Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:0926-1
Distribution: SUSE
Plattformen: SUSE Manager Retail Branch Server 4.1, SUSE Manager Server 4.1, SUSE Manager Proxy 4.1, SUSE Linux Enterprise Server 15 SP2, SUSE Linux Enterprise Server for SAP Applications 15 SP2, SUSE Linux Enterprise High Performance Computing 15 SP2, SUSE Linux Enterprise High Availability Extension 15 SP2, SUSE Linux Enterprise Live Patching 15-SP2, SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
Datum: Fr, 22. März 2024, 18:57
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47060
Applikationen: Linux

Originalnachricht

--===============1400458892502345046==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:0926-1
Rating: important
References:

* bsc#1155518
* bsc#1184436
* bsc#1185988
* bsc#1186286
* bsc#1200599
* bsc#1212514
* bsc#1213456
* bsc#1218689
* bsc#1218915
* bsc#1219127
* bsc#1219128
* bsc#1219146
* bsc#1219295
* bsc#1219653
* bsc#1219827
* bsc#1219835
* bsc#1220009
* bsc#1220140
* bsc#1220187
* bsc#1220238
* bsc#1220240
* bsc#1220241
* bsc#1220243
* bsc#1220250
* bsc#1220253
* bsc#1220255
* bsc#1220328
* bsc#1220330
* bsc#1220344
* bsc#1220398
* bsc#1220409
* bsc#1220416
* bsc#1220418
* bsc#1220421
* bsc#1220436
* bsc#1220444
* bsc#1220459
* bsc#1220469
* bsc#1220482
* bsc#1220526
* bsc#1220538
* bsc#1220570
* bsc#1220572
* bsc#1220599
* bsc#1220627
* bsc#1220641
* bsc#1220649
* bsc#1220660
* bsc#1220700
* bsc#1220735
* bsc#1220736
* bsc#1220737
* bsc#1220742
* bsc#1220745
* bsc#1220767
* bsc#1220796
* bsc#1220825
* bsc#1220826
* bsc#1220831
* bsc#1220845
* bsc#1220860
* bsc#1220863
* bsc#1220870
* bsc#1220917
* bsc#1220918
* bsc#1220930
* bsc#1220931
* bsc#1220932
* bsc#1221039
* bsc#1221040
* bsc#1221287


Cross-References:

* CVE-2019-25162
* CVE-2020-36777
* CVE-2020-36784
* CVE-2021-46904
* CVE-2021-46905
* CVE-2021-46906
* CVE-2021-46915
* CVE-2021-46924
* CVE-2021-46929
* CVE-2021-46932
* CVE-2021-46934
* CVE-2021-46953
* CVE-2021-46964
* CVE-2021-46966
* CVE-2021-46974
* CVE-2021-46989
* CVE-2021-47005
* CVE-2021-47012
* CVE-2021-47013
* CVE-2021-47054
* CVE-2021-47060
* CVE-2021-47061
* CVE-2021-47069
* CVE-2021-47076
* CVE-2021-47078
* CVE-2021-47083
* CVE-2022-20154
* CVE-2022-48627
* CVE-2023-28746
* CVE-2023-35827
* CVE-2023-46343
* CVE-2023-51042
* CVE-2023-52340
* CVE-2023-52429
* CVE-2023-52439
* CVE-2023-52443
* CVE-2023-52445
* CVE-2023-52448
* CVE-2023-52449
* CVE-2023-52451
* CVE-2023-52463
* CVE-2023-52475
* CVE-2023-52478
* CVE-2023-52482
* CVE-2023-52502
* CVE-2023-52530
* CVE-2023-52531
* CVE-2023-52532
* CVE-2023-52569
* CVE-2023-52574
* CVE-2023-52597
* CVE-2023-52605
* CVE-2024-0340
* CVE-2024-0607
* CVE-2024-1151
* CVE-2024-23849
* CVE-2024-23851
* CVE-2024-26585
* CVE-2024-26586
* CVE-2024-26589
* CVE-2024-26593
* CVE-2024-26595
* CVE-2024-26602
* CVE-2024-26607
* CVE-2024-26622


CVSS scores:

