# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2940-1  
Rating: important  
References:

  * bsc#1065729
  * bsc#1088701
  * bsc#1149446
  * bsc#1179610
  * bsc#1186463
  * bsc#1196018
  * bsc#1202346
  * bsc#1216834
  * bsc#1220138
  * bsc#1220942
  * bsc#1221045
  * bsc#1221614
  * bsc#1221616
  * bsc#1221618
  * bsc#1222060
  * bsc#1222317
  * bsc#1222326
  * bsc#1222372
  * bsc#1222625
  * bsc#1222776
  * bsc#1222824
  * bsc#1222829
  * bsc#1222866
  * bsc#1223012
  * bsc#1223778
  * bsc#1223813
  * bsc#1223815
  * bsc#1224500
  * bsc#1224512
  * bsc#1224545
  * bsc#1224557
  * bsc#1224571
  * bsc#1224576
  * bsc#1224587
  * bsc#1224637
  * bsc#1224641
  * bsc#1224663
  * bsc#1224683
  * bsc#1224699
  * bsc#1224700
  * bsc#1224975
  * bsc#1225003
  * bsc#1225214
  * bsc#1225224
  * bsc#1225229
  * bsc#1225238
  * bsc#1225241
  * bsc#1225326
  * bsc#1225328
  * bsc#1225346
  * bsc#1225361
  * bsc#1225396
  * bsc#1225427
  * bsc#1225455
  * bsc#1225711
  * bsc#1225719
  * bsc#1225767
  * bsc#1225820
  * bsc#1225838
  * bsc#1225898
  * bsc#1226550
  * bsc#1226553
  * bsc#1226555
  * bsc#1226559
  * bsc#1226568
  * bsc#1226571
  * bsc#1226645
  * bsc#1226783
  * bsc#1226786
  * bsc#1226834
  * bsc#1226908
  * bsc#1227191
  * bsc#1227213
  * bsc#1227573
  * bsc#1227618
  * bsc#1227626
  * bsc#1227716
  * bsc#1227725
  * bsc#1227729
  * bsc#1227730
  * bsc#1227733
  * bsc#1227750
  * bsc#1227754
  * bsc#1227762
  * bsc#1227770
  * bsc#1227771
  * bsc#1227772
  * bsc#1227774
  * bsc#1227786
  * bsc#1227790
  * bsc#1227806
  * bsc#1227824
  * bsc#1227828
  * bsc#1227830
  * bsc#1227836
  * bsc#1227849
  * bsc#1227865
  * bsc#1227866
  * bsc#1227884
  * bsc#1227886
  * bsc#1227891
  * bsc#1227913
  * bsc#1227924
  * bsc#1227928
  * bsc#1227929
  * bsc#1227936
  * bsc#1227957
  * bsc#1227968
  * bsc#1227969
  * bsc#1227975
  * bsc#1227985
  * bsc#1227989
  * bsc#1228003
  * bsc#1228005
  * bsc#1228008
  * bsc#1228013
  * bsc#1228025
  * bsc#1228030
  * bsc#1228037
  * bsc#1228045
  * bsc#1228054
  * bsc#1228055
  * bsc#1228063
  * bsc#1228071
  * bsc#1228235
  * bsc#1228237
  * bsc#1228327
  * bsc#1228328
  * bsc#1228408
  * bsc#1228409
  * bsc#1228410
  * bsc#1228470
  * bsc#1228530
  * bsc#1228561
  * bsc#1228565
  * bsc#1228567
  * bsc#1228580
  * bsc#1228581
  * bsc#1228584
  * bsc#1228588
  * bsc#1228599
  * bsc#1228617
  * bsc#1228625
  * bsc#1228626
  * bsc#1228633
  * bsc#1228640
  * bsc#1228655
  * bsc#1228658
  * bsc#1228662
  * bsc#1228680
  * bsc#1228705
  * bsc#1228723
  * bsc#1228726
  * bsc#1228743
  * bsc#1228850

  
Cross-References:

  * CVE-2020-26558
  * CVE-2021-0129
  * CVE-2021-47191
  * CVE-2021-47194
  * CVE-2021-47197
  * CVE-2021-47219
  * CVE-2021-47295
  * CVE-2021-47388
  * CVE-2021-47395
  * CVE-2021-47399
  * CVE-2021-47403
  * CVE-2021-47405
  * CVE-2021-47438
  * CVE-2021-47441
  * CVE-2021-47468
  * CVE-2021-47501
  * CVE-2021-47516
  * CVE-2021-47542
  * CVE-2021-47559
  * CVE-2021-47580
  * CVE-2021-47582
  * CVE-2021-47588
  * CVE-2021-47597
  * CVE-2021-47599
  * CVE-2021-47606
  * CVE-2021-47619
  * CVE-2022-20368
  * CVE-2022-28748
  * CVE-2022-2964
  * CVE-2022-48775
  * CVE-2022-48792
  * CVE-2022-48794
  * CVE-2022-48804
  * CVE-2022-48805
  * CVE-2022-48810
  * CVE-2022-48811
  * CVE-2022-48823
  * CVE-2022-48826
  * CVE-2022-48827
  * CVE-2022-48828
  * CVE-2022-48829
  * CVE-2022-48836
  * CVE-2022-48839
  * CVE-2022-48850
  * CVE-2022-48855
  * CVE-2022-48857
  * CVE-2022-48860
  * CVE-2022-48863
  * CVE-2023-52435
  * CVE-2023-52594
  * CVE-2023-52612
  * CVE-2023-52615
  * CVE-2023-52619
  * CVE-2023-52623
  * CVE-2023-52669
  * CVE-2023-52743
  * CVE-2023-52885
  * CVE-2024-26615
  * CVE-2024-26659
  * CVE-2024-26663
  * CVE-2024-26735
  * CVE-2024-26830
  * CVE-2024-26920
  * CVE-2024-26924
  * CVE-2024-27019
  * CVE-2024-27020
  * CVE-2024-27025
  * CVE-2024-27437
  * CVE-2024-35806
  * CVE-2024-35819
  * CVE-2024-35837
  * CVE-2024-35887
  * CVE-2024-35893
  * CVE-2024-35934
  * CVE-2024-35949
  * CVE-2024-35966
  * CVE-2024-35967
  * CVE-2024-35978
  * CVE-2024-35995
  * CVE-2024-36004
  * CVE-2024-36288
  * CVE-2024-36592
  * CVE-2024-36901
  * CVE-2024-36902
  * CVE-2024-36919
  * CVE-2024-36924
  * CVE-2024-36939
  * CVE-2024-36952
  * CVE-2024-38558
  * CVE-2024-38560
  * CVE-2024-38630
  * CVE-2024-39487
  * CVE-2024-39488
  * CVE-2024-39490
  * CVE-2024-39494
  * CVE-2024-39499
  * CVE-2024-39501
  * CVE-2024-39506
  * CVE-2024-39507
  * CVE-2024-39509
  * CVE-2024-40901
  * CVE-2024-40904
  * CVE-2024-40912
  * CVE-2024-40923
  * CVE-2024-40929
  * CVE-2024-40932
  * CVE-2024-40937
  * CVE-2024-40941
  * CVE-2024-40942
  * CVE-2024-40943
  * CVE-2024-40953
  * CVE-2024-40959
  * CVE-2024-40966
  * CVE-2024-40967
  * CVE-2024-40978
  * CVE-2024-40982
  * CVE-2024-40987
  * CVE-2024-40988
  * CVE-2024-40990
  * CVE-2024-40995
  * CVE-2024-40998
  * CVE-2024-40999
  * CVE-2024-41014
  * CVE-2024-41015
  * CVE-2024-41016
  * CVE-2024-41044
  * CVE-2024-41048
  * CVE-2024-41059
  * CVE-2024-41060
  * CVE-2024-41063
  * CVE-2024-41064
  * CVE-2024-41066
  * CVE-2024-41070
  * CVE-2024-41071
  * CVE-2024-41072
  * CVE-2024-41078
  * CVE-2024-41081
  * CVE-2024-41089
  * CVE-2024-41090
  * CVE-2024-41091
  * CVE-2024-41095
  * CVE-2024-42070
  * CVE-2024-42093
  * CVE-2024-42096
  * CVE-2024-42119
  * CVE-2024-42120
  * CVE-2024-42124
  * CVE-2024-42145
  * CVE-2024-42223
  * CVE-2024-42224

  
CVSS scores:

  * CVE-2020-26558 ( SUSE ):  4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2020-26558 ( NVD ):  4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2021-0129 ( SUSE ):  6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
  * CVE-2021-0129 ( NVD ):  5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47191 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47194 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47197 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47219 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47388 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47395 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47399 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47403 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47405 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47438 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47441 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47468 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47501 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47516 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47516 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47542 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47542 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47559 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47559 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47580 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
  * CVE-2021-47582 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47588 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47597 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-47599 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47606 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47619 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-20368 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-20368 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-28748 ( SUSE ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-2964 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-2964 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48775 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48792 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48792 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48794 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48804 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48805 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48823 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48836 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48839 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48839 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48850 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48850 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48855 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48857 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48860 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48863 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48863 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52435 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52435 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52594 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52612 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52615 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52619 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52623 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52669 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52743 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52885 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26615 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26659 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26663 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26920 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27019 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-27020 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27020 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27025 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27437 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35837 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35893 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35934 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-35949 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35966 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35967 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35978 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35995 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-36004 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36288 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36288 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36901 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36902 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36902 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36919 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36924 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36939 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36952 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38558 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-38560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38630 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39487 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-39488 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39490 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-39494 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39494 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39499 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-39501 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39506 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39507 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-39509 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40901 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2024-40904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40912 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40923 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40929 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40932 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2024-40937 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40941 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40942 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40943 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40959 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40966 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40967 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40978 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40987 ( SUSE ):  5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
  * CVE-2024-40988 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40995 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-40999 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2024-41014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41015 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-41016 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-41044 ( SUSE ):  6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-41048 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41059 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41059 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41060 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41063 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41063 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41064 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41064 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41066 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41066 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-41070 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41071 ( SUSE ):  4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-41072 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-41078 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-41081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41089 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41089 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41090 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-41091 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-41095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42070 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-42070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42093 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2024-42096 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42096 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-42119 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42120 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42124 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42145 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42145 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42223 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42223 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42224 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42224 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Availability Extension 12 SP5
  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5
  * SUSE Linux Enterprise Software Development Kit 12 SP5
  * SUSE Linux Enterprise Workstation Extension 12 12-SP5

