https://www.suse.com/security/cve/CVE-2024-50063

https://www.suse.com/security/cve/CVE-2024-50067

https://www.suse.com/security/cve/CVE-2024-50073

https://www.suse.com/security/cve/CVE-2024-50074

https://www.suse.com/security/cve/CVE-2024-50077

https://www.suse.com/security/cve/CVE-2024-50078

https://www.suse.com/security/cve/CVE-2024-50081

https://www.suse.com/security/cve/CVE-2024-50082

https://www.suse.com/security/cve/CVE-2024-50089

https://www.suse.com/security/cve/CVE-2024-50093

https://www.suse.com/security/cve/CVE-2024-50095

https://www.suse.com/security/cve/CVE-2024-50096

https://www.suse.com/security/cve/CVE-2024-50098

https://www.suse.com/security/cve/CVE-2024-50099

https://www.suse.com/security/cve/CVE-2024-50103

https://www.suse.com/security/cve/CVE-2024-50108

https://www.suse.com/security/cve/CVE-2024-50110

https://www.suse.com/security/cve/CVE-2024-50115

https://www.suse.com/security/cve/CVE-2024-50116

https://www.suse.com/security/cve/CVE-2024-50117

https://www.suse.com/security/cve/CVE-2024-50124

https://www.suse.com/security/cve/CVE-2024-50125

https://www.suse.com/security/cve/CVE-2024-50127

https://www.suse.com/security/cve/CVE-2024-50128

https://www.suse.com/security/cve/CVE-2024-50131

https://www.suse.com/security/cve/CVE-2024-50134

https://www.suse.com/security/cve/CVE-2024-50135

https://www.suse.com/security/cve/CVE-2024-50138

https://www.suse.com/security/cve/CVE-2024-50141

https://www.suse.com/security/cve/CVE-2024-50146

https://www.suse.com/security/cve/CVE-2024-50147

https://www.suse.com/security/cve/CVE-2024-50148

https://www.suse.com/security/cve/CVE-2024-50150

https://www.suse.com/security/cve/CVE-2024-50153

https://www.suse.com/security/cve/CVE-2024-50154

https://www.suse.com/security/cve/CVE-2024-50155

https://www.suse.com/security/cve/CVE-2024-50156

https://www.suse.com/security/cve/CVE-2024-50160

https://www.suse.com/security/cve/CVE-2024-50167

https://www.suse.com/security/cve/CVE-2024-50171

https://www.suse.com/security/cve/CVE-2024-50179

https://www.suse.com/security/cve/CVE-2024-50180

https://www.suse.com/security/cve/CVE-2024-50182

https://www.suse.com/security/cve/CVE-2024-50183

https://www.suse.com/security/cve/CVE-2024-50184

https://www.suse.com/security/cve/CVE-2024-50186

https://www.suse.com/security/cve/CVE-2024-50187

https://www.suse.com/security/cve/CVE-2024-50188

https://www.suse.com/security/cve/CVE-2024-50189

https://www.suse.com/security/cve/CVE-2024-50192

https://www.suse.com/security/cve/CVE-2024-50194

https://www.suse.com/security/cve/CVE-2024-50195

https://www.suse.com/security/cve/CVE-2024-50232

https://www.suse.com/security/cve/CVE-2024-50233

https://www.suse.com/security/cve/CVE-2024-50234

https://www.suse.com/security/cve/CVE-2024-50236

https://www.suse.com/security/cve/CVE-2024-50237

https://www.suse.com/security/cve/CVE-2024-50249

https://www.suse.com/security/cve/CVE-2024-50255

https://www.suse.com/security/cve/CVE-2024-50259

https://www.suse.com/security/cve/CVE-2024-50261

https://www.suse.com/security/cve/CVE-2024-50301

https://www.suse.com/security/cve/CVE-2024-50302

https://www.suse.com/security/cve/CVE-2024-53052

https://www.suse.com/security/cve/CVE-2024-53058

https://www.suse.com/security/cve/CVE-2024-53059

https://www.suse.com/security/cve/CVE-2024-53060

https://www.suse.com/security/cve/CVE-2024-53061

https://www.suse.com/security/cve/CVE-2024-53063

https://www.suse.com/security/cve/CVE-2024-53066

https://www.suse.com/security/cve/CVE-2024-53068

https://www.suse.com/security/cve/CVE-2024-53079

https://www.suse.com/security/cve/CVE-2024-53085

https://www.suse.com/security/cve/CVE-2024-53088

https://www.suse.com/security/cve/CVE-2024-53104

https://www.suse.com/security/cve/CVE-2024-53110

Plugin Details

Severity: Critical

ID: 213129

File Name: suse_SU-2024-4364-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/18/2024

Updated: 12/18/2024

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.4

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C

CVSS Score Source: CVE-2024-47685

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150500_55_88-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/17/2024

