# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:3566-1  
Release Date: 2024-10-09T09:43:40Z  
Rating: important  
References:

  * bsc#1054914
  * bsc#1065729
  * bsc#1207341
  * bsc#1223777
  * bsc#1225316
  * bsc#1226669
  * bsc#1226846
  * bsc#1226860
  * bsc#1226878
  * bsc#1227487
  * bsc#1227867
  * bsc#1227890
  * bsc#1227917
  * bsc#1227941
  * bsc#1227952
  * bsc#1227953
  * bsc#1228000
  * bsc#1228002
  * bsc#1228068
  * bsc#1228507
  * bsc#1228615
  * bsc#1228620
  * bsc#1228635
  * bsc#1229334
  * bsc#1229362
  * bsc#1229363
  * bsc#1229456
  * bsc#1229457
  * bsc#1229633
  * bsc#1229645
  * bsc#1229739
  * bsc#1229753
  * bsc#1229764
  * bsc#1229768
  * bsc#1229790
  * bsc#1229830
  * bsc#1229912
  * bsc#1230015
  * bsc#1230151
  * bsc#1230171
  * bsc#1230174
  * bsc#1230176
  * bsc#1230178
  * bsc#1230180
  * bsc#1230185
  * bsc#1230200
  * bsc#1230204
  * bsc#1230212
  * bsc#1230233
  * bsc#1230248
  * bsc#1230270
  * bsc#1230398
  * bsc#1230506
  * bsc#1230515
  * bsc#1230517
  * bsc#1230533
  * bsc#1230535
  * bsc#1230549
  * bsc#1230556
  * bsc#1230582
  * bsc#1230589
  * bsc#1230620
  * bsc#1230699
  * bsc#1230700
  * bsc#1230702
  * bsc#1230707
  * bsc#1230709
  * bsc#1230710
  * bsc#1230712
  * bsc#1230719
  * bsc#1230724
  * bsc#1230730
  * bsc#1230731
  * bsc#1230732
  * bsc#1230747
  * bsc#1230748
  * bsc#1230751
  * bsc#1230752
  * bsc#1230756
  * bsc#1230761
  * bsc#1230763
  * bsc#1230767
  * bsc#1230771
  * bsc#1230772
  * bsc#1230776
  * bsc#1230783
  * bsc#1230791
  * bsc#1230796
  * bsc#1230810
  * bsc#1230814
  * bsc#1230815
  * bsc#1230826
  * bsc#1231083
  * bsc#1231084
  * bsc#1231089
  * bsc#1231120
  * bsc#1231146
  * bsc#1231184

  
Cross-References:

  * CVE-2021-4442
  * CVE-2021-47387
  * CVE-2021-47408
  * CVE-2021-47620
  * CVE-2021-47622
  * CVE-2022-48788
  * CVE-2022-48789
  * CVE-2022-48790
  * CVE-2022-48791
  * CVE-2022-48799
  * CVE-2022-48844
  * CVE-2022-48911
  * CVE-2022-48943
  * CVE-2022-48945
  * CVE-2023-52766
  * CVE-2023-52915
  * CVE-2024-27024
  * CVE-2024-38381
  * CVE-2024-38596
  * CVE-2024-38632
  * CVE-2024-40973
  * CVE-2024-41000
  * CVE-2024-41073
  * CVE-2024-41079
  * CVE-2024-41082
  * CVE-2024-42154
  * CVE-2024-42265
  * CVE-2024-42305
  * CVE-2024-42306
  * CVE-2024-43884
  * CVE-2024-43890
  * CVE-2024-43898
  * CVE-2024-43904
  * CVE-2024-43912
  * CVE-2024-43914
  * CVE-2024-44946
  * CVE-2024-44947
  * CVE-2024-44948
  * CVE-2024-44950
  * CVE-2024-44952
  * CVE-2024-44954
  * CVE-2024-44969
  * CVE-2024-44972
  * CVE-2024-44982
  * CVE-2024-44987
  * CVE-2024-44998
  * CVE-2024-44999
  * CVE-2024-45008
  * CVE-2024-46673
  * CVE-2024-46675
  * CVE-2024-46676
  * CVE-2024-46677
  * CVE-2024-46679
  * CVE-2024-46685
  * CVE-2024-46686
  * CVE-2024-46702
  * CVE-2024-46707
  * CVE-2024-46714
  * CVE-2024-46715
  * CVE-2024-46717
  * CVE-2024-46720
  * CVE-2024-46721
  * CVE-2024-46722
  * CVE-2024-46723
  * CVE-2024-46727
  * CVE-2024-46731
  * CVE-2024-46737
  * CVE-2024-46738
  * CVE-2024-46739
  * CVE-2024-46743
  * CVE-2024-46744
  * CVE-2024-46745
  * CVE-2024-46746
  * CVE-2024-46747
  * CVE-2024-46750
  * CVE-2024-46753
  * CVE-2024-46759
  * CVE-2024-46761
  * CVE-2024-46770
  * CVE-2024-46772
  * CVE-2024-46773
  * CVE-2024-46774
  * CVE-2024-46778
  * CVE-2024-46783
  * CVE-2024-46784
  * CVE-2024-46787
  * CVE-2024-46822
  * CVE-2024-46853
  * CVE-2024-46854
  * CVE-2024-46859

  
CVSS scores:

  * CVE-2021-4442 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-4442 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47387 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47408 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47620 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-47620 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2021-47622 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47622 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48788 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48788 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48789 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48789 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48790 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48790 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48791 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48791 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48799 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48844 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48844 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48911 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48911 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48943 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48943 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52915 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27024 ( SUSE ):  4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-38381 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-38381 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-38596 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-38632 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38632 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40973 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-40973 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40973 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41000 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41073 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41079 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42154 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42154 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-42265 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-42305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42306 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43884 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43884 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43890 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-43890 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-43890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43898 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43898 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43904 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43904 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43912 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-43912 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-43912 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43914 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-43914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-43914 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44946 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44946 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44947 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2024-44947 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44947 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44952 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44952 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44954 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44969 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44972 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44972 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44987 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-44987 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44998 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-44999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-44999 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-45008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46673 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46673 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46675 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
  * CVE-2024-46675 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-46675 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46676 ( SUSE ):  2.4
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
  * CVE-2024-46676 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-46676 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46677 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2024-46677 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46677 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46679 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
  * CVE-2024-46679 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46679 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46685 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46685 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46686 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46686 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46702 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
  * CVE-2024-46702 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46702 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46707 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46707 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46707 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46714 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46714 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46715 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46717 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46720 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46720 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46721 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46721 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46722 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46722 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46723 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46723 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46727 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46731 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46731 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46737 ( SUSE ):  7.0
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2024-46737 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46737 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46738 ( SUSE ):  8.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
  * CVE-2024-46738 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46738 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46739 ( SUSE ):  8.2
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2024-46739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46739 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46743 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-46743 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46743 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46744 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-46744 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46744 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46745 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46746 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-46746 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46746 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46747 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-46747 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46747 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46750 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46750 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46750 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46753 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46759 ( SUSE ):  1.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-46759 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-46759 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46761 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46761 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46761 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46770 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46772 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46772 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46773 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46773 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46778 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46783 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46784 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46784 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46787 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46822 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46822 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46853 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46854 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-46854 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-46859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46859 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Real Time 12 SP5
  * SUSE Linux Enterprise Server 12 SP5

  
  
An update that solves 90 vulnerabilities and has eight security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

  * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
  * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
    (bsc#1230763).
  * CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635).
  * CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615).
  * CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds
    accesses (bsc#1231089).
  * CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug
    (bsc#1231083).
  * CVE-2022-48945: media: vivid: fix compose size exceed boundary
    (bsc#1230398).
  * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
    (bsc#1228620 CVE-2024-41082).
  * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing
    CPU entry (bsc#1231120).
  * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
  * CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning
    (bsc#1230709).
  * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used
    (bsc#1230772).
  * CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning
    (bsc#1230712).
  * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
  * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.
    (bsc#1229633).
  * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly
    (bsc#1230796).
  * CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
    (bsc#1230761).
  * CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit
    attributes (bsc#1230814).
  * CVE-2024-46745: Input: uinput - reject requests with unreasonable number of
    slots (bsc#1230748).
  * CVE-2024-46738: VMCI: Fix use-after-free when removing resource in
    vmci_resource_remove() (bsc#1230731).
  * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg()
    (bsc#1230810).
  * CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails
    (bsc#1230204).
  * CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning
    (bsc#1230702).
  * CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock()
    (bsc#1230783).
  * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
  * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP
    (bsc#1227890).
  * CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747).
  * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in
    interrupt map walk (bsc#1230756).
  * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback
    access (bsc#1230700).
  * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in
    pcs_get_function() (bsc#1230515)
  * CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer
    address access (bsc#1230533).
  * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is
    removed (bsc#1230589)
  * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in
    smb2_new_read_req() (bsc#1230517).
  * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure
    (bsc#1230506).
  * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
  * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
  * CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535).
  * CVE-2024-46679: ethtool: check device is present when getting link settings
    (bsc#1230556).
  * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after
    reassembling (bsc#1229790).
  * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
    (bsc#1230015).
  * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a
    vGICv3 (bsc#1230582).
  * CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch()
    (bsc#1227953).
  * CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport
    error_recovery work (bsc#1228000).
  * CVE-2022-48790: nvme: fix a possible use-after-free in controller reset
    during load (bsc#1227941).
  * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867).
  * CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them
    (bsc#1230174).
  * CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport
    error_recovery work (bsc#1227952).
  * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
  * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
  * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
  * CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug
    (bsc#1229645).
  * CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270).
  * CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068).
  * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths
    (bsc#1229830)
  * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002)
  * CVE-2024-43898: ext4: sanity check for NULL pointer after
    ext4_force_shutdown (bsc#1229753).
  * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer
    (bsc#1229362).
  * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir
    indexed (bsc#1229363).
  * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from
    mispredictions (bsc#1229334).
  * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special
    register set (bsc#1230180).
  * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down
    (bsc#1223777).
  * CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176).
  * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx()
    (bsc#1230171).
  * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race
    (bsc#1230178).
  * CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees
    the memory (bsc#1225316).
  * CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200).
  * CVE-2024-43904: Add null checks for 'stream' and 'plane' before
    dereferencing (bsc#1229768)
  * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
  * CVE-2024-38596: af_unix: Fix data races in
    unix_release_sock/unix_stream_sendmsg (bsc#1226846).
  * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).

The following non-security bugs were fixed:

  * ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes).
  * ACPI / EC: Clean up EC GPE mask flag (git-fixes).
  * ACPI: EC: Fix an EC event IRQ storming issue (git-fixes).
  * ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes).
  * ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes).
  * ACPI: SPCR: work around clock issue on xgene UART (git-fixes).
  * ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git-
    fixes).
  * ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35
    (git-fixes).
  * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846).
  * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846).
  * af_unix: Fix data-races around sk->sk_shutdown (git-fixes).
  * autofs4: use wait_event_killable (bsc#1207341).
  * ceph: remove the incorrect Fw reference check when dirtying pages
    (bsc#1231184).
  * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
  * Fix bsc#1054914 reference.
  * fuse: use unsigned type for getxattr/listxattr size truncation
    (bsc#1230151).
  * kabi fix for proc/mounts: add cursor (bsc#1207341).
  * kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848)
    These are lowlevel functions not used outside of exception handling and
    kernel debugging facilities.
  * kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
  * media: vivid: avoid integer overflow (git-fixes).
  * media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes).
  * media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes).
  * media: vivid: s_fbuf: add more sanity checks (git-fixes).
  * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-
    fixes).
  * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
    fixes).
  * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-
    fixes).
  * nvmet: Identify-Active Namespace ID List command should reject invalid nsid
    (git-fixes).
  * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
  * ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
  * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
  * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
  * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
  * powerpc/32: Move the inline keyword at the beginning of function declaration
    (bsc#1230826 ltc#205848).
  * powerpc/64: Fix update forms of loads and stores to write 64-bit EA
    (bsc#1230826 ltc#205848).
  * powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848).
  * powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826
    ltc#205848).
  * powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr()
    (bsc#1230826 ltc#205848).
  * powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions
    (bsc#1230826 ltc#205848).
  * powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live
    (bsc#1230826 ltc#205848).
  * powerpc: Emulate load/store floating double pair instructions (bsc#1230826
    ltc#205848).
  * powerpc: Emulate load/store floating point as integer word instructions
    (bsc#1230826 ltc#205848).
  * powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848).
  * powerpc: Emulate vector element load/store instructions (bsc#1230826
    ltc#205848).
  * powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848).
  * powerpc: Fix handling of alignment interrupt on dcbz instruction
    (bsc#1230826 ltc#205848).
  * powerpc: Fix kernel crash in emulation of vector loads and stores
    (bsc#1230826 ltc#205848).
  * powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848).
  * powerpc: Handle most loads and stores in instruction emulation code
    (bsc#1230826 ltc#205848).
  * powerpc: Handle opposite-endian processes in emulation code (bsc#1230826
    ltc#205848).
  * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-
    fixes).
  * powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729).
  * powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729).
  * powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826
    ltc#205848).
  * powerpc/lib: Fix "integer constant is too large" build failure (bsc#1230826
    ltc#205848).
  * powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826
    ltc#205848).
  * powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826
    ltc#205848).
  * powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826
    ltc#205848).
  * powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826
    ltc#205848).
  * powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32
    (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32
    (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848).
  * powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848).
  * powerpc: Make load/store emulation use larger memory accesses (bsc#1230826
    ltc#205848).
  * powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848).
  * powerpc/pseries: fix possible memory leak in ibmebus_bus_init()
    (bsc#1065729).
  * powerpc: Remove support for PowerPC 601 (Remove unused and malformed
    assembly causing build error).
  * powerpc: Separate out load/store emulation into its own function
    (bsc#1230826 ltc#205848).
  * powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826
    ltc#205848).
  * powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826
    ltc#205848).
  * powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848).
  * powerpc/sstep: Add support for divde[.] and divdeu[.] instructions
    (bsc#1230826 ltc#205848).
  * powerpc sstep: Add support for extswsli instruction (bsc#1230826
    ltc#205848).
  * powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions
    (bsc#1230826 ltc#205848).
  * powerpc sstep: Add support for modsd, modud instructions (bsc#1230826
    ltc#205848).
  * powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826
    ltc#205848).
  * powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848).
  * powerpc/sstep: Check instruction validity against ISA version before
    emulation (bsc#1230826 ltc#205848).
  * powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848).
  * powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826
    ltc#205848).
  * powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848).
  * powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848).
  * powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826
    ltc#205848).
  * powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848).
  * powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826
    ltc#205848).
  * powerpc: Use instruction emulation infrastructure to handle alignment faults
    (bsc#1230826 ltc#205848).
  * powerpc: Wrap register number correctly for string load/store instructions
    (bsc#1230826 ltc#205848).
  * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
  * proc/mounts: add cursor (bsc#1207341).
  * profiling: fix shift too large makes kernel panic (git-fixes).
  * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
  * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
  * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-
    fixes)
  * Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" (git-fixes).
  * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
  * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-
    fixes).
  * usbnet: fix cyclical race on disconnect with work queue (git-fixes).
  * usbnet: modern method to get random MAC (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Real Time 12 SP5  
    zypper in -t patch SUSE-SLE-RT-12-SP5-2024-3566=1