* CVE-2019-25162 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2020-36777 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2020-36784 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46905 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-46906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-46915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46924 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46929 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-46932 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-46934 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-46953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46974 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2021-47005 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47012 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47054 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47060 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47078 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47083 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2022-20154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-20154 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48627 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-46343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-46343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52439 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52439 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52443 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52445 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52445 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52448 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52449 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52451 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52451 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52475 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52478 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52482 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52531 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52597 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52605 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-0607 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-0607 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-1151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-23849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23851 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26589 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26589 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26607 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H


Affected Products:

* SUSE Linux Enterprise High Availability Extension 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Manager Proxy 4.1
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Server 4.1



An update that solves 65 vulnerabilities and has six security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2021-47078: Fixed a bug by clearing all QP fields if creation failed
(bsc#1220863)
* CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey was
supplied (bsc#1220860)
* CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
* CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).
* CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
insert delayed dir index item (bsc#1220918).
* CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors
(bsc#1220735).
* CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
* CVE-2022-48627: Fixed a memory overlapping when deleting chars in the
buffer
(bsc#1220845).
* CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
* CVE-2021-46934: Fixed a bug by validating user data in compat ioctl
(bsc#1220469).
* CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
(bsc#1212514).
* CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
* CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
(bsc#1220930).
* CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
* CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek:
(bsc#1220917).
* CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
* CVE-2024-26589: Fixed out of bounds read due to variable offset alu on
PTR_TO_FLOW_KEYS (bsc#1220255).
* CVE-2021-47005: Fixed a NULL pointer dereference for ->get_features()
(bsc#1220660).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220187).
* CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
Linux kernel by forcing 100% CPU (bsc#1219295).
* CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval()
(bsc#1218915).
* CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones
if the bus is destroyed (bsc#1220742).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control()
(bsc#1220825).
* CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
* CVE-2021-46932: Fixed missing work initialization before device
registration
(bsc#1220444)
* CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
* CVE-2021-47012: Fixed a use after free in siw_alloc_mr (bsc#1220627).
* CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl
notifier
(bsc#1220238).
* CVE-2023-52475: Fixed use-after-free in powermate_config_complete
(bsc#1220649)
* CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
* CVE-2021-46989: Fixed a bug by preventing corruption in shrinking truncate
in hfsplus (bsc#1220737).
* CVE-2021-46915: Fixed a bug to avoid possible divide error in
nft_limit_init
(bsc#1220436).
* CVE-2021-46924: Fixed fix memory leak in device probe and remove
(bsc#1220459)
* CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
* CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails
(bsc#1220570).
* CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister
failure _after_ sync'ing SRCU (bsc#1220745).
* CVE-2023-52445: Fixed use after free on context disconnection
(bsc#1220241).
* CVE-2023-46343: Fixed a NULL pointer dereference in send_acknowledge()
(CVE-2023-46343).
* CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
* CVE-2023-52443: Fixed crash when parsed profile name is empty
(bsc#1220240).
* CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
* CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
* CVE-2021-47013: Fixed a use after free in emac_mac_tx_buf_send
(bsc#1220641).
* CVE-2024-26586: Fixed stack corruption (bsc#1220243).
* CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
* CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump
(bsc#1220253).
* CVE-2024-1151: Fixed unlimited number of recursions from action sets
(bsc#1219835).
* CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv
(bsc#1219127).
* CVE-2024-0340: Fixed information disclosure in
vhost/vhost.c:vhost_new_msg()
(bsc#1218689).
* CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in
drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).

The following non-security bugs were fixed:

* EDAC/thunderx: Fix possible out-of-bounds string access (bsc#1220330)
* KVM: Destroy target device if coalesced MMIO unregistration fails (git-
fixes).
* KVM: mmio: Fix use-after-free Read in
kvm_vm_ioctl_unregister_coalesced_mmio
(git-fixes).
* KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
* KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-
fixes).
* KVM: x86: add support for CPUID leaf 0x80000021 (git-fixes).
* KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
(git-fixes).
* KVM: x86: synthesize CPUID leaf 0x80000021h if useful (git-fixes).
* KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
* x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
* x86/bugs: Add asm helpers for executing VERW (git-fixes).
* x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-
fixes).
* x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (git-fixes).
* x86/entry_32: Add VERW just before userspace transition (git-fixes).
* x86/entry_64: Add VERW just before userspace transition (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-926=1

* SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-926=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-926=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-926=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-926=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP2 (nosrc)
* kernel-default-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.3.18-150200.24.183.1
* kernel-livepatch-SLE15-SP2_Update_46-debugsource-1-150200.5.3.2
* kernel-default-debuginfo-5.3.18-150200.24.183.1
* kernel-default-livepatch-5.3.18-150200.24.183.1
* kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-1-150200.5.3.2
* kernel-livepatch-5_3_18-150200_24_183-default-1-150200.5.3.2
* kernel-default-debugsource-5.3.18-150200.24.183.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-5.3.18-150200.24.183.1
* gfs2-kmp-default-5.3.18-150200.24.183.1
* ocfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1
* cluster-md-kmp-default-debuginfo-5.3.18-150200.24.183.1
* dlm-kmp-default-debuginfo-5.3.18-150200.24.183.1
* kernel-default-debuginfo-5.3.18-150200.24.183.1
* gfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1
* kernel-default-debugsource-5.3.18-150200.24.183.1
* ocfs2-kmp-default-5.3.18-150200.24.183.1
* dlm-kmp-default-5.3.18-150200.24.183.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc)
* kernel-default-5.3.18-150200.24.183.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(aarch64
nosrc x86_64)
* kernel-preempt-5.3.18-150200.24.183.1
* kernel-default-5.3.18-150200.24.183.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(aarch64
x86_64)
* kernel-default-devel-5.3.18-150200.24.183.1
* kernel-preempt-devel-5.3.18-150200.24.183.1
* kernel-preempt-debuginfo-5.3.18-150200.24.183.1
* kernel-syms-5.3.18-150200.24.183.1
* kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2
* kernel-obs-build-5.3.18-150200.24.183.1
* kernel-obs-build-debugsource-5.3.18-150200.24.183.1
* kernel-default-debuginfo-5.3.18-150200.24.183.1
* kernel-preempt-debugsource-5.3.18-150200.24.183.1
* kernel-default-devel-debuginfo-5.3.18-150200.24.183.1
* kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1
* kernel-default-debugsource-5.3.18-150200.24.183.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(noarch)
* kernel-devel-5.3.18-150200.24.183.1
* kernel-macros-5.3.18-150200.24.183.1
* kernel-source-5.3.18-150200.24.183.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch
nosrc)
* kernel-docs-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-5.3.18-150200.24.183.1
* reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1
* kernel-syms-5.3.18-150200.24.183.1
* kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2
* kernel-obs-build-5.3.18-150200.24.183.1
* kernel-obs-build-debugsource-5.3.18-150200.24.183.1
* kernel-default-debuginfo-5.3.18-150200.24.183.1
* kernel-default-devel-debuginfo-5.3.18-150200.24.183.1
* reiserfs-kmp-default-5.3.18-150200.24.183.1
* kernel-default-debugsource-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* kernel-devel-5.3.18-150200.24.183.1
* kernel-macros-5.3.18-150200.24.183.1
* kernel-source-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc)
* kernel-docs-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
* kernel-preempt-devel-5.3.18-150200.24.183.1
* kernel-preempt-debugsource-5.3.18-150200.24.183.1
* kernel-preempt-debuginfo-5.3.18-150200.24.183.1
* kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* kernel-default-devel-5.3.18-150200.24.183.1
* reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1
* kernel-syms-5.3.18-150200.24.183.1
* kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2
* kernel-obs-build-5.3.18-150200.24.183.1
* kernel-obs-build-debugsource-5.3.18-150200.24.183.1
* kernel-default-debuginfo-5.3.18-150200.24.183.1
* kernel-default-devel-debuginfo-5.3.18-150200.24.183.1
* reiserfs-kmp-default-5.3.18-150200.24.183.1
* kernel-default-debugsource-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* kernel-devel-5.3.18-150200.24.183.1
* kernel-macros-5.3.18-150200.24.183.1
* kernel-source-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc)
* kernel-docs-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64)
* kernel-preempt-5.3.18-150200.24.183.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* kernel-preempt-devel-5.3.18-150200.24.183.1
* kernel-preempt-debugsource-5.3.18-150200.24.183.1
* kernel-preempt-debuginfo-5.3.18-150200.24.183.1
* kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1