  
  
An update that solves 150 vulnerabilities and has five security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
    (bsc#1227716).
  * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
  * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in
    lio_vf_rep_copy_packet (bsc#1227729).
  * CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).
  * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
    (bsc#1228743).
  * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible
    (bsc#1228705).
  * CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow
    (bsc#1228726)
  * CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown
    engine_id (bsc#1228584)
  * CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank
    (bsc#1228588)
  * CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in
    nv17_tv_get_ld_modes (bsc#1228662)
  * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list
    (bsc#1228723).
  * CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
    (bsc#1228626).
  * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
  * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in
    tcf_idr_check_alloc() (bsc#1227830).
  * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets
    (bsc#1228530).
  * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
  * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
    (bsc#1228680).
  * CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in
    (bsc#1228658)
  * CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it
    (bsc#1228567)
  * CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file
    sizes (bsc#1228055).
  * CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).
  * CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX
    (bsc#1228037).
  * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable
    failure (bsc#1228655).
  * CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds
    array indexing (bsc#1228625).
  * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes
    (bsc#1228599).
  * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
    (bsc#1224700).
  * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
  * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute
    (bsc#1227929).
  * CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP
    sas_task (bsc#1228013).
  * CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during
    TMF (bsc#1228045).
  * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in
    __ext4_fill_super() (bsc#1227866).
  * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
  * CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235)
  * CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error
    (bsc#1227975)
  * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ
    (bsc#1222625).
  * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry()
    (bsc#1228409).
  * CVE-2024-41016: ocfs2: strict bound check before memcmp in
    ocfs2_xattr_find_entry() (bsc#1228410).
  * CVE-2024-41063: bluetooth: hci_core: cancel all works upon
    hci_unregister_dev() (bsc#1228580).
  * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store
    to data registers (bsc#1228470).
  * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in
    kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
  * CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop
    (bsc#1225238).
  * CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957)
  * CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes()
    (bsc#1227828)
  * CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).
  * CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).
  * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data
    (bsc#1228408).
  * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
  * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
  * CVE-2024-40999: net: ena: Add validation for completion descriptors
    consistency (bsc#1227913).
  * CVE-2024-35837: net: mvpp2: clear BM pool before initialization
    (bsc#1224500).
  * CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net()
    (bsc#1226568).
  * CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate
    (bsc#1227968).
  * CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter
    empty (bsc#1227891).
  * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc
    (bsc#1227886).
  * CVE-2022-48850: net-sysfs: add check for netdevice being present to
    speed_show (bsc#1228071).
  * CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in
    do_proc_control() (bsc#1226559).
  * CVE-2024-40982: ssb: fix potential NULL pointer dereference in
    ssb_device_uevent() (bsc#1227865).
  * CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid
    context (bsc#1225346).
  * CVE-2021-47395: mac80211: limit injected vht mcs/nss in
    ieee80211_parse_tx_radiotap (bsc#1225326).
  * CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table()
    on failure path (bsc#1227936).
  * CVE-2023-52594: Fixed potential array-index-out-of-bounds read in
    ath9k_htc_txstatus() (bsc#1221045).
  * CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
  * CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB
    (bsc#1226550).
  * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref
    (bsc#1222372).
  * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated
    (bsc#1226786).
  * CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open()
    (bsc#1227928).
  * CVE-2021-0129: Improper access control in BlueZ may have allowed an
    authenticated user to potentially enable information disclosure via adjacent
    access (bsc#1186463).
  * CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing
    that could permit a nearby man-in-the-middle attacker to identify the
    Passkey used during pairing (bsc#1179610).
  * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
    (bsc#1227836).
  * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario
    (bsc#1227730).
  * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure
    (bsc#1227786).
  * CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation
    (bsc#1227771).
  * CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe
    (bsc#1228008)
  * CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build()
    (bsc#1228063).
  * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in
    kvm_vcpu_on_spin() (bsc#1227806).
  * CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in
    event_deliver() (bsc#1227725)
  * CVE-2024-39509: HID: core: remove unnecessary WARN_ON() in implement()
    (bsc#1227733)
  * CVE-2024-39487: bonding: Fix out-of-bounds read in
    bond_option_arp_ip_targets_set() (bsc#1227573)
  * CVE-2024-35934: net/smc: reduce rtnl pressure in
    smc_pnet_create_pnetids_list() (bsc#1224641)
  * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in
    xfrm6_get_saddr() (bsc#1227884).
  * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
  * CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses
    (bsc#1225224)
  * CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
    (bsc#1222829)
  * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in
    __nft_expr_type_get() (bsc#1223815)
  * CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in
    vmbus_add_channel_kobj (bsc#1227924).
  * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in
    __nft_obj_type_get() (bsc#1223813)
  * CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
    (bsc#1227774).
  * CVE-2024-40912: wifi: mac80211: Fix deadlock in
    ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).
  * CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
    (bsc#1227770).
  * CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete
    (bsc#1228005).
  * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in
    fib6_rule_action() (bsc#1225719).
  * CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a
    check on len. (bsc#1226555).
  * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-
    allocated memory (bsc#1227762).
  * CVE-2024-26924: scsi: lpfc: Release hbalock before calling
    lpfc_worker_wake_up() (bsc#1225820).
  * CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove
    administratively set MAC (bsc#1223012).
  * CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add()
    (bsc#1225427).
  * CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
    (bsc#1225361).
  * CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent()
    (bsc#1227754).
  * CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue
    (bsc#1225003)
  * CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in
    qlcnic_83xx_add_rings() (bsc#1225455)
  * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
  * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
    (bsc#1224545)
  * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
  * CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
  * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
  * CVE-2024-26663: tipc: Check the bearer type before calling
    tipc_udp_nl_bearer_add() (bsc#1222326).
  * CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets
    (bsc#1226553).
  * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core
    (bsc#1227626).
  * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for
    ICMPv6 (bsc#1226783).
  * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection
    dump (bsc#1220942).
  * CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd
    number in pstore/ram (bsc#1221618).
  * CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun
    events in xhci (bsc#1222317).
  * CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete()
    (bsc#1224571).
  * CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode
    (bsc#1224637).
  * CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
  * CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp
    (bsc#1221616).
  * CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system
    memory accesses (bsc#1224557).
  * CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
  * CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work
    (bsc#1224975)
  * CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by
    cpu5wdt_trigger (bsc#1226908).
  * CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in
    smc_vlan_by_tcpsk() (bsc#1225396).

The following non-security bugs were fixed:

  * Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)
  * Btrfs: incremental send, fix emission of invalid clone operations
    (bsc#1228030).
  * Btrfs: send, improve clone range (bsc#1228030).
  * KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu
    (bsc#1065729).
  * KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action()
    comment (bsc#1065729).
  * KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR
    (bsc#1065729).
  * KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).
  * KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines
    (bsc#1065729).
  * KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list
    (bsc#1065729).
  * KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).
  * KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).
  * PCI: Fix resource double counting on remove & rescan (git-fixes).
  * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-
    fixes).
  * Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes).
  * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-
    fixes).
  * btrfs: fix 64bit compat send ioctl arguments not initializing version member
    (bsc#1228030).
  * btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).
  * btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).
  * btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).
  * btrfs: send: add stream v2 definitions (bsc#1228030).
  * btrfs: send: always use the rbtree based inode ref management infrastructure
    (bsc#1228030).
  * btrfs: send: avoid copying file data (bsc#1228030).
  * btrfs: send: explicitly number commands and attributes (bsc#1228030).
  * btrfs: send: fix failures when processing inodes with no links
    (bsc#1228030).
  * btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).
  * btrfs: send: fix sending link commands for existing file paths
    (bsc#1228030).
  * btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).
  * btrfs: send: introduce recorded_ref_alloc and recorded_ref_free
    (bsc#1228030).
  * btrfs: send: prepare for v2 protocol (bsc#1228030).
  * btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).
  * btrfs: send: remove stale code when checking for shared extents
    (bsc#1228030).
  * btrfs: send: remove unused found_type parameter to lookup_dir_item_inode()
    (bsc#1228030).
  * btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).
  * btrfs: send: use boolean types for current inode status (bsc#1228030).
  * btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).
  * drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)
  * hv_netvsc: rndis_filter needs to select NLS (git-fixes).
  * ipv6: sr: fix incorrect unregister order (git-fixes).
  * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
  * net: mana: select PAGE_POOL (git-fixes).
  * net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).
  * net_sched: fix a memory leak in cls_tcindex (bsc#1224975).
  * net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).
  * net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)
  * nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
  * ocfs2: fix DIO failure due to insufficient transaction credits
    (bsc#1216834).
  * ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
  * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
    (bsc#1228410).
  * scsi: qla2xxx: Avoid possible run-time warning with long model_num
    (bsc#1228850).
  * scsi: qla2xxx: Complete command early within lock (bsc#1228850).
  * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
  * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
  * scsi: qla2xxx: During vport delete send async logout explicitly
    (bsc#1228850).
  * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
  * scsi: qla2xxx: Fix flash read failure (bsc#1228850).
  * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
  * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
  * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
  * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
  * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds
    (bsc#1228850).
  * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
  * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
  * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
  * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
  * signal: Introduce clear_siginfo (git-fixes).
  * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
  * tools lib: Fix builds when glibc contains strlcpy() (git-fixes).
  * tools: hv: fix KVP and VSS daemons exit code (git-fixes).
  * usb: add a hcd_uses_dma helper (git-fixes).
  * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
  * usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
  * x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
  * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-
    fixes).
  * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with
    CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
  * xfs: check that dir block entries do not off the end of the buffer (git-
    fixes).
  * xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).
  * xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).
  * xhci: Poll for U0 after disabling USB2 LPM (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2940=1 SUSE-SLE-
SERVER-12-SP5-2024-2940=1

  * SUSE Linux Enterprise High Availability Extension 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2940=1