## Package List:

  * SUSE Linux Enterprise Real Time 12 SP5 (x86_64)
    * ocfs2-kmp-rt-4.12.14-10.203.1
    * kernel-rt_debug-devel-4.12.14-10.203.1
    * cluster-md-kmp-rt-debuginfo-4.12.14-10.203.1
    * kernel-rt-debugsource-4.12.14-10.203.1
    * kernel-rt_debug-devel-debuginfo-4.12.14-10.203.1
    * kernel-rt_debug-debuginfo-4.12.14-10.203.1
    * kernel-syms-rt-4.12.14-10.203.1
    * cluster-md-kmp-rt-4.12.14-10.203.1
    * kernel-rt_debug-debugsource-4.12.14-10.203.1
    * kernel-rt-devel-4.12.14-10.203.1
    * dlm-kmp-rt-4.12.14-10.203.1
    * gfs2-kmp-rt-debuginfo-4.12.14-10.203.1
    * gfs2-kmp-rt-4.12.14-10.203.1
    * kernel-rt-devel-debuginfo-4.12.14-10.203.1
    * kernel-rt-base-4.12.14-10.203.1
    * kernel-rt-debuginfo-4.12.14-10.203.1
    * kernel-rt-base-debuginfo-4.12.14-10.203.1
    * dlm-kmp-rt-debuginfo-4.12.14-10.203.1
    * ocfs2-kmp-rt-debuginfo-4.12.14-10.203.1
  * SUSE Linux Enterprise Real Time 12 SP5 (noarch)
    * kernel-source-rt-4.12.14-10.203.1
    * kernel-devel-rt-4.12.14-10.203.1
  * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64)
    * kernel-rt_debug-4.12.14-10.203.1
    * kernel-rt-4.12.14-10.203.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-4442.html
  * https://www.suse.com/security/cve/CVE-2021-47387.html
  * https://www.suse.com/security/cve/CVE-2021-47408.html
  * https://www.suse.com/security/cve/CVE-2021-47620.html
  * https://www.suse.com/security/cve/CVE-2021-47622.html
  * https://www.suse.com/security/cve/CVE-2022-48788.html
  * https://www.suse.com/security/cve/CVE-2022-48789.html
  * https://www.suse.com/security/cve/CVE-2022-48790.html
  * https://www.suse.com/security/cve/CVE-2022-48791.html
  * https://www.suse.com/security/cve/CVE-2022-48799.html
  * https://www.suse.com/security/cve/CVE-2022-48844.html
  * https://www.suse.com/security/cve/CVE-2022-48911.html
  * https://www.suse.com/security/cve/CVE-2022-48943.html
  * https://www.suse.com/security/cve/CVE-2022-48945.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52915.html
  * https://www.suse.com/security/cve/CVE-2024-27024.html
  * https://www.suse.com/security/cve/CVE-2024-38381.html
  * https://www.suse.com/security/cve/CVE-2024-38596.html
  * https://www.suse.com/security/cve/CVE-2024-38632.html
  * https://www.suse.com/security/cve/CVE-2024-40973.html
  * https://www.suse.com/security/cve/CVE-2024-41000.html
  * https://www.suse.com/security/cve/CVE-2024-41073.html
  * https://www.suse.com/security/cve/CVE-2024-41079.html
  * https://www.suse.com/security/cve/CVE-2024-41082.html
  * https://www.suse.com/security/cve/CVE-2024-42154.html
  * https://www.suse.com/security/cve/CVE-2024-42265.html
  * https://www.suse.com/security/cve/CVE-2024-42305.html
  * https://www.suse.com/security/cve/CVE-2024-42306.html
  * https://www.suse.com/security/cve/CVE-2024-43884.html
  * https://www.suse.com/security/cve/CVE-2024-43890.html
  * https://www.suse.com/security/cve/CVE-2024-43898.html
  * https://www.suse.com/security/cve/CVE-2024-43904.html
  * https://www.suse.com/security/cve/CVE-2024-43912.html
  * https://www.suse.com/security/cve/CVE-2024-43914.html
  * https://www.suse.com/security/cve/CVE-2024-44946.html
  * https://www.suse.com/security/cve/CVE-2024-44947.html
  * https://www.suse.com/security/cve/CVE-2024-44948.html
  * https://www.suse.com/security/cve/CVE-2024-44950.html
  * https://www.suse.com/security/cve/CVE-2024-44952.html
  * https://www.suse.com/security/cve/CVE-2024-44954.html
  * https://www.suse.com/security/cve/CVE-2024-44969.html
  * https://www.suse.com/security/cve/CVE-2024-44972.html
  * https://www.suse.com/security/cve/CVE-2024-44982.html
  * https://www.suse.com/security/cve/CVE-2024-44987.html
  * https://www.suse.com/security/cve/CVE-2024-44998.html
  * https://www.suse.com/security/cve/CVE-2024-44999.html
  * https://www.suse.com/security/cve/CVE-2024-45008.html
  * https://www.suse.com/security/cve/CVE-2024-46673.html
  * https://www.suse.com/security/cve/CVE-2024-46675.html
  * https://www.suse.com/security/cve/CVE-2024-46676.html
  * https://www.suse.com/security/cve/CVE-2024-46677.html
  * https://www.suse.com/security/cve/CVE-2024-46679.html
  * https://www.suse.com/security/cve/CVE-2024-46685.html
  * https://www.suse.com/security/cve/CVE-2024-46686.html
  * https://www.suse.com/security/cve/CVE-2024-46702.html
  * https://www.suse.com/security/cve/CVE-2024-46707.html
  * https://www.suse.com/security/cve/CVE-2024-46714.html
  * https://www.suse.com/security/cve/CVE-2024-46715.html
  * https://www.suse.com/security/cve/CVE-2024-46717.html
  * https://www.suse.com/security/cve/CVE-2024-46720.html
  * https://www.suse.com/security/cve/CVE-2024-46721.html
  * https://www.suse.com/security/cve/CVE-2024-46722.html
  * https://www.suse.com/security/cve/CVE-2024-46723.html
  * https://www.suse.com/security/cve/CVE-2024-46727.html
  * https://www.suse.com/security/cve/CVE-2024-46731.html
  * https://www.suse.com/security/cve/CVE-2024-46737.html
  * https://www.suse.com/security/cve/CVE-2024-46738.html
  * https://www.suse.com/security/cve/CVE-2024-46739.html
  * https://www.suse.com/security/cve/CVE-2024-46743.html
  * https://www.suse.com/security/cve/CVE-2024-46744.html
  * https://www.suse.com/security/cve/CVE-2024-46745.html
  * https://www.suse.com/security/cve/CVE-2024-46746.html
  * https://www.suse.com/security/cve/CVE-2024-46747.html
  * https://www.suse.com/security/cve/CVE-2024-46750.html
  * https://www.suse.com/security/cve/CVE-2024-46753.html
  * https://www.suse.com/security/cve/CVE-2024-46759.html
  * https://www.suse.com/security/cve/CVE-2024-46761.html
  * https://www.suse.com/security/cve/CVE-2024-46770.html
  * https://www.suse.com/security/cve/CVE-2024-46772.html
  * https://www.suse.com/security/cve/CVE-2024-46773.html