Vulnerability Publication Date: 10/8/2022

Reference Information

CVE: CVE-2021-47416, CVE-2021-47534, CVE-2021-47594, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48674, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948, CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955, CVE-2022-48956, CVE-2022-48957, CVE-2022-48958, CVE-2022-48959, CVE-2022-48960, CVE-2022-48961, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48968, CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48979, CVE-2022-48980, CVE-2022-48981, CVE-2022-48982, CVE-2022-48983, CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48989, CVE-2022-48990, CVE-2022-48991, CVE-2022-48992, CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007, CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015, CVE-2022-49016, CVE-2022-49017, CVE-2022-49019, CVE-2022-49020, CVE-2022-49021, CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032, CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881, CVE-2023-52915, CVE-2023-52917, CVE-2023-52918, CVE-2023-52919, CVE-2023-52921, CVE-2023-52922, CVE-2023-6270, CVE-2024-26782, CVE-2024-26906, CVE-2024-26953, CVE-2024-27043, CVE-2024-35888, CVE-2024-35937, CVE-2024-35980, CVE-2024-36244, CVE-2024-36484, CVE-2024-36883, CVE-2024-36886, CVE-2024-36905, CVE-2024-36953, CVE-2024-36954, CVE-2024-36957, CVE-2024-38577, CVE-2024-38589, CVE-2024-38615, CVE-2024-39476, CVE-2024-40965, CVE-2024-40997, CVE-2024-41016, CVE-2024-41023, CVE-2024-41049, CVE-2024-42131, CVE-2024-42145, CVE-2024-42226, CVE-2024-42253, CVE-2024-43817, CVE-2024-43897, CVE-2024-44931, CVE-2024-44932, CVE-2024-44947, CVE-2024-44958, CVE-2024-44964, CVE-2024-44995, CVE-2024-45016, CVE-2024-45025, CVE-2024-46678, CVE-2024-46681, CVE-2024-46716, CVE-2024-46719, CVE-2024-46754, CVE-2024-46770, CVE-2024-46775, CVE-2024-46777, CVE-2024-46800, CVE-2024-46802, CVE-2024-46804, CVE-2024-46805, CVE-2024-46807, CVE-2024-46809, CVE-2024-46810, CVE-2024-46811, CVE-2024-46812, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46821, CVE-2024-46826, CVE-2024-46828, CVE-2024-46834, CVE-2024-46835, CVE-2024-46840, CVE-2024-46841, CVE-2024-46842, CVE-2024-46848, CVE-2024-46849, CVE-2024-46853, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857, CVE-2024-46859, CVE-2024-46864, CVE-2024-46871, CVE-2024-47660, CVE-2024-47661, CVE-2024-47663, CVE-2024-47664, CVE-2024-47665, CVE-2024-47667, CVE-2024-47668, CVE-2024-47669, CVE-2024-47670, CVE-2024-47671, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47679, CVE-2024-47682, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47718, CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728, CVE-2024-47730, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47742, CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49855, CVE-2024-49858, CVE-2024-49860, CVE-2024-49861, CVE-2024-49863, CVE-2024-49866, CVE-2024-49867, CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49875, CVE-2024-49877, CVE-2024-49879, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49886, CVE-2024-49890, CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896, CVE-2024-49897, CVE-2024-49899, CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49906, CVE-2024-49907, CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913, CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920, CVE-2024-49921, CVE-2024-49922, CVE-2024-49923, CVE-2024-49924, CVE-2024-49925, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935, CVE-2024-49936, CVE-2024-49938, CVE-2024-49939, CVE-2024-49945, CVE-2024-49946, CVE-2024-49947, CVE-2024-49949, CVE-2024-49950, CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49968, CVE-2024-49969, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49981, CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49989, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996, CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50003, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50009, CVE-2024-50013, CVE-2024-50014, CVE-2024-50017, CVE-2024-50019, CVE-2024-50024, CVE-2024-50025, CVE-2024-50026, CVE-2024-50028, CVE-2024-50031, CVE-2024-50033, CVE-2024-50035, CVE-2024-50041, CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50067, CVE-2024-50073, CVE-2024-50074, CVE-2024-50077, CVE-2024-50078, CVE-2024-50081, CVE-2024-50082, CVE-2024-50089, CVE-2024-50093, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098, CVE-2024-50099, CVE-2024-50103, CVE-2024-50108, CVE-2024-50110, CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50134, CVE-2024-50135, CVE-2024-50138, CVE-2024-50141, CVE-2024-50146, CVE-2024-50147, CVE-2024-50148, CVE-2024-50150, CVE-2024-50153, CVE-2024-50154, CVE-2024-50155, CVE-2024-50156, CVE-2024-50160, CVE-2024-50167, CVE-2024-50171, CVE-2024-50179, CVE-2024-50180, CVE-2024-50182, CVE-2024-50183, CVE-2024-50184, CVE-2024-50186, CVE-2024-50187, CVE-2024-50188, CVE-2024-50189, CVE-2024-50192, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196, CVE-2024-50198, CVE-2024-50201, CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50215, CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50249, CVE-2024-50255, CVE-2024-50259, CVE-2024-50261, CVE-2024-50264, CVE-2024-50265, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50271, CVE-2024-50273, CVE-2024-50274, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287, CVE-2024-50289, CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50298, CVE-2024-50301, CVE-2024-50302, CVE-2024-53052, CVE-2024-53058, CVE-2024-53059, CVE-2024-53060, CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53068, CVE-2024-53079, CVE-2024-53085, CVE-2024-53088, CVE-2024-53104, CVE-2024-53110

SuSE: SUSE-SU-2024:4364-1