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2940=1

  * SUSE Linux Enterprise Software Development Kit 12 SP5  
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2940=1

  * SUSE Linux Enterprise High Performance Computing 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2940=1

  * SUSE Linux Enterprise Server 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2940=1

  * SUSE Linux Enterprise Workstation Extension 12 12-SP5  
    zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2940=1

## Package List:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * cluster-md-kmp-default-debuginfo-4.12.14-122.225.1
    * kernel-default-debuginfo-4.12.14-122.225.1
    * kernel-default-devel-4.12.14-122.225.1
    * gfs2-kmp-default-4.12.14-122.225.1
    * kernel-default-base-debuginfo-4.12.14-122.225.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.225.1
    * dlm-kmp-default-4.12.14-122.225.1
    * kernel-default-debugsource-4.12.14-122.225.1
    * dlm-kmp-default-debuginfo-4.12.14-122.225.1
    * ocfs2-kmp-default-4.12.14-122.225.1
    * cluster-md-kmp-default-4.12.14-122.225.1
    * kernel-default-base-4.12.14-122.225.1
    * kernel-syms-4.12.14-122.225.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.225.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le
    x86_64)
    * kernel-default-4.12.14-122.225.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
    * kernel-source-4.12.14-122.225.1
    * kernel-devel-4.12.14-122.225.1
    * kernel-macros-4.12.14-122.225.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.225.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
    x86_64)
    * cluster-md-kmp-default-debuginfo-4.12.14-122.225.1
    * kernel-default-debuginfo-4.12.14-122.225.1
    * gfs2-kmp-default-4.12.14-122.225.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.225.1
    * dlm-kmp-default-4.12.14-122.225.1
    * kernel-default-debugsource-4.12.14-122.225.1
    * dlm-kmp-default-debuginfo-4.12.14-122.225.1
    * ocfs2-kmp-default-4.12.14-122.225.1
    * cluster-md-kmp-default-4.12.14-122.225.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.225.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.225.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kernel-default-kgraft-devel-4.12.14-122.225.1
    * kernel-default-debuginfo-4.12.14-122.225.1
    * kgraft-patch-4_12_14-122_225-default-1-8.3.1
    * kernel-default-debugsource-4.12.14-122.225.1
    * kernel-default-kgraft-4.12.14-122.225.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.225.1
  * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc)
    * kernel-docs-4.12.14-122.225.2
  * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x
    x86_64)
    * kernel-obs-build-debugsource-4.12.14-122.225.1
    * kernel-obs-build-4.12.14-122.225.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc
    x86_64)
    * kernel-default-4.12.14-122.225.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
    * kernel-default-debuginfo-4.12.14-122.225.1
    * kernel-default-devel-4.12.14-122.225.1
    * kernel-default-base-debuginfo-4.12.14-122.225.1
    * kernel-default-debugsource-4.12.14-122.225.1
    * kernel-syms-4.12.14-122.225.1
    * kernel-default-base-4.12.14-122.225.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
    * kernel-source-4.12.14-122.225.1
    * kernel-devel-4.12.14-122.225.1
    * kernel-macros-4.12.14-122.225.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.225.1
  * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-4.12.14-122.225.1
  * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debuginfo-4.12.14-122.225.1
    * kernel-default-devel-4.12.14-122.225.1
    * kernel-default-base-debuginfo-4.12.14-122.225.1
    * kernel-default-debugsource-4.12.14-122.225.1
    * kernel-syms-4.12.14-122.225.1
    * kernel-default-base-4.12.14-122.225.1
  * SUSE Linux Enterprise Server 12 SP5 (noarch)
    * kernel-source-4.12.14-122.225.1
    * kernel-devel-4.12.14-122.225.1
    * kernel-macros-4.12.14-122.225.1
  * SUSE Linux Enterprise Server 12 SP5 (s390x)
    * kernel-default-man-4.12.14-122.225.1
  * SUSE Linux Enterprise Server 12 SP5 (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.225.1
  * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.225.1
  * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64)
    * kernel-default-extra-4.12.14-122.225.1
    * kernel-default-debuginfo-4.12.14-122.225.1
    * kernel-default-extra-debuginfo-4.12.14-122.225.1
    * kernel-default-debugsource-4.12.14-122.225.1