  * https://www.suse.com/security/cve/CVE-2024-46774.html
  * https://www.suse.com/security/cve/CVE-2024-46778.html
  * https://www.suse.com/security/cve/CVE-2024-46783.html
  * https://www.suse.com/security/cve/CVE-2024-46784.html
  * https://www.suse.com/security/cve/CVE-2024-46787.html
  * https://www.suse.com/security/cve/CVE-2024-46822.html
  * https://www.suse.com/security/cve/CVE-2024-46853.html
  * https://www.suse.com/security/cve/CVE-2024-46854.html
  * https://www.suse.com/security/cve/CVE-2024-46859.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1054914
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1207341
  * https://bugzilla.suse.com/show_bug.cgi?id=1223777
  * https://bugzilla.suse.com/show_bug.cgi?id=1225316
  * https://bugzilla.suse.com/show_bug.cgi?id=1226669
  * https://bugzilla.suse.com/show_bug.cgi?id=1226846
  * https://bugzilla.suse.com/show_bug.cgi?id=1226860
  * https://bugzilla.suse.com/show_bug.cgi?id=1226878
  * https://bugzilla.suse.com/show_bug.cgi?id=1227487
  * https://bugzilla.suse.com/show_bug.cgi?id=1227867
  * https://bugzilla.suse.com/show_bug.cgi?id=1227890
  * https://bugzilla.suse.com/show_bug.cgi?id=1227917
  * https://bugzilla.suse.com/show_bug.cgi?id=1227941
  * https://bugzilla.suse.com/show_bug.cgi?id=1227952
  * https://bugzilla.suse.com/show_bug.cgi?id=1227953
  * https://bugzilla.suse.com/show_bug.cgi?id=1228000
  * https://bugzilla.suse.com/show_bug.cgi?id=1228002
  * https://bugzilla.suse.com/show_bug.cgi?id=1228068
  * https://bugzilla.suse.com/show_bug.cgi?id=1228507
  * https://bugzilla.suse.com/show_bug.cgi?id=1228615
  * https://bugzilla.suse.com/show_bug.cgi?id=1228620
  * https://bugzilla.suse.com/show_bug.cgi?id=1228635
  * https://bugzilla.suse.com/show_bug.cgi?id=1229334
  * https://bugzilla.suse.com/show_bug.cgi?id=1229362
  * https://bugzilla.suse.com/show_bug.cgi?id=1229363
  * https://bugzilla.suse.com/show_bug.cgi?id=1229456
  * https://bugzilla.suse.com/show_bug.cgi?id=1229457
  * https://bugzilla.suse.com/show_bug.cgi?id=1229633
  * https://bugzilla.suse.com/show_bug.cgi?id=1229645
  * https://bugzilla.suse.com/show_bug.cgi?id=1229739
  * https://bugzilla.suse.com/show_bug.cgi?id=1229753
  * https://bugzilla.suse.com/show_bug.cgi?id=1229764
  * https://bugzilla.suse.com/show_bug.cgi?id=1229768
  * https://bugzilla.suse.com/show_bug.cgi?id=1229790
  * https://bugzilla.suse.com/show_bug.cgi?id=1229830
  * https://bugzilla.suse.com/show_bug.cgi?id=1229912
  * https://bugzilla.suse.com/show_bug.cgi?id=1230015
  * https://bugzilla.suse.com/show_bug.cgi?id=1230151
  * https://bugzilla.suse.com/show_bug.cgi?id=1230171
  * https://bugzilla.suse.com/show_bug.cgi?id=1230174
  * https://bugzilla.suse.com/show_bug.cgi?id=1230176
  * https://bugzilla.suse.com/show_bug.cgi?id=1230178
  * https://bugzilla.suse.com/show_bug.cgi?id=1230180
  * https://bugzilla.suse.com/show_bug.cgi?id=1230185
  * https://bugzilla.suse.com/show_bug.cgi?id=1230200
  * https://bugzilla.suse.com/show_bug.cgi?id=1230204
  * https://bugzilla.suse.com/show_bug.cgi?id=1230212
  * https://bugzilla.suse.com/show_bug.cgi?id=1230233
  * https://bugzilla.suse.com/show_bug.cgi?id=1230248
  * https://bugzilla.suse.com/show_bug.cgi?id=1230270
  * https://bugzilla.suse.com/show_bug.cgi?id=1230398
  * https://bugzilla.suse.com/show_bug.cgi?id=1230506
  * https://bugzilla.suse.com/show_bug.cgi?id=1230515
  * https://bugzilla.suse.com/show_bug.cgi?id=1230517
  * https://bugzilla.suse.com/show_bug.cgi?id=1230533
  * https://bugzilla.suse.com/show_bug.cgi?id=1230535
  * https://bugzilla.suse.com/show_bug.cgi?id=1230549
  * https://bugzilla.suse.com/show_bug.cgi?id=1230556
  * https://bugzilla.suse.com/show_bug.cgi?id=1230582
  * https://bugzilla.suse.com/show_bug.cgi?id=1230589
  * https://bugzilla.suse.com/show_bug.cgi?id=1230620
  * https://bugzilla.suse.com/show_bug.cgi?id=1230699
  * https://bugzilla.suse.com/show_bug.cgi?id=1230700
  * https://bugzilla.suse.com/show_bug.cgi?id=1230702
  * https://bugzilla.suse.com/show_bug.cgi?id=1230707
  * https://bugzilla.suse.com/show_bug.cgi?id=1230709
  * https://bugzilla.suse.com/show_bug.cgi?id=1230710
  * https://bugzilla.suse.com/show_bug.cgi?id=1230712
  * https://bugzilla.suse.com/show_bug.cgi?id=1230719
  * https://bugzilla.suse.com/show_bug.cgi?id=1230724
  * https://bugzilla.suse.com/show_bug.cgi?id=1230730
  * https://bugzilla.suse.com/show_bug.cgi?id=1230731
  * https://bugzilla.suse.com/show_bug.cgi?id=1230732
  * https://bugzilla.suse.com/show_bug.cgi?id=1230747
  * https://bugzilla.suse.com/show_bug.cgi?id=1230748
  * https://bugzilla.suse.com/show_bug.cgi?id=1230751
  * https://bugzilla.suse.com/show_bug.cgi?id=1230752
  * https://bugzilla.suse.com/show_bug.cgi?id=1230756
  * https://bugzilla.suse.com/show_bug.cgi?id=1230761
  * https://bugzilla.suse.com/show_bug.cgi?id=1230763
  * https://bugzilla.suse.com/show_bug.cgi?id=1230767
  * https://bugzilla.suse.com/show_bug.cgi?id=1230771
  * https://bugzilla.suse.com/show_bug.cgi?id=1230772
  * https://bugzilla.suse.com/show_bug.cgi?id=1230776
  * https://bugzilla.suse.com/show_bug.cgi?id=1230783
  * https://bugzilla.suse.com/show_bug.cgi?id=1230791
  * https://bugzilla.suse.com/show_bug.cgi?id=1230796
  * https://bugzilla.suse.com/show_bug.cgi?id=1230810
  * https://bugzilla.suse.com/show_bug.cgi?id=1230814
  * https://bugzilla.suse.com/show_bug.cgi?id=1230815
  * https://bugzilla.suse.com/show_bug.cgi?id=1230826
  * https://bugzilla.suse.com/show_bug.cgi?id=1231083
  * https://bugzilla.suse.com/show_bug.cgi?id=1231084
  * https://bugzilla.suse.com/show_bug.cgi?id=1231089
  * https://bugzilla.suse.com/show_bug.cgi?id=1231120
  * https://bugzilla.suse.com/show_bug.cgi?id=1231146
  * https://bugzilla.suse.com/show_bug.cgi?id=1231184