## References:

* https://www.suse.com/security/cve/CVE-2019-25162.html
* https://www.suse.com/security/cve/CVE-2020-36777.html
* https://www.suse.com/security/cve/CVE-2020-36784.html
* https://www.suse.com/security/cve/CVE-2021-46904.html
* https://www.suse.com/security/cve/CVE-2021-46905.html
* https://www.suse.com/security/cve/CVE-2021-46906.html
* https://www.suse.com/security/cve/CVE-2021-46915.html
* https://www.suse.com/security/cve/CVE-2021-46924.html
* https://www.suse.com/security/cve/CVE-2021-46929.html
* https://www.suse.com/security/cve/CVE-2021-46932.html
* https://www.suse.com/security/cve/CVE-2021-46934.html
* https://www.suse.com/security/cve/CVE-2021-46953.html
* https://www.suse.com/security/cve/CVE-2021-46964.html
* https://www.suse.com/security/cve/CVE-2021-46966.html
* https://www.suse.com/security/cve/CVE-2021-46974.html
* https://www.suse.com/security/cve/CVE-2021-46989.html
* https://www.suse.com/security/cve/CVE-2021-47005.html
* https://www.suse.com/security/cve/CVE-2021-47012.html
* https://www.suse.com/security/cve/CVE-2021-47013.html
* https://www.suse.com/security/cve/CVE-2021-47054.html
* https://www.suse.com/security/cve/CVE-2021-47060.html
* https://www.suse.com/security/cve/CVE-2021-47061.html
* https://www.suse.com/security/cve/CVE-2021-47069.html
* https://www.suse.com/security/cve/CVE-2021-47076.html
* https://www.suse.com/security/cve/CVE-2021-47078.html
* https://www.suse.com/security/cve/CVE-2021-47083.html
* https://www.suse.com/security/cve/CVE-2022-20154.html
* https://www.suse.com/security/cve/CVE-2022-48627.html
* https://www.suse.com/security/cve/CVE-2023-28746.html
* https://www.suse.com/security/cve/CVE-2023-35827.html
* https://www.suse.com/security/cve/CVE-2023-46343.html
* https://www.suse.com/security/cve/CVE-2023-51042.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2023-52429.html
* https://www.suse.com/security/cve/CVE-2023-52439.html
* https://www.suse.com/security/cve/CVE-2023-52443.html
* https://www.suse.com/security/cve/CVE-2023-52445.html
* https://www.suse.com/security/cve/CVE-2023-52448.html
* https://www.suse.com/security/cve/CVE-2023-52449.html
* https://www.suse.com/security/cve/CVE-2023-52451.html
* https://www.suse.com/security/cve/CVE-2023-52463.html
* https://www.suse.com/security/cve/CVE-2023-52475.html
* https://www.suse.com/security/cve/CVE-2023-52478.html
* https://www.suse.com/security/cve/CVE-2023-52482.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52530.html
* https://www.suse.com/security/cve/CVE-2023-52531.html
* https://www.suse.com/security/cve/CVE-2023-52532.html
* https://www.suse.com/security/cve/CVE-2023-52569.html
* https://www.suse.com/security/cve/CVE-2023-52574.html
* https://www.suse.com/security/cve/CVE-2023-52597.html
* https://www.suse.com/security/cve/CVE-2023-52605.html
* https://www.suse.com/security/cve/CVE-2024-0340.html
* https://www.suse.com/security/cve/CVE-2024-0607.html
* https://www.suse.com/security/cve/CVE-2024-1151.html
* https://www.suse.com/security/cve/CVE-2024-23849.html
* https://www.suse.com/security/cve/CVE-2024-23851.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26586.html
* https://www.suse.com/security/cve/CVE-2024-26589.html
* https://www.suse.com/security/cve/CVE-2024-26593.html
* https://www.suse.com/security/cve/CVE-2024-26595.html
* https://www.suse.com/security/cve/CVE-2024-26602.html
* https://www.suse.com/security/cve/CVE-2024-26607.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://bugzilla.suse.com/show_bug.cgi?id=1155518
* https://bugzilla.suse.com/show_bug.cgi?id=1184436