## References:

  * https://www.suse.com/security/cve/CVE-2020-26558.html
  * https://www.suse.com/security/cve/CVE-2021-0129.html
  * https://www.suse.com/security/cve/CVE-2021-47191.html
  * https://www.suse.com/security/cve/CVE-2021-47194.html
  * https://www.suse.com/security/cve/CVE-2021-47197.html
  * https://www.suse.com/security/cve/CVE-2021-47219.html
  * https://www.suse.com/security/cve/CVE-2021-47295.html
  * https://www.suse.com/security/cve/CVE-2021-47388.html
  * https://www.suse.com/security/cve/CVE-2021-47395.html
  * https://www.suse.com/security/cve/CVE-2021-47399.html
  * https://www.suse.com/security/cve/CVE-2021-47403.html
  * https://www.suse.com/security/cve/CVE-2021-47405.html
  * https://www.suse.com/security/cve/CVE-2021-47438.html
  * https://www.suse.com/security/cve/CVE-2021-47441.html
  * https://www.suse.com/security/cve/CVE-2021-47468.html
  * https://www.suse.com/security/cve/CVE-2021-47501.html
  * https://www.suse.com/security/cve/CVE-2021-47516.html
  * https://www.suse.com/security/cve/CVE-2021-47542.html
  * https://www.suse.com/security/cve/CVE-2021-47559.html
  * https://www.suse.com/security/cve/CVE-2021-47580.html
  * https://www.suse.com/security/cve/CVE-2021-47582.html
  * https://www.suse.com/security/cve/CVE-2021-47588.html
  * https://www.suse.com/security/cve/CVE-2021-47597.html
  * https://www.suse.com/security/cve/CVE-2021-47599.html
  * https://www.suse.com/security/cve/CVE-2021-47606.html
  * https://www.suse.com/security/cve/CVE-2021-47619.html
  * https://www.suse.com/security/cve/CVE-2022-20368.html
  * https://www.suse.com/security/cve/CVE-2022-28748.html
  * https://www.suse.com/security/cve/CVE-2022-2964.html
  * https://www.suse.com/security/cve/CVE-2022-48775.html
  * https://www.suse.com/security/cve/CVE-2022-48792.html
  * https://www.suse.com/security/cve/CVE-2022-48794.html
  * https://www.suse.com/security/cve/CVE-2022-48804.html
  * https://www.suse.com/security/cve/CVE-2022-48805.html
  * https://www.suse.com/security/cve/CVE-2022-48810.html
  * https://www.suse.com/security/cve/CVE-2022-48811.html
  * https://www.suse.com/security/cve/CVE-2022-48823.html
  * https://www.suse.com/security/cve/CVE-2022-48826.html
  * https://www.suse.com/security/cve/CVE-2022-48827.html
  * https://www.suse.com/security/cve/CVE-2022-48828.html
  * https://www.suse.com/security/cve/CVE-2022-48829.html
  * https://www.suse.com/security/cve/CVE-2022-48836.html
  * https://www.suse.com/security/cve/CVE-2022-48839.html
  * https://www.suse.com/security/cve/CVE-2022-48850.html
  * https://www.suse.com/security/cve/CVE-2022-48855.html
  * https://www.suse.com/security/cve/CVE-2022-48857.html
  * https://www.suse.com/security/cve/CVE-2022-48860.html
  * https://www.suse.com/security/cve/CVE-2022-48863.html
  * https://www.suse.com/security/cve/CVE-2023-52435.html
  * https://www.suse.com/security/cve/CVE-2023-52594.html
  * https://www.suse.com/security/cve/CVE-2023-52612.html
  * https://www.suse.com/security/cve/CVE-2023-52615.html
  * https://www.suse.com/security/cve/CVE-2023-52619.html
  * https://www.suse.com/security/cve/CVE-2023-52623.html
  * https://www.suse.com/security/cve/CVE-2023-52669.html
  * https://www.suse.com/security/cve/CVE-2023-52743.html
  * https://www.suse.com/security/cve/CVE-2023-52885.html
  * https://www.suse.com/security/cve/CVE-2024-26615.html
  * https://www.suse.com/security/cve/CVE-2024-26659.html
  * https://www.suse.com/security/cve/CVE-2024-26663.html
  * https://www.suse.com/security/cve/CVE-2024-26735.html
  * https://www.suse.com/security/cve/CVE-2024-26830.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-26924.html
  * https://www.suse.com/security/cve/CVE-2024-27019.html
  * https://www.suse.com/security/cve/CVE-2024-27020.html
  * https://www.suse.com/security/cve/CVE-2024-27025.html
  * https://www.suse.com/security/cve/CVE-2024-27437.html
  * https://www.suse.com/security/cve/CVE-2024-35806.html
  * https://www.suse.com/security/cve/CVE-2024-35819.html
  * https://www.suse.com/security/cve/CVE-2024-35837.html
  * https://www.suse.com/security/cve/CVE-2024-35887.html
  * https://www.suse.com/security/cve/CVE-2024-35893.html
  * https://www.suse.com/security/cve/CVE-2024-35934.html
  * https://www.suse.com/security/cve/CVE-2024-35949.html
  * https://www.suse.com/security/cve/CVE-2024-35966.html
  * https://www.suse.com/security/cve/CVE-2024-35967.html
  * https://www.suse.com/security/cve/CVE-2024-35978.html
  * https://www.suse.com/security/cve/CVE-2024-35995.html
  * https://www.suse.com/security/cve/CVE-2024-36004.html
  * https://www.suse.com/security/cve/CVE-2024-36288.html
  * https://www.suse.com/security/cve/CVE-2024-36592.html
  * https://www.suse.com/security/cve/CVE-2024-36901.html
  * https://www.suse.com/security/cve/CVE-2024-36902.html
  * https://www.suse.com/security/cve/CVE-2024-36919.html
  * https://www.suse.com/security/cve/CVE-2024-36924.html
  * https://www.suse.com/security/cve/CVE-2024-36939.html
  * https://www.suse.com/security/cve/CVE-2024-36952.html
  * https://www.suse.com/security/cve/CVE-2024-38558.html
  * https://www.suse.com/security/cve/CVE-2024-38560.html
  * https://www.suse.com/security/cve/CVE-2024-38630.html
  * https://www.suse.com/security/cve/CVE-2024-39487.html
  * https://www.suse.com/security/cve/CVE-2024-39488.html
  * https://www.suse.com/security/cve/CVE-2024-39490.html
  * https://www.suse.com/security/cve/CVE-2024-39494.html
  * https://www.suse.com/security/cve/CVE-2024-39499.html
  * https://www.suse.com/security/cve/CVE-2024-39501.html
  * https://www.suse.com/security/cve/CVE-2024-39506.html
  * https://www.suse.com/security/cve/CVE-2024-39507.html
  * https://www.suse.com/security/cve/CVE-2024-39509.html
  * https://www.suse.com/security/cve/CVE-2024-40901.html
  * https://www.suse.com/security/cve/CVE-2024-40904.html
  * https://www.suse.com/security/cve/CVE-2024-40912.html
  * https://www.suse.com/security/cve/CVE-2024-40923.html
  * https://www.suse.com/security/cve/CVE-2024-40929.html
  * https://www.suse.com/security/cve/CVE-2024-40932.html
  * https://www.suse.com/security/cve/CVE-2024-40937.html
  * https://www.suse.com/security/cve/CVE-2024-40941.html
  * https://www.suse.com/security/cve/CVE-2024-40942.html
  * https://www.suse.com/security/cve/CVE-2024-40943.html
  * https://www.suse.com/security/cve/CVE-2024-40953.html
  * https://www.suse.com/security/cve/CVE-2024-40959.html
  * https://www.suse.com/security/cve/CVE-2024-40966.html
  * https://www.suse.com/security/cve/CVE-2024-40967.html
  * https://www.suse.com/security/cve/CVE-2024-40978.html
  * https://www.suse.com/security/cve/CVE-2024-40982.html
  * https://www.suse.com/security/cve/CVE-2024-40987.html
  * https://www.suse.com/security/cve/CVE-2024-40988.html
  * https://www.suse.com/security/cve/CVE-2024-40990.html
  * https://www.suse.com/security/cve/CVE-2024-40995.html
  * https://www.suse.com/security/cve/CVE-2024-40998.html
  * https://www.suse.com/security/cve/CVE-2024-40999.html
  * https://www.suse.com/security/cve/CVE-2024-41014.html
  * https://www.suse.com/security/cve/CVE-2024-41015.html
  * https://www.suse.com/security/cve/CVE-2024-41016.html
  * https://www.suse.com/security/cve/CVE-2024-41044.html
  * https://www.suse.com/security/cve/CVE-2024-41048.html
  * https://www.suse.com/security/cve/CVE-2024-41059.html
  * https://www.suse.com/security/cve/CVE-2024-41060.html
  * https://www.suse.com/security/cve/CVE-2024-41063.html
  * https://www.suse.com/security/cve/CVE-2024-41064.html
  * https://www.suse.com/security/cve/CVE-2024-41066.html
  * https://www.suse.com/security/cve/CVE-2024-41070.html
  * https://www.suse.com/security/cve/CVE-2024-41071.html
  * https://www.suse.com/security/cve/CVE-2024-41072.html
  * https://www.suse.com/security/cve/CVE-2024-41078.html
  * https://www.suse.com/security/cve/CVE-2024-41081.html
  * https://www.suse.com/security/cve/CVE-2024-41089.html
  * https://www.suse.com/security/cve/CVE-2024-41090.html
  * https://www.suse.com/security/cve/CVE-2024-41091.html
  * https://www.suse.com/security/cve/CVE-2024-41095.html
  * https://www.suse.com/security/cve/CVE-2024-42070.html
  * https://www.suse.com/security/cve/CVE-2024-42093.html
  * https://www.suse.com/security/cve/CVE-2024-42096.html
  * https://www.suse.com/security/cve/CVE-2024-42119.html
  * https://www.suse.com/security/cve/CVE-2024-42120.html
  * https://www.suse.com/security/cve/CVE-2024-42124.html