SUSE: 2024:3566-1 important: the Linux Kernel Security Advisory Updates

October 9, 2024
* bsc#1054914 * bsc#1065729 * bsc#1207341 * bsc#1223777 * bsc#1225316

Summary

## The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084). * CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763). * CVE-2024-41073: nvme: avoid double free special payload (bsc#1228635). * CVE-2024-41079: nvmet: always initialize cqe.result (bsc#1228615). * CVE-2024-46859: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (bsc#1231089). * CVE-2024-46853: spi: nxp-fspi: fix the KASAN report out-of-bounds bug (bsc#1231083). * CVE-2022-48945: media: vivid: fix compose size exceed boundary (bsc#1230398). * CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620 CVE-2024-41082). * CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120). * CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764). * CVE-2024-46731: drm/amd/pm: fix the Out-of-bounds read warning (bsc#1230709). * CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772). * CVE-2024-46722: drm/amdgpu: fix mc_data out-of-bounds read warning (bsc#1230712). * CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815). * CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633). * CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796). * CVE-2024-46761: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (bsc#1230761). * CVE-2024-46759: hwmon: (adc128d818) Fix underflows seen when writing limit attributes (bsc#1230814). * CVE-2024-46745: Input: uinput - reject requests with unreasonable number of slots (bsc#1230748). * CVE-2024-46738: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (bsc#1230731). * CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810). * CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (bsc#1230204). * CVE-2024-46723: drm/amdgpu: fix ucode out-of-bounds read warning (bsc#1230702). * CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783). * CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719). * CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890). * CVE-2024-46744: Squashfs: sanity check symbolic link size (bsc#1230747). * CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756). * CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access (bsc#1230700). * CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515) * CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer address access (bsc#1230533). * CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589) * CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517). * CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506). * CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710) * CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549). * CVE-2024-46676: nfc: pn533: Add poll mod list filling check (bsc#1230535). * CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556). * CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790). * CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015). * CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (bsc#1230582). * CVE-2022-48799: perf: Fix list corruption in perf_cgroup_switch() (bsc#1227953). * CVE-2022-48789: nvme-tcp: fix possible use-after-free in transport error_recovery work (bsc#1228000). * CVE-2022-48790: nvme: fix a possible use-after-free in controller reset during load (bsc#1227941). * CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867). * CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them (bsc#1230174). * CVE-2022-48788: nvme-rdma: fix possible use-after-free in transport error_recovery work (bsc#1227952). * CVE-2024-45008: Input: MT - limit max slots (bsc#1230248). * CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185). * CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233). * CVE-2022-48943: KVM: x86/mmu: make apf token non-zero to fix bug (bsc#1229645). * CVE-2023-52915: media: dvb-usb-v2: af9035: fix missing unlock (bsc#1230270). * CVE-2022-48844: Bluetooth: hci_core: Fix leaking sent_cmd skb (bsc#1228068). * CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830) * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) * CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753). * CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362). * CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363). * CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334). * CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180). * CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777). * CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176). * CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171). * CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race (bsc#1230178). * CVE-2021-47387: cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory (bsc#1225316). * CVE-2024-44969: s390/sclp: Prevent release of buffer in I/O (bsc#1230200). * CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768) * CVE-2024-43884: Add error handling to pair_device() (bsc#1229739) * CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846). * CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507). The following non-security bugs were fixed: * ACPI: EC: Avoid printing confusing messages in acpi_ec_setup() (git-fixes). * ACPI / EC: Clean up EC GPE mask flag (git-fixes). * ACPI: EC: Fix an EC event IRQ storming issue (git-fixes). * ACPI: EC: tweak naming in preparation for GpioInt support (git-fixes). * ACPI: SPCR: Consider baud rate 0 as preconfigured state (git-fixes). * ACPI: SPCR: work around clock issue on xgene UART (git-fixes). * ACPI: SPCR: Workaround for APM X-Gene 8250 UART 32-alignment errata (git- fixes). * ACPI: video: Add new hw_changes_brightness quirk, set it on PB Easynote MZ35 (git-fixes). * af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846). * af_unix: Fix data races around sk->sk_shutdown (bsc#1226846). * af_unix: Fix data-races around sk->sk_shutdown (git-fixes). * autofs4: use wait_event_killable (bsc#1207341). * ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231184). * Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes). * Fix bsc#1054914 reference. * fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230151). * kabi fix for proc/mounts: add cursor (bsc#1207341). * kabi/severities: Ignore ppc instruction emulation (bsc#1230826 ltc#205848) These are lowlevel functions not used outside of exception handling and kernel debugging facilities. * kthread: Fix task state in kthread worker if being frozen (bsc#1231146). * media: vivid: avoid integer overflow (git-fixes). * media: vivid: dev->bitmap_cap wasn't freed in all cases (git-fixes). * media: vivid: fix assignment of dev->fbuf_out_flags (git-fixes). * media: vivid: s_fbuf: add more sanity checks (git-fixes). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git- fixes). * net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git- fixes). * net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git- fixes). * nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes). * nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes). * ocfs2: fix null-ptr-deref when journal load failed (git-fixes). * ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes). * ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes). * PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes). * powerpc/32: Move the inline keyword at the beginning of function declaration (bsc#1230826 ltc#205848). * powerpc/64: Fix update forms of loads and stores to write 64-bit EA (bsc#1230826 ltc#205848). * powerpc: Add emulation for the addpcis instruction (bsc#1230826 ltc#205848). * powerpc: Change analyse_instr so it does not modify *regs (bsc#1230826 ltc#205848). * powerpc: Do not check MSR FP/VMX/VSX enable bits in analyse_instr() (bsc#1230826 ltc#205848). * powerpc: Do not update CR0 in emulation of popcnt, prty, bpermd instructions (bsc#1230826 ltc#205848). * powerpc: Emulate FP/vector/VSX loads/stores correctly when regs not live (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating double pair instructions (bsc#1230826 ltc#205848). * powerpc: Emulate load/store floating point as integer word instructions (bsc#1230826 ltc#205848). * powerpc: Emulate the dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Emulate vector element load/store instructions (bsc#1230826 ltc#205848). * powerpc: Fix emulation of the isel instruction (bsc#1230826 ltc#205848). * powerpc: Fix handling of alignment interrupt on dcbz instruction (bsc#1230826 ltc#205848). * powerpc: Fix kernel crash in emulation of vector loads and stores (bsc#1230826 ltc#205848). * powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1230826 ltc#205848). * powerpc: Handle most loads and stores in instruction emulation code (bsc#1230826 ltc#205848). * powerpc: Handle opposite-endian processes in emulation code (bsc#1230826 ltc#205848). * powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git- fixes). * powerpc/imc-pmu: Revert nest_init_lock to being a mutex (bsc#1065729). * powerpc/iommu: Annotate nested lock for lockdep (bsc#1065729). * powerpc/kprobes: Update optprobes to use emulate_update_regs() (bsc#1230826 ltc#205848). * powerpc/lib: Fix "integer constant is too large" build failure (bsc#1230826 ltc#205848). * powerpc/lib: fix redundant inclusion of quad.o (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add bpermd instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add cmpb instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add isel instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add popcnt instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add prty instruction emulation (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Add XER bits introduced in POWER ISA v3.0 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix count leading zeros instructions (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point arithmetic instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix fixed-point shift instructions that set CA32 (bsc#1230826 ltc#205848). * powerpc/lib/sstep: fix 'ptesync' build error (bsc#1230826 ltc#205848). * powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1230826 ltc#205848). * powerpc: Make load/store emulation use larger memory accesses (bsc#1230826 ltc#205848). * powerpc/ppc-opcode: Add divde and divdeu opcodes (bsc#1230826 ltc#205848). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1065729). * powerpc: Remove support for PowerPC 601 (Remove unused and malformed assembly causing build error). * powerpc: Separate out load/store emulation into its own function (bsc#1230826 ltc#205848). * powerpc: Set regs->dar if memory access fails in emulate_step() (bsc#1230826 ltc#205848). * powerpc sstep: Add support for cnttzw, cnttzd instructions (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for darn instruction (bsc#1230826 ltc#205848). * powerpc/sstep: Add support for divde[.] and divdeu[.] instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for extswsli instruction (bsc#1230826 ltc#205848). * powerpc: sstep: Add support for maddhd, maddhdu, maddld instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsd, modud instructions (bsc#1230826 ltc#205848). * powerpc sstep: Add support for modsw, moduw instructions (bsc#1230826 ltc#205848). * powerpc/sstep: Avoid used uninitialized error (bsc#1230826 ltc#205848). * powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix darn emulation (bsc#1230826 ltc#205848). * powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with mcrf (bsc#1230826 ltc#205848). * powerpc/sstep: Fix issues with set_cr0() (bsc#1230826 ltc#205848). * powerpc/sstep: Fix kernel crash if VSX is not present (bsc#1230826 ltc#205848). * powerpc/sstep: Introduce GETTYPE macro (bsc#1230826 ltc#205848). * powerpc/sstep: mullw should calculate a 64 bit signed result (bsc#1230826 ltc#205848). * powerpc: Use instruction emulation infrastructure to handle alignment faults (bsc#1230826 ltc#205848). * powerpc: Wrap register number correctly for string load/store instructions (bsc#1230826 ltc#205848). * powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729). * proc/mounts: add cursor (bsc#1207341). * profiling: fix shift too large makes kernel panic (git-fixes). * RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes) * RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes) * RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git- fixes) * Revert "ACPI / EC: Remove old CLEAR_ON_RESUME quirk" (git-fixes). * tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes). * uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git- fixes). * usbnet: fix cyclical race on disconnect with work queue (git-fixes). * usbnet: modern method to get random MAC (git-fixes).