* https://bugzilla.suse.com/show_bug.cgi?id=1185988
* https://bugzilla.suse.com/show_bug.cgi?id=1186286
* https://bugzilla.suse.com/show_bug.cgi?id=1200599
* https://bugzilla.suse.com/show_bug.cgi?id=1212514
* https://bugzilla.suse.com/show_bug.cgi?id=1213456
* https://bugzilla.suse.com/show_bug.cgi?id=1218689
* https://bugzilla.suse.com/show_bug.cgi?id=1218915
* https://bugzilla.suse.com/show_bug.cgi?id=1219127
* https://bugzilla.suse.com/show_bug.cgi?id=1219128
* https://bugzilla.suse.com/show_bug.cgi?id=1219146
* https://bugzilla.suse.com/show_bug.cgi?id=1219295
* https://bugzilla.suse.com/show_bug.cgi?id=1219653
* https://bugzilla.suse.com/show_bug.cgi?id=1219827
* https://bugzilla.suse.com/show_bug.cgi?id=1219835
* https://bugzilla.suse.com/show_bug.cgi?id=1220009
* https://bugzilla.suse.com/show_bug.cgi?id=1220140
* https://bugzilla.suse.com/show_bug.cgi?id=1220187
* https://bugzilla.suse.com/show_bug.cgi?id=1220238
* https://bugzilla.suse.com/show_bug.cgi?id=1220240
* https://bugzilla.suse.com/show_bug.cgi?id=1220241
* https://bugzilla.suse.com/show_bug.cgi?id=1220243
* https://bugzilla.suse.com/show_bug.cgi?id=1220250
* https://bugzilla.suse.com/show_bug.cgi?id=1220253
* https://bugzilla.suse.com/show_bug.cgi?id=1220255
* https://bugzilla.suse.com/show_bug.cgi?id=1220328
* https://bugzilla.suse.com/show_bug.cgi?id=1220330
* https://bugzilla.suse.com/show_bug.cgi?id=1220344
* https://bugzilla.suse.com/show_bug.cgi?id=1220398
* https://bugzilla.suse.com/show_bug.cgi?id=1220409
* https://bugzilla.suse.com/show_bug.cgi?id=1220416
* https://bugzilla.suse.com/show_bug.cgi?id=1220418
* https://bugzilla.suse.com/show_bug.cgi?id=1220421
* https://bugzilla.suse.com/show_bug.cgi?id=1220436
* https://bugzilla.suse.com/show_bug.cgi?id=1220444
* https://bugzilla.suse.com/show_bug.cgi?id=1220459
* https://bugzilla.suse.com/show_bug.cgi?id=1220469
* https://bugzilla.suse.com/show_bug.cgi?id=1220482
* https://bugzilla.suse.com/show_bug.cgi?id=1220526
* https://bugzilla.suse.com/show_bug.cgi?id=1220538
* https://bugzilla.suse.com/show_bug.cgi?id=1220570
* https://bugzilla.suse.com/show_bug.cgi?id=1220572
* https://bugzilla.suse.com/show_bug.cgi?id=1220599
* https://bugzilla.suse.com/show_bug.cgi?id=1220627
* https://bugzilla.suse.com/show_bug.cgi?id=1220641
* https://bugzilla.suse.com/show_bug.cgi?id=1220649
* https://bugzilla.suse.com/show_bug.cgi?id=1220660
* https://bugzilla.suse.com/show_bug.cgi?id=1220700
* https://bugzilla.suse.com/show_bug.cgi?id=1220735
* https://bugzilla.suse.com/show_bug.cgi?id=1220736
* https://bugzilla.suse.com/show_bug.cgi?id=1220737
* https://bugzilla.suse.com/show_bug.cgi?id=1220742
* https://bugzilla.suse.com/show_bug.cgi?id=1220745
* https://bugzilla.suse.com/show_bug.cgi?id=1220767
* https://bugzilla.suse.com/show_bug.cgi?id=1220796
* https://bugzilla.suse.com/show_bug.cgi?id=1220825
* https://bugzilla.suse.com/show_bug.cgi?id=1220826
* https://bugzilla.suse.com/show_bug.cgi?id=1220831
* https://bugzilla.suse.com/show_bug.cgi?id=1220845
* https://bugzilla.suse.com/show_bug.cgi?id=1220860
* https://bugzilla.suse.com/show_bug.cgi?id=1220863
* https://bugzilla.suse.com/show_bug.cgi?id=1220870
* https://bugzilla.suse.com/show_bug.cgi?id=1220917
* https://bugzilla.suse.com/show_bug.cgi?id=1220918
* https://bugzilla.suse.com/show_bug.cgi?id=1220930
* https://bugzilla.suse.com/show_bug.cgi?id=1220931
* https://bugzilla.suse.com/show_bug.cgi?id=1220932
* https://bugzilla.suse.com/show_bug.cgi?id=1221039
* https://bugzilla.suse.com/show_bug.cgi?id=1221040
* https://bugzilla.suse.com/show_bug.cgi?id=1221287