  * https://www.suse.com/security/cve/CVE-2024-42145.html
  * https://www.suse.com/security/cve/CVE-2024-42223.html
  * https://www.suse.com/security/cve/CVE-2024-42224.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1088701
  * https://bugzilla.suse.com/show_bug.cgi?id=1149446
  * https://bugzilla.suse.com/show_bug.cgi?id=1179610
  * https://bugzilla.suse.com/show_bug.cgi?id=1186463
  * https://bugzilla.suse.com/show_bug.cgi?id=1196018
  * https://bugzilla.suse.com/show_bug.cgi?id=1202346
  * https://bugzilla.suse.com/show_bug.cgi?id=1216834
  * https://bugzilla.suse.com/show_bug.cgi?id=1220138
  * https://bugzilla.suse.com/show_bug.cgi?id=1220942
  * https://bugzilla.suse.com/show_bug.cgi?id=1221045
  * https://bugzilla.suse.com/show_bug.cgi?id=1221614
  * https://bugzilla.suse.com/show_bug.cgi?id=1221616
  * https://bugzilla.suse.com/show_bug.cgi?id=1221618
  * https://bugzilla.suse.com/show_bug.cgi?id=1222060
  * https://bugzilla.suse.com/show_bug.cgi?id=1222317
  * https://bugzilla.suse.com/show_bug.cgi?id=1222326
  * https://bugzilla.suse.com/show_bug.cgi?id=1222372
  * https://bugzilla.suse.com/show_bug.cgi?id=1222625
  * https://bugzilla.suse.com/show_bug.cgi?id=1222776
  * https://bugzilla.suse.com/show_bug.cgi?id=1222824
  * https://bugzilla.suse.com/show_bug.cgi?id=1222829
  * https://bugzilla.suse.com/show_bug.cgi?id=1222866
  * https://bugzilla.suse.com/show_bug.cgi?id=1223012
  * https://bugzilla.suse.com/show_bug.cgi?id=1223778
  * https://bugzilla.suse.com/show_bug.cgi?id=1223813
  * https://bugzilla.suse.com/show_bug.cgi?id=1223815
  * https://bugzilla.suse.com/show_bug.cgi?id=1224500
  * https://bugzilla.suse.com/show_bug.cgi?id=1224512
  * https://bugzilla.suse.com/show_bug.cgi?id=1224545
  * https://bugzilla.suse.com/show_bug.cgi?id=1224557
  * https://bugzilla.suse.com/show_bug.cgi?id=1224571
  * https://bugzilla.suse.com/show_bug.cgi?id=1224576
  * https://bugzilla.suse.com/show_bug.cgi?id=1224587
  * https://bugzilla.suse.com/show_bug.cgi?id=1224637
  * https://bugzilla.suse.com/show_bug.cgi?id=1224641
  * https://bugzilla.suse.com/show_bug.cgi?id=1224663
  * https://bugzilla.suse.com/show_bug.cgi?id=1224683
  * https://bugzilla.suse.com/show_bug.cgi?id=1224699
  * https://bugzilla.suse.com/show_bug.cgi?id=1224700
  * https://bugzilla.suse.com/show_bug.cgi?id=1224975
  * https://bugzilla.suse.com/show_bug.cgi?id=1225003
  * https://bugzilla.suse.com/show_bug.cgi?id=1225214
  * https://bugzilla.suse.com/show_bug.cgi?id=1225224
  * https://bugzilla.suse.com/show_bug.cgi?id=1225229
  * https://bugzilla.suse.com/show_bug.cgi?id=1225238
  * https://bugzilla.suse.com/show_bug.cgi?id=1225241
  * https://bugzilla.suse.com/show_bug.cgi?id=1225326
  * https://bugzilla.suse.com/show_bug.cgi?id=1225328
  * https://bugzilla.suse.com/show_bug.cgi?id=1225346
  * https://bugzilla.suse.com/show_bug.cgi?id=1225361
  * https://bugzilla.suse.com/show_bug.cgi?id=1225396
  * https://bugzilla.suse.com/show_bug.cgi?id=1225427
  * https://bugzilla.suse.com/show_bug.cgi?id=1225455
  * https://bugzilla.suse.com/show_bug.cgi?id=1225711
  * https://bugzilla.suse.com/show_bug.cgi?id=1225719
  * https://bugzilla.suse.com/show_bug.cgi?id=1225767
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1225838
  * https://bugzilla.suse.com/show_bug.cgi?id=1225898
  * https://bugzilla.suse.com/show_bug.cgi?id=1226550
  * https://bugzilla.suse.com/show_bug.cgi?id=1226553
  * https://bugzilla.suse.com/show_bug.cgi?id=1226555
  * https://bugzilla.suse.com/show_bug.cgi?id=1226559
  * https://bugzilla.suse.com/show_bug.cgi?id=1226568
  * https://bugzilla.suse.com/show_bug.cgi?id=1226571
  * https://bugzilla.suse.com/show_bug.cgi?id=1226645
  * https://bugzilla.suse.com/show_bug.cgi?id=1226783
  * https://bugzilla.suse.com/show_bug.cgi?id=1226786
  * https://bugzilla.suse.com/show_bug.cgi?id=1226834
  * https://bugzilla.suse.com/show_bug.cgi?id=1226908
  * https://bugzilla.suse.com/show_bug.cgi?id=1227191
  * https://bugzilla.suse.com/show_bug.cgi?id=1227213
  * https://bugzilla.suse.com/show_bug.cgi?id=1227573
  * https://bugzilla.suse.com/show_bug.cgi?id=1227618
  * https://bugzilla.suse.com/show_bug.cgi?id=1227626
  * https://bugzilla.suse.com/show_bug.cgi?id=1227716
  * https://bugzilla.suse.com/show_bug.cgi?id=1227725
  * https://bugzilla.suse.com/show_bug.cgi?id=1227729
  * https://bugzilla.suse.com/show_bug.cgi?id=1227730
  * https://bugzilla.suse.com/show_bug.cgi?id=1227733
  * https://bugzilla.suse.com/show_bug.cgi?id=1227750
  * https://bugzilla.suse.com/show_bug.cgi?id=1227754
  * https://bugzilla.suse.com/show_bug.cgi?id=1227762
  * https://bugzilla.suse.com/show_bug.cgi?id=1227770
  * https://bugzilla.suse.com/show_bug.cgi?id=1227771
  * https://bugzilla.suse.com/show_bug.cgi?id=1227772
  * https://bugzilla.suse.com/show_bug.cgi?id=1227774
  * https://bugzilla.suse.com/show_bug.cgi?id=1227786
  * https://bugzilla.suse.com/show_bug.cgi?id=1227790
  * https://bugzilla.suse.com/show_bug.cgi?id=1227806
  * https://bugzilla.suse.com/show_bug.cgi?id=1227824
  * https://bugzilla.suse.com/show_bug.cgi?id=1227828
  * https://bugzilla.suse.com/show_bug.cgi?id=1227830
  * https://bugzilla.suse.com/show_bug.cgi?id=1227836
  * https://bugzilla.suse.com/show_bug.cgi?id=1227849
  * https://bugzilla.suse.com/show_bug.cgi?id=1227865
  * https://bugzilla.suse.com/show_bug.cgi?id=1227866
  * https://bugzilla.suse.com/show_bug.cgi?id=1227884
  * https://bugzilla.suse.com/show_bug.cgi?id=1227886
  * https://bugzilla.suse.com/show_bug.cgi?id=1227891
  * https://bugzilla.suse.com/show_bug.cgi?id=1227913
  * https://bugzilla.suse.com/show_bug.cgi?id=1227924
  * https://bugzilla.suse.com/show_bug.cgi?id=1227928
  * https://bugzilla.suse.com/show_bug.cgi?id=1227929
  * https://bugzilla.suse.com/show_bug.cgi?id=1227936
  * https://bugzilla.suse.com/show_bug.cgi?id=1227957
  * https://bugzilla.suse.com/show_bug.cgi?id=1227968
  * https://bugzilla.suse.com/show_bug.cgi?id=1227969
  * https://bugzilla.suse.com/show_bug.cgi?id=1227975
  * https://bugzilla.suse.com/show_bug.cgi?id=1227985
  * https://bugzilla.suse.com/show_bug.cgi?id=1227989
  * https://bugzilla.suse.com/show_bug.cgi?id=1228003
  * https://bugzilla.suse.com/show_bug.cgi?id=1228005
  * https://bugzilla.suse.com/show_bug.cgi?id=1228008
  * https://bugzilla.suse.com/show_bug.cgi?id=1228013
  * https://bugzilla.suse.com/show_bug.cgi?id=1228025
  * https://bugzilla.suse.com/show_bug.cgi?id=1228030
  * https://bugzilla.suse.com/show_bug.cgi?id=1228037
  * https://bugzilla.suse.com/show_bug.cgi?id=1228045
  * https://bugzilla.suse.com/show_bug.cgi?id=1228054
  * https://bugzilla.suse.com/show_bug.cgi?id=1228055
  * https://bugzilla.suse.com/show_bug.cgi?id=1228063
  * https://bugzilla.suse.com/show_bug.cgi?id=1228071
  * https://bugzilla.suse.com/show_bug.cgi?id=1228235
  * https://bugzilla.suse.com/show_bug.cgi?id=1228237
  * https://bugzilla.suse.com/show_bug.cgi?id=1228327
  * https://bugzilla.suse.com/show_bug.cgi?id=1228328
  * https://bugzilla.suse.com/show_bug.cgi?id=1228408
  * https://bugzilla.suse.com/show_bug.cgi?id=1228409
  * https://bugzilla.suse.com/show_bug.cgi?id=1228410
  * https://bugzilla.suse.com/show_bug.cgi?id=1228470
  * https://bugzilla.suse.com/show_bug.cgi?id=1228530
  * https://bugzilla.suse.com/show_bug.cgi?id=1228561
  * https://bugzilla.suse.com/show_bug.cgi?id=1228565
  * https://bugzilla.suse.com/show_bug.cgi?id=1228567
  * https://bugzilla.suse.com/show_bug.cgi?id=1228580
  * https://bugzilla.suse.com/show_bug.cgi?id=1228581
  * https://bugzilla.suse.com/show_bug.cgi?id=1228584
  * https://bugzilla.suse.com/show_bug.cgi?id=1228588
  * https://bugzilla.suse.com/show_bug.cgi?id=1228599
  * https://bugzilla.suse.com/show_bug.cgi?id=1228617
  * https://bugzilla.suse.com/show_bug.cgi?id=1228625
  * https://bugzilla.suse.com/show_bug.cgi?id=1228626
  * https://bugzilla.suse.com/show_bug.cgi?id=1228633
  * https://bugzilla.suse.com/show_bug.cgi?id=1228640
  * https://bugzilla.suse.com/show_bug.cgi?id=1228655
  * https://bugzilla.suse.com/show_bug.cgi?id=1228658
  * https://bugzilla.suse.com/show_bug.cgi?id=1228662
  * https://bugzilla.suse.com/show_bug.cgi?id=1228680
  * https://bugzilla.suse.com/show_bug.cgi?id=1228705
  * https://bugzilla.suse.com/show_bug.cgi?id=1228723
  * https://bugzilla.suse.com/show_bug.cgi?id=1228726
  * https://bugzilla.suse.com/show_bug.cgi?id=1228743
  * https://bugzilla.suse.com/show_bug.cgi?id=1228850