References

* bsc#1054914

* bsc#1065729

* bsc#1207341

* bsc#1223777

* bsc#1225316

* bsc#1226669

* bsc#1226846

* bsc#1226860

* bsc#1226878

* bsc#1227487

* bsc#1227867

* bsc#1227890

* bsc#1227917

* bsc#1227941

* bsc#1227952

* bsc#1227953

* bsc#1228000

* bsc#1228002

* bsc#1228068

* bsc#1228507

* bsc#1228615

* bsc#1228620

* bsc#1228635

* bsc#1229334

* bsc#1229362

* bsc#1229363

* bsc#1229456

* bsc#1229457

* bsc#1229633

* bsc#1229645

* bsc#1229739

* bsc#1229753

* bsc#1229764

* bsc#1229768

* bsc#1229790

* bsc#1229830

* bsc#1229912

* bsc#1230015

* bsc#1230151

* bsc#1230171

* bsc#1230174

* bsc#1230176

* bsc#1230178

* bsc#1230180

* bsc#1230185

* bsc#1230200

* bsc#1230204

* bsc#1230212

* bsc#1230233

* bsc#1230248

* bsc#1230270

* bsc#1230398

* bsc#1230506

* bsc#1230515

* bsc#1230517

* bsc#1230533

* bsc#1230535

* bsc#1230549

* bsc#1230556

* bsc#1230582

* bsc#1230589

* bsc#1230620

* bsc#1230699

* bsc#1230700

* bsc#1230702

* bsc#1230707

* bsc#1230709

* bsc#1230710

* bsc#1230712

* bsc#1230719

* bsc#1230724

* bsc#1230730

* bsc#1230731

* bsc#1230732

* bsc#1230747

* bsc#1230748

* bsc#1230751

* bsc#1230752

* bsc#1230756

* bsc#1230761

* bsc#1230763

* bsc#1230767

* bsc#1230771

* bsc#1230772

* bsc#1230776

* bsc#1230783

* bsc#1230791

* bsc#1230796

* bsc#1230810

* bsc#1230814

* bsc#1230815

* bsc#1230826

* bsc#1231083

* bsc#1231084

* bsc#1231089

* bsc#1231120

* bsc#1231146

* bsc#1231184

Cross-

* CVE-2021-4442

* CVE-2021-47387

* CVE-2021-47408

* CVE-2021-47620

* CVE-2021-47622

* CVE-2022-48788

* CVE-2022-48789

* CVE-2022-48790

* CVE-2022-48791

* CVE-2022-48799

* CVE-2022-48844

* CVE-2022-48911

* CVE-2022-48943

* CVE-2022-48945

* CVE-2023-52766

* CVE-2023-52915

* CVE-2024-27024

* CVE-2024-38381

* CVE-2024-38596

* CVE-2024-38632

* CVE-2024-40973

* CVE-2024-41000

* CVE-2024-41073

* CVE-2024-41079

* CVE-2024-41082

* CVE-2024-42154

* CVE-2024-42265

* CVE-2024-42305

* CVE-2024-42306

* CVE-2024-43884

* CVE-2024-43890

* CVE-2024-43898

* CVE-2024-43904

* CVE-2024-43912

* CVE-2024-43914

* CVE-2024-44946

* CVE-2024-44947

* CVE-2024-44948

* CVE-2024-44950

* CVE-2024-44952

* CVE-2024-44954

* CVE-2024-44969

* CVE-2024-44972

* CVE-2024-44982

* CVE-2024-44987

* CVE-2024-44998

* CVE-2024-44999

* CVE-2024-45008

* CVE-2024-46673

* CVE-2024-46675

* CVE-2024-46676

* CVE-2024-46677

* CVE-2024-46679

* CVE-2024-46685

* CVE-2024-46686

* CVE-2024-46702

* CVE-2024-46707

* CVE-2024-46714

* CVE-2024-46715

* CVE-2024-46717

* CVE-2024-46720

* CVE-2024-46721

* CVE-2024-46722

* CVE-2024-46723

* CVE-2024-46727

* CVE-2024-46731

* CVE-2024-46737

* CVE-2024-46738

* CVE-2024-46739

* CVE-2024-46743

* CVE-2024-46744

* CVE-2024-46745

* CVE-2024-46746

* CVE-2024-46747

* CVE-2024-46750

* CVE-2024-46753

* CVE-2024-46759

* CVE-2024-46761

* CVE-2024-46770

* CVE-2024-46772

* CVE-2024-46773

* CVE-2024-46774

* CVE-2024-46778

* CVE-2024-46783

* CVE-2024-46784

* CVE-2024-46787

* CVE-2024-46822

* CVE-2024-46853

* CVE-2024-46854

* CVE-2024-46859

CVSS scores:

* CVE-2021-4442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-4442 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

* CVE-2021-47620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-38381 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-38381 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

* CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40973 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

* CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43884 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43890 ( SUSE ): 4.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

* CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43904 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43912 ( SUSE ): 4.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

* CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43914 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44947 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46675 ( SUSE ): 5.8

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L

* CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46676 ( SUSE ): 2.4

CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

* CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

* CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46677 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

* CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46679 ( SUSE ): 5.6

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

* CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46702 ( SUSE ): 5.6

CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

* CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46707 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-46727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-46737 ( SUSE ): 7.0

CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

* CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46738 ( SUSE ): 8.7

CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

* CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46739 ( SUSE ): 8.2

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H

* CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46743 ( SUSE ): 5.6

CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-46744 ( SUSE ): 5.9

CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46746 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46747 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

* CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-46750 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46753 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46759 ( SUSE ): 1.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

* CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

* CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46761 ( SUSE ): 5.9

CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46773 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46783 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46787 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-46854 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-46854 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* SUSE Linux Enterprise High Performance Computing 12 SP5

* SUSE Linux Enterprise Real Time 12 SP5

* SUSE Linux Enterprise Server 12 SP5

An update that solves 90 vulnerabilities and has eight security fixes can now be

installed.

##

* https://www.suse.com/security/cve/CVE-2021-4442.html

* https://www.suse.com/security/cve/CVE-2021-47387.html

* https://www.suse.com/security/cve/CVE-2021-47408.html

* https://www.suse.com/security/cve/CVE-2021-47620.html

* https://www.suse.com/security/cve/CVE-2021-47622.html

* https://www.suse.com/security/cve/CVE-2022-48788.html

* https://www.suse.com/security/cve/CVE-2022-48789.html

* https://www.suse.com/security/cve/CVE-2022-48790.html

* https://www.suse.com/security/cve/CVE-2022-48791.html

* https://www.suse.com/security/cve/CVE-2022-48799.html

* https://www.suse.com/security/cve/CVE-2022-48844.html

* https://www.suse.com/security/cve/CVE-2022-48911.html

* https://www.suse.com/security/cve/CVE-2022-48943.html

* https://www.suse.com/security/cve/CVE-2022-48945.html

* https://www.suse.com/security/cve/CVE-2023-52766.html

* https://www.suse.com/security/cve/CVE-2023-52915.html

* https://www.suse.com/security/cve/CVE-2024-27024.html

* https://www.suse.com/security/cve/CVE-2024-38381.html

* https://www.suse.com/security/cve/CVE-2024-38596.html

* https://www.suse.com/security/cve/CVE-2024-38632.html

* https://www.suse.com/security/cve/CVE-2024-40973.html

* https://www.suse.com/security/cve/CVE-2024-41000.html

* https://www.suse.com/security/cve/CVE-2024-41073.html

* https://www.suse.com/security/cve/CVE-2024-41079.html

* https://www.suse.com/security/cve/CVE-2024-41082.html

* https://www.suse.com/security/cve/CVE-2024-42154.html

* https://www.suse.com/security/cve/CVE-2024-42265.html

* https://www.suse.com/security/cve/CVE-2024-42305.html

* https://www.suse.com/security/cve/CVE-2024-42306.html

* https://www.suse.com/security/cve/CVE-2024-43884.html

* https://www.suse.com/security/cve/CVE-2024-43890.html

* https://www.suse.com/security/cve/CVE-2024-43898.html

* https://www.suse.com/security/cve/CVE-2024-43904.html

* https://www.suse.com/security/cve/CVE-2024-43912.html

* https://www.suse.com/security/cve/CVE-2024-43914.html

* https://www.suse.com/security/cve/CVE-2024-44946.html

* https://www.suse.com/security/cve/CVE-2024-44947.html

* https://www.suse.com/security/cve/CVE-2024-44948.html

* https://www.suse.com/security/cve/CVE-2024-44950.html

* https://www.suse.com/security/cve/CVE-2024-44952.html

* https://www.suse.com/security/cve/CVE-2024-44954.html

* https://www.suse.com/security/cve/CVE-2024-44969.html

* https://www.suse.com/security/cve/CVE-2024-44972.html

* https://www.suse.com/security/cve/CVE-2024-44982.html

* https://www.suse.com/security/cve/CVE-2024-44987.html

* https://www.suse.com/security/cve/CVE-2024-44998.html

* https://www.suse.com/security/cve/CVE-2024-44999.html

* https://www.suse.com/security/cve/CVE-2024-45008.html

* https://www.suse.com/security/cve/CVE-2024-46673.html

* https://www.suse.com/security/cve/CVE-2024-46675.html

* https://www.suse.com/security/cve/CVE-2024-46676.html

* https://www.suse.com/security/cve/CVE-2024-46677.html

* https://www.suse.com/security/cve/CVE-2024-46679.html

* https://www.suse.com/security/cve/CVE-2024-46685.html

* https://www.suse.com/security/cve/CVE-2024-46686.html

* https://www.suse.com/security/cve/CVE-2024-46702.html

* https://www.suse.com/security/cve/CVE-2024-46707.html

* https://www.suse.com/security/cve/CVE-2024-46714.html

* https://www.suse.com/security/cve/CVE-2024-46715.html

* https://www.suse.com/security/cve/CVE-2024-46717.html

* https://www.suse.com/security/cve/CVE-2024-46720.html