--===============1400458892502345046==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:0926-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1155518">bsc#1155518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184436">bsc#1184436</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1185988">bsc#1185988</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186286">bsc#1186286</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200599">bsc#1200599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">bsc#1212514</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">bsc#1213456</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218689">bsc#1218689</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218915">bsc#1218915</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219127">bsc#1219127</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219128">bsc#1219128</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219146">bsc#1219146</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219295">bsc#1219295</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219653">bsc#1219653</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219827">bsc#1219827</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219835">bsc#1219835</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220009">bsc#1220009</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220140">bsc#1220140</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">bsc#1220187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220238">bsc#1220238</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220240">bsc#1220240</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220241">bsc#1220241</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220243">bsc#1220243</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220250">bsc#1220250</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220253">bsc#1220253</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220255">bsc#1220255</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">bsc#1220328</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220330">bsc#1220330</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220344">bsc#1220344</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220398">bsc#1220398</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220409">bsc#1220409</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220416">bsc#1220416</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220418">bsc#1220418</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220421">bsc#1220421</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220436">bsc#1220436</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220444">bsc#1220444</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220459">bsc#1220459</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220469">bsc#1220469</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220482">bsc#1220482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220526">bsc#1220526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220538">bsc#1220538</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220570">bsc#1220570</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220572">bsc#1220572</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220599">bsc#1220599</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220627">bsc#1220627</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220641">bsc#1220641</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220649">bsc#1220649</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220660">bsc#1220660</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220700">bsc#1220700</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220735">bsc#1220735</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220736">bsc#1220736</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220737">bsc#1220737</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220742">bsc#1220742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">bsc#1220745</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220767">bsc#1220767</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220796">bsc#1220796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220825">bsc#1220825</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220826">bsc#1220826</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220831">bsc#1220831</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220845">bsc#1220845</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220860">bsc#1220860</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220863">bsc#1220863</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220870">bsc#1220870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220917">bsc#1220917</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220918">bsc#1220918</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220930">bsc#1220930</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220931">bsc#1220931</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220932">bsc#1220932</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221039">bsc#1221039</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221040">bsc#1221040</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221287">bsc#1221287</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2019-25162.html">CVE-2019-25162</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-36777.html">CVE-2020-36777</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-36784.html">CVE-2020-36784</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46904.html">CVE-2021-46904</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46905.html">CVE-2021-46905</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46906.html">CVE-2021-46906</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46915.html">CVE-2021-46915</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46924.html">CVE-2021-46924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46929.html">CVE-2021-46929</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46932.html">CVE-2021-46932</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46934.html">CVE-2021-46934</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46953.html">CVE-2021-46953</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46964.html">CVE-2021-46964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46966.html">CVE-2021-46966</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46974.html">CVE-2021-46974</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46989.html">CVE-2021-46989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47005.html">CVE-2021-47005</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47012.html">CVE-2021-47012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47013.html">CVE-2021-47013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47054.html">CVE-2021-47054</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47060.html">CVE-2021-47060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47061.html">CVE-2021-47061</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47069.html">CVE-2021-47069</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47076.html">CVE-2021-47076</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47078.html">CVE-2021-47078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47083.html">CVE-2021-47083</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-20154.html">CVE-2022-20154</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48627.html">CVE-2022-48627</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">CVE-2023-28746</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-35827.html">CVE-2023-35827</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-46343.html">CVE-2023-46343</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-51042.html">CVE-2023-51042</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52340.html">CVE-2023-52340</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52429.html">CVE-2023-52429</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52439.html">CVE-2023-52439</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52443.html">CVE-2023-52443</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52445.html">CVE-2023-52445</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52448.html">CVE-2023-52448</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52449.html">CVE-2023-52449</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52451.html">CVE-2023-52451</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52463.html">CVE-2023-52463</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52475.html">CVE-2023-52475</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52478.html">CVE-2023-52478</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52482.html">CVE-2023-52482</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52502.html">CVE-2023-52502</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52530.html">CVE-2023-52530</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52531.html">CVE-2023-52531</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52532.html">CVE-2023-52532</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52569.html">CVE-2023-52569</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52574.html">CVE-2023-52574</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52597.html">CVE-2023-52597</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52605.html">CVE-2023-52605</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0340.html">CVE-2024-0340</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0607.html">CVE-2024-0607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-1151.html">CVE-2024-1151</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23849.html">CVE-2024-23849</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23851.html">CVE-2024-23851</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">CVE-2024-26585</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26586.html">CVE-2024-26586</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26589.html">CVE-2024-26589</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26593.html">CVE-2024-26593</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26595.html">CVE-2024-26595</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26602.html">CVE-2024-26602</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26607.html">CVE-2024-26607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26622.html">CVE-2024-26622</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2019-25162</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36784</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46904</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46905</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46906</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46915</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46929</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46932</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46934</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46953</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-46974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47005</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47054</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47061</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47069</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47076</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47083</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-20154</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-20154</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48627</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-28746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-35827</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-46343</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-46343</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-51042</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-51042</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52340</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52429</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52429</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52439</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52439</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52443</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52443</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52445</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52445</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52448</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52448</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52449</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52449</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52451</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52451</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52463</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52475</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52478</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52482</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52502</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52530</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52531</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52532</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52569</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52574</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52597</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52605</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0340</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0340</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0607</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-1151</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23849</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23849</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23851</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23851</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26585</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26586</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26586</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26589</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26589</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26593</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26595</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26602</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26622</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise High Availability Extension 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2 Business Critical Linux 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP2</li>