SUSE: 2024:2940-1 important: the Linux Kernel Security Advisory Updates

August 16, 2024
* bsc#1065729 * bsc#1088701 * bsc#1149446 * bsc#1179610 * bsc#1186463

Summary

## The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716). * CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633). * CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729). * CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645). * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743). * CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705). * CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726) * CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584) * CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588) * CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662) * CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723). * CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626). * CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565). * CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830). * CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530). * CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640). * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680). * CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in (bsc#1228658) * CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it (bsc#1228567) * CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055). * CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054). * CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037). * CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655). * CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625). * CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599). * CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). * CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617). * CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929). * CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013). * CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045). * CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866). * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561). * CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235) * CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975) * CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625). * CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409). * CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580). * CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470). * CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581). * CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238). * CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957) * CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828) * CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241). * CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214). * CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408). * CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328). * CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913). * CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500). * CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568). * CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968). * CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891). * CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886). * CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071). * CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559). * CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865). * CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346). * CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326). * CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936). * CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045). * CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003). * CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550). * CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372). * CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). * CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928). * CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463). * CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610). * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836). * CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730). * CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786). * CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771). * CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008) * CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063). * CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806). * CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725) * CVE-2024-39509: HID: core: remove unnecessary WARN_ON() in implement() (bsc#1227733) * CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573) * CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641) * CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884). * CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512) * CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224) * CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829) * CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815) * CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924). * CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813) * CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774). * CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790). * CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770). * CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005). * CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719). * CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555). * CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non- allocated memory (bsc#1227762). * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012). * CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427). * CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361). * CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754). * CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003) * CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455) * CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711) * CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545) * CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778) * CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571). * CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). * CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326). * CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553). * CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626). * CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783). * CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). * CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618). * CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317). * CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571). * CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637). * CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614). * CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616). * CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557). * CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060). * CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975) * CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908). * CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396). The following non-security bugs were fixed: * Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191) * Btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030). * Btrfs: send, improve clone range (bsc#1228030). * KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu (bsc#1065729). * KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729). * KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729). * KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes). * KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729). * KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729). * KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729). * KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729). * PCI: Fix resource double counting on remove & rescan (git-fixes). * PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git- fixes). * Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes). * USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git- fixes). * btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030). * btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030). * btrfs: remove unused members dir_path from recorded_ref (bsc#1228030). * btrfs: send: add new command FILEATTR for file attributes (bsc#1228030). * btrfs: send: add stream v2 definitions (bsc#1228030). * btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030). * btrfs: send: avoid copying file data (bsc#1228030). * btrfs: send: explicitly number commands and attributes (bsc#1228030). * btrfs: send: fix failures when processing inodes with no links (bsc#1228030). * btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030). * btrfs: send: fix sending link commands for existing file paths (bsc#1228030). * btrfs: send: get rid of i_size logic in send_write() (bsc#1228030). * btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030). * btrfs: send: prepare for v2 protocol (bsc#1228030). * btrfs: send: refactor arguments of get_inode_info() (bsc#1228030). * btrfs: send: remove stale code when checking for shared extents (bsc#1228030). * btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030). * btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030). * btrfs: send: use boolean types for current inode status (bsc#1228030). * btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030). * drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975) * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * ipv6: sr: fix incorrect unregister order (git-fixes). * net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975). * net_sched: fix a memory leak in cls_tcindex (bsc#1224975). * net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975). * net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975) * nvme: fixup comment for nvme RDMA Provider Type (git-fixes). * ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834). * ocfs2: remove redundant assignment to variable free_space (bsc#1228409). * ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410). * scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850). * scsi: qla2xxx: Complete command early within lock (bsc#1228850). * scsi: qla2xxx: Convert comma to semicolon (bsc#1228850). * scsi: qla2xxx: Drop driver owner assignment (bsc#1228850). * scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850). * scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850). * scsi: qla2xxx: Fix flash read failure (bsc#1228850). * scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850). * scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850). * scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850). * scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850). * scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850). * scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850). * scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850). * scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850). * scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850). * signal: Introduce clear_siginfo (git-fixes). * string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850). * tools lib: Fix builds when glibc contains strlcpy() (git-fixes). * tools: hv: fix KVP and VSS daemons exit code (git-fixes). * usb: add a hcd_uses_dma helper (git-fixes). * usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes). * usb: musb: da8xx: fix a resource leak in probe() (git-fixes). * x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes). * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git- fixes). * x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes). * xfs: check that dir block entries do not off the end of the buffer (git- fixes). * xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes). * xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes). * xhci: Poll for U0 after disabling USB2 LPM (git-fixes).