* https://www.suse.com/security/cve/CVE-2024-46721.html

* https://www.suse.com/security/cve/CVE-2024-46722.html

* https://www.suse.com/security/cve/CVE-2024-46723.html

* https://www.suse.com/security/cve/CVE-2024-46727.html

* https://www.suse.com/security/cve/CVE-2024-46731.html

* https://www.suse.com/security/cve/CVE-2024-46737.html

* https://www.suse.com/security/cve/CVE-2024-46738.html

* https://www.suse.com/security/cve/CVE-2024-46739.html

* https://www.suse.com/security/cve/CVE-2024-46743.html

* https://www.suse.com/security/cve/CVE-2024-46744.html

* https://www.suse.com/security/cve/CVE-2024-46745.html

* https://www.suse.com/security/cve/CVE-2024-46746.html

* https://www.suse.com/security/cve/CVE-2024-46747.html

* https://www.suse.com/security/cve/CVE-2024-46750.html

* https://www.suse.com/security/cve/CVE-2024-46753.html

* https://www.suse.com/security/cve/CVE-2024-46759.html

* https://www.suse.com/security/cve/CVE-2024-46761.html

* https://www.suse.com/security/cve/CVE-2024-46770.html

* https://www.suse.com/security/cve/CVE-2024-46772.html

* https://www.suse.com/security/cve/CVE-2024-46773.html

* https://www.suse.com/security/cve/CVE-2024-46774.html

* https://www.suse.com/security/cve/CVE-2024-46778.html

* https://www.suse.com/security/cve/CVE-2024-46783.html

* https://www.suse.com/security/cve/CVE-2024-46784.html

* https://www.suse.com/security/cve/CVE-2024-46787.html

* https://www.suse.com/security/cve/CVE-2024-46822.html

* https://www.suse.com/security/cve/CVE-2024-46853.html

* https://www.suse.com/security/cve/CVE-2024-46854.html

* https://www.suse.com/security/cve/CVE-2024-46859.html

* https://bugzilla.suse.com/show_bug.cgi?id=1054914

* https://bugzilla.suse.com/show_bug.cgi?id=1065729

* https://bugzilla.suse.com/show_bug.cgi?id=1207341

* https://bugzilla.suse.com/show_bug.cgi?id=1223777

* https://bugzilla.suse.com/show_bug.cgi?id=1225316

* https://bugzilla.suse.com/show_bug.cgi?id=1226669

* https://bugzilla.suse.com/show_bug.cgi?id=1226846

* https://bugzilla.suse.com/show_bug.cgi?id=1226860

* https://bugzilla.suse.com/show_bug.cgi?id=1226878

* https://bugzilla.suse.com/show_bug.cgi?id=1227487

* https://bugzilla.suse.com/show_bug.cgi?id=1227867

* https://bugzilla.suse.com/show_bug.cgi?id=1227890

* https://bugzilla.suse.com/show_bug.cgi?id=1227917

* https://bugzilla.suse.com/show_bug.cgi?id=1227941

* https://bugzilla.suse.com/show_bug.cgi?id=1227952

* https://bugzilla.suse.com/show_bug.cgi?id=1227953

* https://bugzilla.suse.com/show_bug.cgi?id=1228000

* https://bugzilla.suse.com/show_bug.cgi?id=1228002

* https://bugzilla.suse.com/show_bug.cgi?id=1228068

* https://bugzilla.suse.com/show_bug.cgi?id=1228507

* https://bugzilla.suse.com/show_bug.cgi?id=1228615

* https://bugzilla.suse.com/show_bug.cgi?id=1228620

* https://bugzilla.suse.com/show_bug.cgi?id=1228635

* https://bugzilla.suse.com/show_bug.cgi?id=1229334

* https://bugzilla.suse.com/show_bug.cgi?id=1229362

* https://bugzilla.suse.com/show_bug.cgi?id=1229363

* https://bugzilla.suse.com/show_bug.cgi?id=1229456

* https://bugzilla.suse.com/show_bug.cgi?id=1229457

* https://bugzilla.suse.com/show_bug.cgi?id=1229633

* https://bugzilla.suse.com/show_bug.cgi?id=1229645

* https://bugzilla.suse.com/show_bug.cgi?id=1229739

* https://bugzilla.suse.com/show_bug.cgi?id=1229753

* https://bugzilla.suse.com/show_bug.cgi?id=1229764

* https://bugzilla.suse.com/show_bug.cgi?id=1229768

* https://bugzilla.suse.com/show_bug.cgi?id=1229790

* https://bugzilla.suse.com/show_bug.cgi?id=1229830

* https://bugzilla.suse.com/show_bug.cgi?id=1229912

* https://bugzilla.suse.com/show_bug.cgi?id=1230015

* https://bugzilla.suse.com/show_bug.cgi?id=1230151

* https://bugzilla.suse.com/show_bug.cgi?id=1230171

* https://bugzilla.suse.com/show_bug.cgi?id=1230174

* https://bugzilla.suse.com/show_bug.cgi?id=1230176

* https://bugzilla.suse.com/show_bug.cgi?id=1230178

* https://bugzilla.suse.com/show_bug.cgi?id=1230180

* https://bugzilla.suse.com/show_bug.cgi?id=1230185

* https://bugzilla.suse.com/show_bug.cgi?id=1230200

* https://bugzilla.suse.com/show_bug.cgi?id=1230204

* https://bugzilla.suse.com/show_bug.cgi?id=1230212

* https://bugzilla.suse.com/show_bug.cgi?id=1230233

* https://bugzilla.suse.com/show_bug.cgi?id=1230248

* https://bugzilla.suse.com/show_bug.cgi?id=1230270

* https://bugzilla.suse.com/show_bug.cgi?id=1230398

* https://bugzilla.suse.com/show_bug.cgi?id=1230506

* https://bugzilla.suse.com/show_bug.cgi?id=1230515

* https://bugzilla.suse.com/show_bug.cgi?id=1230517

* https://bugzilla.suse.com/show_bug.cgi?id=1230533

* https://bugzilla.suse.com/show_bug.cgi?id=1230535

* https://bugzilla.suse.com/show_bug.cgi?id=1230549

* https://bugzilla.suse.com/show_bug.cgi?id=1230556

* https://bugzilla.suse.com/show_bug.cgi?id=1230582

* https://bugzilla.suse.com/show_bug.cgi?id=1230589

* https://bugzilla.suse.com/show_bug.cgi?id=1230620

* https://bugzilla.suse.com/show_bug.cgi?id=1230699

* https://bugzilla.suse.com/show_bug.cgi?id=1230700

* https://bugzilla.suse.com/show_bug.cgi?id=1230702

* https://bugzilla.suse.com/show_bug.cgi?id=1230707

* https://bugzilla.suse.com/show_bug.cgi?id=1230709

* https://bugzilla.suse.com/show_bug.cgi?id=1230710

* https://bugzilla.suse.com/show_bug.cgi?id=1230712

* https://bugzilla.suse.com/show_bug.cgi?id=1230719

* https://bugzilla.suse.com/show_bug.cgi?id=1230724

* https://bugzilla.suse.com/show_bug.cgi?id=1230730

* https://bugzilla.suse.com/show_bug.cgi?id=1230731

* https://bugzilla.suse.com/show_bug.cgi?id=1230732

* https://bugzilla.suse.com/show_bug.cgi?id=1230747

* https://bugzilla.suse.com/show_bug.cgi?id=1230748

* https://bugzilla.suse.com/show_bug.cgi?id=1230751

* https://bugzilla.suse.com/show_bug.cgi?id=1230752

* https://bugzilla.suse.com/show_bug.cgi?id=1230756

* https://bugzilla.suse.com/show_bug.cgi?id=1230761

* https://bugzilla.suse.com/show_bug.cgi?id=1230763

* https://bugzilla.suse.com/show_bug.cgi?id=1230767

* https://bugzilla.suse.com/show_bug.cgi?id=1230771

* https://bugzilla.suse.com/show_bug.cgi?id=1230772

* https://bugzilla.suse.com/show_bug.cgi?id=1230776

* https://bugzilla.suse.com/show_bug.cgi?id=1230783

* https://bugzilla.suse.com/show_bug.cgi?id=1230791

* https://bugzilla.suse.com/show_bug.cgi?id=1230796

* https://bugzilla.suse.com/show_bug.cgi?id=1230810

* https://bugzilla.suse.com/show_bug.cgi?id=1230814

* https://bugzilla.suse.com/show_bug.cgi?id=1230815

* https://bugzilla.suse.com/show_bug.cgi?id=1230826

* https://bugzilla.suse.com/show_bug.cgi?id=1231083

* https://bugzilla.suse.com/show_bug.cgi?id=1231084

* https://bugzilla.suse.com/show_bug.cgi?id=1231089

* https://bugzilla.suse.com/show_bug.cgi?id=1231120

* https://bugzilla.suse.com/show_bug.cgi?id=1231146

* https://bugzilla.suse.com/show_bug.cgi?id=1231184

Severity
Announcement ID: SUSE-SU-2024:3566-1
Release Date: 2024-10-09T09:43:40Z
Rating: important

Related News