<li class="list-group-item">SUSE Manager
Proxy 4.1</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.1</li>

<li class="list-group-item">SUSE Manager
Server 4.1</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 65 vulnerabilities and has six security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP2 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-47078: Fixed a bug by clearing all QP fields if creation
failed (bsc#1220863)</li>
<li>CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey
was supplied (bsc#1220860)</li>
<li>CVE-2023-52605: Fixed a NULL pointer dereference check
(bsc#1221039)</li>
<li>CVE-2023-28746: Fixed Register File Data Sampling
(bsc#1213456).</li>
<li>CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220831).</li>
<li>CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure
to insert delayed dir index item (bsc#1220918).</li>
<li>CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon
processors (bsc#1220735).</li>
<li>CVE-2023-52597: Fixed a setting of fpc register in KVM
(bsc#1221040).</li>
<li>CVE-2022-48627: Fixed a memory overlapping when deleting chars in the
buffer (bsc#1220845).</li>
<li>CVE-2023-52574: Fixed a bug by hiding new member header_ops
(bsc#1220870).</li>
<li>CVE-2021-46934: Fixed a bug by validating user data in compat ioctl
(bsc#1220469).</li>
<li>CVE-2023-35827: Fixed a use-after-free issue in
ravb_tx_timeout_work() (bsc#1212514).</li>
<li>CVE-2023-52532: Fixed a bug in TX CQE error handling
(bsc#1220932).</li>
<li>CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
(bsc#1220930).</li>
<li>CVE-2023-52531: Fixed a memory corruption issue in iwlwifi
(bsc#1220931).</li>
<li>CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek:
(bsc#1220917).</li>
<li>CVE-2024-26607: Fixed a probing race issue in sii902x:
(bsc#1220736).</li>
<li>CVE-2024-26589: Fixed out of bounds read due to variable offset alu
on PTR_TO_FLOW_KEYS (bsc#1220255).</li>
<li>CVE-2021-47005: Fixed a NULL pointer dereference for
-&gt;get_features() (bsc#1220660).</li>
<li>CVE-2024-26585: Fixed race between tx work scheduling and socket
close (bsc#1220187).</li>
<li>CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of
the Linux kernel by forcing 100% CPU (bsc#1219295).</li>
<li>CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval()
(bsc#1218915).</li>
<li>CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO
zones if the bus is destroyed (bsc#1220742).</li>
<li>CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control()
(bsc#1220825).</li>
<li>CVE-2023-52451: Fixed access beyond end of drmem array
(bsc#1220250).</li>
<li>CVE-2021-46932: Fixed missing work initialization before device
registration (bsc#1220444)</li>
<li>CVE-2023-52463: Fixed null pointer dereference in efivarfs
(bsc#1220328).</li>
<li>CVE-2021-47012: Fixed a use after free in siw_alloc_mr
(bsc#1220627).</li>
<li>CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl
notifier (bsc#1220238).</li>
<li>CVE-2023-52475: Fixed use-after-free in powermate_config_complete
(bsc#1220649)</li>
<li>CVE-2023-52478: Fixed kernel crash on receiver USB disconnect
(bsc#1220796)</li>
<li>CVE-2021-46989: Fixed a bug by preventing corruption in shrinking
truncate in hfsplus (bsc#1220737).</li>
<li>CVE-2021-46915: Fixed a bug to avoid possible divide error in
nft_limit_init (bsc#1220436).</li>
<li>CVE-2021-46924: Fixed fix memory leak in device probe and remove
(bsc#1220459)</li>
<li>CVE-2019-25162: Fixed a potential use after free
(bsc#1220409).</li>