References

* bsc#1065729

* bsc#1088701

* bsc#1149446

* bsc#1179610

* bsc#1186463

* bsc#1196018

* bsc#1202346

* bsc#1216834

* bsc#1220138

* bsc#1220942

* bsc#1221045

* bsc#1221614

* bsc#1221616

* bsc#1221618

* bsc#1222060

* bsc#1222317

* bsc#1222326

* bsc#1222372

* bsc#1222625

* bsc#1222776

* bsc#1222824

* bsc#1222829

* bsc#1222866

* bsc#1223012

* bsc#1223778

* bsc#1223813

* bsc#1223815

* bsc#1224500

* bsc#1224512

* bsc#1224545

* bsc#1224557

* bsc#1224571

* bsc#1224576

* bsc#1224587

* bsc#1224637

* bsc#1224641

* bsc#1224663

* bsc#1224683

* bsc#1224699

* bsc#1224700

* bsc#1224975

* bsc#1225003

* bsc#1225214

* bsc#1225224

* bsc#1225229

* bsc#1225238

* bsc#1225241

* bsc#1225326

* bsc#1225328

* bsc#1225346

* bsc#1225361

* bsc#1225396

* bsc#1225427

* bsc#1225455

* bsc#1225711

* bsc#1225719

* bsc#1225767

* bsc#1225820

* bsc#1225838

* bsc#1225898

* bsc#1226550

* bsc#1226553

* bsc#1226555

* bsc#1226559

* bsc#1226568

* bsc#1226571

* bsc#1226645

* bsc#1226783

* bsc#1226786

* bsc#1226834

* bsc#1226908

* bsc#1227191

* bsc#1227213

* bsc#1227573

* bsc#1227618

* bsc#1227626

* bsc#1227716

* bsc#1227725

* bsc#1227729

* bsc#1227730

* bsc#1227733

* bsc#1227750

* bsc#1227754

* bsc#1227762

* bsc#1227770

* bsc#1227771

* bsc#1227772

* bsc#1227774

* bsc#1227786

* bsc#1227790

* bsc#1227806

* bsc#1227824

* bsc#1227828

* bsc#1227830

* bsc#1227836

* bsc#1227849

* bsc#1227865

* bsc#1227866

* bsc#1227884

* bsc#1227886

* bsc#1227891

* bsc#1227913

* bsc#1227924

* bsc#1227928

* bsc#1227929

* bsc#1227936

* bsc#1227957

* bsc#1227968

* bsc#1227969

* bsc#1227975

* bsc#1227985

* bsc#1227989

* bsc#1228003

* bsc#1228005

* bsc#1228008

* bsc#1228013

* bsc#1228025

* bsc#1228030

* bsc#1228037

* bsc#1228045

* bsc#1228054

* bsc#1228055

* bsc#1228063

* bsc#1228071

* bsc#1228235

* bsc#1228237

* bsc#1228327

* bsc#1228328

* bsc#1228408

* bsc#1228409

* bsc#1228410

* bsc#1228470

* bsc#1228530

* bsc#1228561

* bsc#1228565

* bsc#1228567

* bsc#1228580

* bsc#1228581

* bsc#1228584

* bsc#1228588

* bsc#1228599

* bsc#1228617

* bsc#1228625

* bsc#1228626

* bsc#1228633

* bsc#1228640

* bsc#1228655

* bsc#1228658

* bsc#1228662

* bsc#1228680

* bsc#1228705

* bsc#1228723

* bsc#1228726

* bsc#1228743

* bsc#1228850

Cross-

* CVE-2020-26558

* CVE-2021-0129

* CVE-2021-47191

* CVE-2021-47194

* CVE-2021-47197

* CVE-2021-47219

* CVE-2021-47295

* CVE-2021-47388

* CVE-2021-47395

* CVE-2021-47399

* CVE-2021-47403

* CVE-2021-47405

* CVE-2021-47438

* CVE-2021-47441

* CVE-2021-47468

* CVE-2021-47501

* CVE-2021-47516

* CVE-2021-47542

* CVE-2021-47559

* CVE-2021-47580

* CVE-2021-47582

* CVE-2021-47588

* CVE-2021-47597

* CVE-2021-47599

* CVE-2021-47606

* CVE-2021-47619

* CVE-2022-20368

* CVE-2022-28748

* CVE-2022-2964

* CVE-2022-48775

* CVE-2022-48792

* CVE-2022-48794

* CVE-2022-48804

* CVE-2022-48805

* CVE-2022-48810

* CVE-2022-48811

* CVE-2022-48823

* CVE-2022-48826

* CVE-2022-48827

* CVE-2022-48828

* CVE-2022-48829

* CVE-2022-48836

* CVE-2022-48839

* CVE-2022-48850

* CVE-2022-48855

* CVE-2022-48857

* CVE-2022-48860

* CVE-2022-48863

* CVE-2023-52435

* CVE-2023-52594

* CVE-2023-52612

* CVE-2023-52615

* CVE-2023-52619

* CVE-2023-52623

* CVE-2023-52669

* CVE-2023-52743

* CVE-2023-52885

* CVE-2024-26615

* CVE-2024-26659

* CVE-2024-26663

* CVE-2024-26735

* CVE-2024-26830

* CVE-2024-26920

* CVE-2024-26924

* CVE-2024-27019

* CVE-2024-27020

* CVE-2024-27025

* CVE-2024-27437

* CVE-2024-35806

* CVE-2024-35819

* CVE-2024-35837

* CVE-2024-35887

* CVE-2024-35893

* CVE-2024-35934

* CVE-2024-35949

* CVE-2024-35966

* CVE-2024-35967

* CVE-2024-35978

* CVE-2024-35995

* CVE-2024-36004

* CVE-2024-36288

* CVE-2024-36592

* CVE-2024-36901

* CVE-2024-36902

* CVE-2024-36919

* CVE-2024-36924

* CVE-2024-36939

* CVE-2024-36952

* CVE-2024-38558

* CVE-2024-38560

* CVE-2024-38630

* CVE-2024-39487

* CVE-2024-39488

* CVE-2024-39490

* CVE-2024-39494

* CVE-2024-39499

* CVE-2024-39501

* CVE-2024-39506

* CVE-2024-39507

* CVE-2024-39509

* CVE-2024-40901

* CVE-2024-40904

* CVE-2024-40912

* CVE-2024-40923

* CVE-2024-40929

* CVE-2024-40932

* CVE-2024-40937

* CVE-2024-40941

* CVE-2024-40942

* CVE-2024-40943

* CVE-2024-40953

* CVE-2024-40959

* CVE-2024-40966

* CVE-2024-40967

* CVE-2024-40978

* CVE-2024-40982

* CVE-2024-40987

* CVE-2024-40988

* CVE-2024-40990

* CVE-2024-40995

* CVE-2024-40998

* CVE-2024-40999

* CVE-2024-41014

* CVE-2024-41015

* CVE-2024-41016

* CVE-2024-41044

* CVE-2024-41048

* CVE-2024-41059

* CVE-2024-41060

* CVE-2024-41063

* CVE-2024-41064

* CVE-2024-41066

* CVE-2024-41070

* CVE-2024-41071

* CVE-2024-41072

* CVE-2024-41078

* CVE-2024-41081

* CVE-2024-41089

* CVE-2024-41090

* CVE-2024-41091

* CVE-2024-41095

* CVE-2024-42070

* CVE-2024-42093

* CVE-2024-42096

* CVE-2024-42119

* CVE-2024-42120

* CVE-2024-42124

* CVE-2024-42145

* CVE-2024-42223

* CVE-2024-42224

CVSS scores:

* CVE-2020-26558 ( SUSE ): 4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

* CVE-2020-26558 ( NVD ): 4.2 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

* CVE-2021-0129 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

* CVE-2021-0129 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2021-47295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47559 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47580 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L

* CVE-2021-47582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47588 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

* CVE-2021-47599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2021-47619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

* CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2022-48810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48850 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48855 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52435 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52435 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52594 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52612 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

* CVE-2023-52615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2023-52743 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-26615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27019 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-27020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-27020 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-27025 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-27437 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35934 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-35949 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

* CVE-2024-36004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36919 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36924 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-36952 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38558 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

* CVE-2024-38560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-38630 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-39487 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-39488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39490 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-39499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

* CVE-2024-39501 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39507 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-39509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40901 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

* CVE-2024-40904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40932 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-40941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40966 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40967 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40987 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

* CVE-2024-40988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-40999 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

* CVE-2024-41014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41015 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

* CVE-2024-41044 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

* CVE-2024-41048 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41059 ( SUSE ): 7.3

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41060 ( SUSE ): 6.8

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41063 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41063 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41064 ( SUSE ): 5.7

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41064 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41066 ( SUSE ): 5.8

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-41066 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-41070 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

* CVE-2024-41071 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

* CVE-2024-41072 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

* CVE-2024-41078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

* CVE-2024-41081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

* CVE-2024-41091 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42070 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

* CVE-2024-42070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

* CVE-2024-42096 ( SUSE ): 5.8

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42096 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42145 ( SUSE ): 8.7

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

* CVE-2024-42224 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* SUSE Linux Enterprise High Availability Extension 12 SP5

* SUSE Linux Enterprise High Performance Computing 12 SP5

* SUSE Linux Enterprise Live Patching 12-SP5

* SUSE Linux Enterprise Server 12 SP5

* SUSE Linux Enterprise Server for SAP Applications 12 SP5

* SUSE Linux Enterprise Software Development Kit 12 SP5

* SUSE Linux Enterprise Workstation Extension 12 12-SP5

An update that solves 150 vulnerabilities and has five security fixes can now be

installed.

##

* https://www.suse.com/security/cve/CVE-2020-26558.html

* https://www.suse.com/security/cve/CVE-2021-0129.html

* https://www.suse.com/security/cve/CVE-2021-47191.html

* https://www.suse.com/security/cve/CVE-2021-47194.html

* https://www.suse.com/security/cve/CVE-2021-47197.html

* https://www.suse.com/security/cve/CVE-2021-47219.html

* https://www.suse.com/security/cve/CVE-2021-47295.html

* https://www.suse.com/security/cve/CVE-2021-47388.html

* https://www.suse.com/security/cve/CVE-2021-47395.html

* https://www.suse.com/security/cve/CVE-2021-47399.html

* https://www.suse.com/security/cve/CVE-2021-47403.html

* https://www.suse.com/security/cve/CVE-2021-47405.html

* https://www.suse.com/security/cve/CVE-2021-47438.html

* https://www.suse.com/security/cve/CVE-2021-47441.html

* https://www.suse.com/security/cve/CVE-2021-47468.html

* https://www.suse.com/security/cve/CVE-2021-47501.html

* https://www.suse.com/security/cve/CVE-2021-47516.html

* https://www.suse.com/security/cve/CVE-2021-47542.html

* https://www.suse.com/security/cve/CVE-2021-47559.html

* https://www.suse.com/security/cve/CVE-2021-47580.html

* https://www.suse.com/security/cve/CVE-2021-47582.html

* https://www.suse.com/security/cve/CVE-2021-47588.html

* https://www.suse.com/security/cve/CVE-2021-47597.html

* https://www.suse.com/security/cve/CVE-2021-47599.html

* https://www.suse.com/security/cve/CVE-2021-47606.html

* https://www.suse.com/security/cve/CVE-2021-47619.html

* https://www.suse.com/security/cve/CVE-2022-20368.html

* https://www.suse.com/security/cve/CVE-2022-28748.html

* https://www.suse.com/security/cve/CVE-2022-2964.html

* https://www.suse.com/security/cve/CVE-2022-48775.html

* https://www.suse.com/security/cve/CVE-2022-48792.html

* https://www.suse.com/security/cve/CVE-2022-48794.html

* https://www.suse.com/security/cve/CVE-2022-48804.html

* https://www.suse.com/security/cve/CVE-2022-48805.html

* https://www.suse.com/security/cve/CVE-2022-48810.html

* https://www.suse.com/security/cve/CVE-2022-48811.html

* https://www.suse.com/security/cve/CVE-2022-48823.html

* https://www.suse.com/security/cve/CVE-2022-48826.html

* https://www.suse.com/security/cve/CVE-2022-48827.html

* https://www.suse.com/security/cve/CVE-2022-48828.html

* https://www.suse.com/security/cve/CVE-2022-48829.html

* https://www.suse.com/security/cve/CVE-2022-48836.html

* https://www.suse.com/security/cve/CVE-2022-48839.html

* https://www.suse.com/security/cve/CVE-2022-48850.html

* https://www.suse.com/security/cve/CVE-2022-48855.html

* https://www.suse.com/security/cve/CVE-2022-48857.html

* https://www.suse.com/security/cve/CVE-2022-48860.html

* https://www.suse.com/security/cve/CVE-2022-48863.html

* https://www.suse.com/security/cve/CVE-2023-52435.html

* https://www.suse.com/security/cve/CVE-2023-52594.html

* https://www.suse.com/security/cve/CVE-2023-52612.html

* https://www.suse.com/security/cve/CVE-2023-52615.html

* https://www.suse.com/security/cve/CVE-2023-52619.html

* https://www.suse.com/security/cve/CVE-2023-52623.html

* https://www.suse.com/security/cve/CVE-2023-52669.html

* https://www.suse.com/security/cve/CVE-2023-52743.html

* https://www.suse.com/security/cve/CVE-2023-52885.html

* https://www.suse.com/security/cve/CVE-2024-26615.html

* https://www.suse.com/security/cve/CVE-2024-26659.html

* https://www.suse.com/security/cve/CVE-2024-26663.html

* https://www.suse.com/security/cve/CVE-2024-26735.html

* https://www.suse.com/security/cve/CVE-2024-26830.html

* https://www.suse.com/security/cve/CVE-2024-26920.html

* https://www.suse.com/security/cve/CVE-2024-26924.html

* https://www.suse.com/security/cve/CVE-2024-27019.html

* https://www.suse.com/security/cve/CVE-2024-27020.html

* https://www.suse.com/security/cve/CVE-2024-27025.html

* https://www.suse.com/security/cve/CVE-2024-27437.html

* https://www.suse.com/security/cve/CVE-2024-35806.html

* https://www.suse.com/security/cve/CVE-2024-35819.html

* https://www.suse.com/security/cve/CVE-2024-35837.html

* https://www.suse.com/security/cve/CVE-2024-35887.html

* https://www.suse.com/security/cve/CVE-2024-35893.html

* https://www.suse.com/security/cve/CVE-2024-35934.html

* https://www.suse.com/security/cve/CVE-2024-35949.html

* https://www.suse.com/security/cve/CVE-2024-35966.html

* https://www.suse.com/security/cve/CVE-2024-35967.html

* https://www.suse.com/security/cve/CVE-2024-35978.html

* https://www.suse.com/security/cve/CVE-2024-35995.html

* https://www.suse.com/security/cve/CVE-2024-36004.html

* https://www.suse.com/security/cve/CVE-2024-36288.html

* https://www.suse.com/security/cve/CVE-2024-36592.html

* https://www.suse.com/security/cve/CVE-2024-36901.html

* https://www.suse.com/security/cve/CVE-2024-36902.html

* https://www.suse.com/security/cve/CVE-2024-36919.html

* https://www.suse.com/security/cve/CVE-2024-36924.html

* https://www.suse.com/security/cve/CVE-2024-36939.html

* https://www.suse.com/security/cve/CVE-2024-36952.html

* https://www.suse.com/security/cve/CVE-2024-38558.html

* https://www.suse.com/security/cve/CVE-2024-38560.html

* https://www.suse.com/security/cve/CVE-2024-38630.html

* https://www.suse.com/security/cve/CVE-2024-39487.html

* https://www.suse.com/security/cve/CVE-2024-39488.html

* https://www.suse.com/security/cve/CVE-2024-39490.html

* https://www.suse.com/security/cve/CVE-2024-39494.html

* https://www.suse.com/security/cve/CVE-2024-39499.html

* https://www.suse.com/security/cve/CVE-2024-39501.html

* https://www.suse.com/security/cve/CVE-2024-39506.html

* https://www.suse.com/security/cve/CVE-2024-39507.html

* https://www.suse.com/security/cve/CVE-2024-39509.html

* https://www.suse.com/security/cve/CVE-2024-40901.html

* https://www.suse.com/security/cve/CVE-2024-40904.html

* https://www.suse.com/security/cve/CVE-2024-40912.html

* https://www.suse.com/security/cve/CVE-2024-40923.html

* https://www.suse.com/security/cve/CVE-2024-40929.html

* https://www.suse.com/security/cve/CVE-2024-40932.html

* https://www.suse.com/security/cve/CVE-2024-40937.html

* https://www.suse.com/security/cve/CVE-2024-40941.html

* https://www.suse.com/security/cve/CVE-2024-40942.html

* https://www.suse.com/security/cve/CVE-2024-40943.html

* https://www.suse.com/security/cve/CVE-2024-40953.html

* https://www.suse.com/security/cve/CVE-2024-40959.html

* https://www.suse.com/security/cve/CVE-2024-40966.html

* https://www.suse.com/security/cve/CVE-2024-40967.html

* https://www.suse.com/security/cve/CVE-2024-40978.html

* https://www.suse.com/security/cve/CVE-2024-40982.html

* https://www.suse.com/security/cve/CVE-2024-40987.html

* https://www.suse.com/security/cve/CVE-2024-40988.html

* https://www.suse.com/security/cve/CVE-2024-40990.html

* https://www.suse.com/security/cve/CVE-2024-40995.html

* https://www.suse.com/security/cve/CVE-2024-40998.html

* https://www.suse.com/security/cve/CVE-2024-40999.html

* https://www.suse.com/security/cve/CVE-2024-41014.html

* https://www.suse.com/security/cve/CVE-2024-41015.html

* https://www.suse.com/security/cve/CVE-2024-41016.html

* https://www.suse.com/security/cve/CVE-2024-41044.html

* https://www.suse.com/security/cve/CVE-2024-41048.html

* https://www.suse.com/security/cve/CVE-2024-41059.html

* https://www.suse.com/security/cve/CVE-2024-41060.html

* https://www.suse.com/security/cve/CVE-2024-41063.html

* https://www.suse.com/security/cve/CVE-2024-41064.html

* https://www.suse.com/security/cve/CVE-2024-41066.html

* https://www.suse.com/security/cve/CVE-2024-41070.html

* https://www.suse.com/security/cve/CVE-2024-41071.html

* https://www.suse.com/security/cve/CVE-2024-41072.html

* https://www.suse.com/security/cve/CVE-2024-41078.html

* https://www.suse.com/security/cve/CVE-2024-41081.html

* https://www.suse.com/security/cve/CVE-2024-41089.html

* https://www.suse.com/security/cve/CVE-2024-41090.html

* https://www.suse.com/security/cve/CVE-2024-41091.html

* https://www.suse.com/security/cve/CVE-2024-41095.html

* https://www.suse.com/security/cve/CVE-2024-42070.html

* https://www.suse.com/security/cve/CVE-2024-42093.html

* https://www.suse.com/security/cve/CVE-2024-42096.html

* https://www.suse.com/security/cve/CVE-2024-42119.html

* https://www.suse.com/security/cve/CVE-2024-42120.html

* https://www.suse.com/security/cve/CVE-2024-42124.html

* https://www.suse.com/security/cve/CVE-2024-42145.html

* https://www.suse.com/security/cve/CVE-2024-42223.html

* https://www.suse.com/security/cve/CVE-2024-42224.html

* https://bugzilla.suse.com/show_bug.cgi?id=1065729

* https://bugzilla.suse.com/show_bug.cgi?id=1088701

* https://bugzilla.suse.com/show_bug.cgi?id=1149446

* https://bugzilla.suse.com/show_bug.cgi?id=1179610

* https://bugzilla.suse.com/show_bug.cgi?id=1186463

* https://bugzilla.suse.com/show_bug.cgi?id=1196018

* https://bugzilla.suse.com/show_bug.cgi?id=1202346

* https://bugzilla.suse.com/show_bug.cgi?id=1216834

* https://bugzilla.suse.com/show_bug.cgi?id=1220138

* https://bugzilla.suse.com/show_bug.cgi?id=1220942

* https://bugzilla.suse.com/show_bug.cgi?id=1221045

* https://bugzilla.suse.com/show_bug.cgi?id=1221614

* https://bugzilla.suse.com/show_bug.cgi?id=1221616

* https://bugzilla.suse.com/show_bug.cgi?id=1221618

* https://bugzilla.suse.com/show_bug.cgi?id=1222060

* https://bugzilla.suse.com/show_bug.cgi?id=1222317

* https://bugzilla.suse.com/show_bug.cgi?id=1222326

* https://bugzilla.suse.com/show_bug.cgi?id=1222372

* https://bugzilla.suse.com/show_bug.cgi?id=1222625

* https://bugzilla.suse.com/show_bug.cgi?id=1222776

* https://bugzilla.suse.com/show_bug.cgi?id=1222824

* https://bugzilla.suse.com/show_bug.cgi?id=1222829

* https://bugzilla.suse.com/show_bug.cgi?id=1222866

* https://bugzilla.suse.com/show_bug.cgi?id=1223012

* https://bugzilla.suse.com/show_bug.cgi?id=1223778

* https://bugzilla.suse.com/show_bug.cgi?id=1223813

* https://bugzilla.suse.com/show_bug.cgi?id=1223815

* https://bugzilla.suse.com/show_bug.cgi?id=1224500

* https://bugzilla.suse.com/show_bug.cgi?id=1224512

* https://bugzilla.suse.com/show_bug.cgi?id=1224545

* https://bugzilla.suse.com/show_bug.cgi?id=1224557

* https://bugzilla.suse.com/show_bug.cgi?id=1224571

* https://bugzilla.suse.com/show_bug.cgi?id=1224576

* https://bugzilla.suse.com/show_bug.cgi?id=1224587

* https://bugzilla.suse.com/show_bug.cgi?id=1224637

* https://bugzilla.suse.com/show_bug.cgi?id=1224641

* https://bugzilla.suse.com/show_bug.cgi?id=1224663

* https://bugzilla.suse.com/show_bug.cgi?id=1224683

* https://bugzilla.suse.com/show_bug.cgi?id=1224699

* https://bugzilla.suse.com/show_bug.cgi?id=1224700

* https://bugzilla.suse.com/show_bug.cgi?id=1224975

* https://bugzilla.suse.com/show_bug.cgi?id=1225003

* https://bugzilla.suse.com/show_bug.cgi?id=1225214

* https://bugzilla.suse.com/show_bug.cgi?id=1225224

* https://bugzilla.suse.com/show_bug.cgi?id=1225229

* https://bugzilla.suse.com/show_bug.cgi?id=1225238

* https://bugzilla.suse.com/show_bug.cgi?id=1225241

* https://bugzilla.suse.com/show_bug.cgi?id=1225326

* https://bugzilla.suse.com/show_bug.cgi?id=1225328

* https://bugzilla.suse.com/show_bug.cgi?id=1225346

* https://bugzilla.suse.com/show_bug.cgi?id=1225361

* https://bugzilla.suse.com/show_bug.cgi?id=1225396

* https://bugzilla.suse.com/show_bug.cgi?id=1225427

* https://bugzilla.suse.com/show_bug.cgi?id=1225455

* https://bugzilla.suse.com/show_bug.cgi?id=1225711

* https://bugzilla.suse.com/show_bug.cgi?id=1225719

* https://bugzilla.suse.com/show_bug.cgi?id=1225767

* https://bugzilla.suse.com/show_bug.cgi?id=1225820

* https://bugzilla.suse.com/show_bug.cgi?id=1225838

* https://bugzilla.suse.com/show_bug.cgi?id=1225898

* https://bugzilla.suse.com/show_bug.cgi?id=1226550

* https://bugzilla.suse.com/show_bug.cgi?id=1226553

* https://bugzilla.suse.com/show_bug.cgi?id=1226555

* https://bugzilla.suse.com/show_bug.cgi?id=1226559

* https://bugzilla.suse.com/show_bug.cgi?id=1226568

* https://bugzilla.suse.com/show_bug.cgi?id=1226571

* https://bugzilla.suse.com/show_bug.cgi?id=1226645

* https://bugzilla.suse.com/show_bug.cgi?id=1226783

* https://bugzilla.suse.com/show_bug.cgi?id=1226786

* https://bugzilla.suse.com/show_bug.cgi?id=1226834

* https://bugzilla.suse.com/show_bug.cgi?id=1226908

* https://bugzilla.suse.com/show_bug.cgi?id=1227191

* https://bugzilla.suse.com/show_bug.cgi?id=1227213

* https://bugzilla.suse.com/show_bug.cgi?id=1227573

* https://bugzilla.suse.com/show_bug.cgi?id=1227618

* https://bugzilla.suse.com/show_bug.cgi?id=1227626

* https://bugzilla.suse.com/show_bug.cgi?id=1227716

* https://bugzilla.suse.com/show_bug.cgi?id=1227725

* https://bugzilla.suse.com/show_bug.cgi?id=1227729

* https://bugzilla.suse.com/show_bug.cgi?id=1227730

* https://bugzilla.suse.com/show_bug.cgi?id=1227733

* https://bugzilla.suse.com/show_bug.cgi?id=1227750

* https://bugzilla.suse.com/show_bug.cgi?id=1227754

* https://bugzilla.suse.com/show_bug.cgi?id=1227762

* https://bugzilla.suse.com/show_bug.cgi?id=1227770

* https://bugzilla.suse.com/show_bug.cgi?id=1227771

* https://bugzilla.suse.com/show_bug.cgi?id=1227772

* https://bugzilla.suse.com/show_bug.cgi?id=1227774

* https://bugzilla.suse.com/show_bug.cgi?id=1227786

* https://bugzilla.suse.com/show_bug.cgi?id=1227790

* https://bugzilla.suse.com/show_bug.cgi?id=1227806

* https://bugzilla.suse.com/show_bug.cgi?id=1227824

* https://bugzilla.suse.com/show_bug.cgi?id=1227828

* https://bugzilla.suse.com/show_bug.cgi?id=1227830

* https://bugzilla.suse.com/show_bug.cgi?id=1227836

* https://bugzilla.suse.com/show_bug.cgi?id=1227849

* https://bugzilla.suse.com/show_bug.cgi?id=1227865

* https://bugzilla.suse.com/show_bug.cgi?id=1227866

* https://bugzilla.suse.com/show_bug.cgi?id=1227884

* https://bugzilla.suse.com/show_bug.cgi?id=1227886

* https://bugzilla.suse.com/show_bug.cgi?id=1227891

* https://bugzilla.suse.com/show_bug.cgi?id=1227913

* https://bugzilla.suse.com/show_bug.cgi?id=1227924

* https://bugzilla.suse.com/show_bug.cgi?id=1227928

* https://bugzilla.suse.com/show_bug.cgi?id=1227929

* https://bugzilla.suse.com/show_bug.cgi?id=1227936

* https://bugzilla.suse.com/show_bug.cgi?id=1227957

* https://bugzilla.suse.com/show_bug.cgi?id=1227968

* https://bugzilla.suse.com/show_bug.cgi?id=1227969

* https://bugzilla.suse.com/show_bug.cgi?id=1227975

* https://bugzilla.suse.com/show_bug.cgi?id=1227985

* https://bugzilla.suse.com/show_bug.cgi?id=1227989

* https://bugzilla.suse.com/show_bug.cgi?id=1228003

* https://bugzilla.suse.com/show_bug.cgi?id=1228005

* https://bugzilla.suse.com/show_bug.cgi?id=1228008

* https://bugzilla.suse.com/show_bug.cgi?id=1228013

* https://bugzilla.suse.com/show_bug.cgi?id=1228025

* https://bugzilla.suse.com/show_bug.cgi?id=1228030

* https://bugzilla.suse.com/show_bug.cgi?id=1228037

* https://bugzilla.suse.com/show_bug.cgi?id=1228045

* https://bugzilla.suse.com/show_bug.cgi?id=1228054

* https://bugzilla.suse.com/show_bug.cgi?id=1228055

* https://bugzilla.suse.com/show_bug.cgi?id=1228063

* https://bugzilla.suse.com/show_bug.cgi?id=1228071

* https://bugzilla.suse.com/show_bug.cgi?id=1228235

* https://bugzilla.suse.com/show_bug.cgi?id=1228237

* https://bugzilla.suse.com/show_bug.cgi?id=1228327

* https://bugzilla.suse.com/show_bug.cgi?id=1228328

* https://bugzilla.suse.com/show_bug.cgi?id=1228408

* https://bugzilla.suse.com/show_bug.cgi?id=1228409

* https://bugzilla.suse.com/show_bug.cgi?id=1228410

* https://bugzilla.suse.com/show_bug.cgi?id=1228470

* https://bugzilla.suse.com/show_bug.cgi?id=1228530

* https://bugzilla.suse.com/show_bug.cgi?id=1228561

* https://bugzilla.suse.com/show_bug.cgi?id=1228565

* https://bugzilla.suse.com/show_bug.cgi?id=1228567

* https://bugzilla.suse.com/show_bug.cgi?id=1228580

* https://bugzilla.suse.com/show_bug.cgi?id=1228581

* https://bugzilla.suse.com/show_bug.cgi?id=1228584

* https://bugzilla.suse.com/show_bug.cgi?id=1228588

* https://bugzilla.suse.com/show_bug.cgi?id=1228599

* https://bugzilla.suse.com/show_bug.cgi?id=1228617

* https://bugzilla.suse.com/show_bug.cgi?id=1228625

* https://bugzilla.suse.com/show_bug.cgi?id=1228626

* https://bugzilla.suse.com/show_bug.cgi?id=1228633

* https://bugzilla.suse.com/show_bug.cgi?id=1228640

* https://bugzilla.suse.com/show_bug.cgi?id=1228655

* https://bugzilla.suse.com/show_bug.cgi?id=1228658

* https://bugzilla.suse.com/show_bug.cgi?id=1228662

* https://bugzilla.suse.com/show_bug.cgi?id=1228680

* https://bugzilla.suse.com/show_bug.cgi?id=1228705

* https://bugzilla.suse.com/show_bug.cgi?id=1228723

* https://bugzilla.suse.com/show_bug.cgi?id=1228726

* https://bugzilla.suse.com/show_bug.cgi?id=1228743

* https://bugzilla.suse.com/show_bug.cgi?id=1228850

Severity
Announcement ID: SUSE-SU-2024:2940-1
Rating: important

Related News