<li>CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails
(bsc#1220570).</li>
<li>CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on
unregister failure <em>after</em> sync&#x27;ing SRCU (bsc#1220745).</li>
<li>CVE-2023-52445: Fixed use after free on context disconnection
(bsc#1220241).</li>
<li>CVE-2023-46343: Fixed a NULL pointer dereference in
send_acknowledge() (CVE-2023-46343).</li>
<li>CVE-2023-52439: Fixed use-after-free in uio_open
(bsc#1220140).</li>
<li>CVE-2023-52443: Fixed crash when parsed profile name is empty
(bsc#1220240).</li>
<li>CVE-2024-26602: Fixed overall slowdowns with sys_membarrier
(bsc1220398).</li>
<li>CVE-2024-26593: Fixed block process call transactions
(bsc#1220009).</li>
<li>CVE-2021-47013: Fixed a use after free in emac_mac_tx_buf_send
(bsc#1220641).</li>
<li>CVE-2024-26586: Fixed stack corruption (bsc#1220243).</li>
<li>CVE-2024-26595: Fixed NULL pointer dereference in error path
(bsc#1220344).</li>
<li>CVE-2023-52448: Fixed kernel NULL pointer dereference in
gfs2_rgrp_dump (bsc#1220253).</li>
<li>CVE-2024-1151: Fixed unlimited number of recursions from action sets
(bsc#1219835).</li>
<li>CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv
(bsc#1219127).</li>
<li>CVE-2024-0340: Fixed information disclosure in
vhost/vhost.c:vhost_new_msg() (bsc#1218689).</li>
<li>CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in
drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>EDAC/thunderx: Fix possible out-of-bounds string access
(bsc#1220330)</li>
<li>KVM: Destroy target device if coalesced MMIO unregistration fails
(git-fixes).</li>
<li>KVM: mmio: Fix use-after-free Read in
kvm_vm_ioctl_unregister_coalesced_mmio (git-fixes).</li>
<li>KVM: VMX: Move VERW closer to VMentry for MDS mitigation
(git-fixes).</li>
<li>KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH
(git-fixes).</li>
<li>KVM: x86: add support for CPUID leaf 0x80000021
(git-fixes).</li>
<li>KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation
code (git-fixes).</li>
<li>KVM: x86: synthesize CPUID leaf 0x80000021h if useful
(git-fixes).</li>
<li>KVM: x86: work around QEMU issue with synthetic CPUID leaves
(git-fixes).</li>
<li>x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix
(git-fixes).</li>
<li>x86/bugs: Add asm helpers for executing VERW (git-fixes).</li>
<li>x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key
(git-fixes).</li>
<li>x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf
(git-fixes).</li>
<li>x86/entry_32: Add VERW just before userspace transition
(git-fixes).</li>
<li>x86/entry_64: Add VERW just before userspace transition
(git-fixes).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP2-2024-926=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HA-15-SP2-2024-926=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-926=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-926=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP2-2024-926=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise Live Patching 15-SP2 (nosrc)
<ul>


<li>kernel-default-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-livepatch-devel-5.3.18-150200.24.183.1</li>


<li>kernel-livepatch-SLE15-SP2_Update_46-debugsource-1-150200.5.3.2</li>


<li>kernel-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-default-livepatch-5.3.18-150200.24.183.1</li>


<li>kernel-livepatch-5_3_18-150200_24_183-default-debuginfo-1-150200.5.3.2</li>


<li>kernel-livepatch-5_3_18-150200_24_183-default-1-150200.5.3.2</li>


<li>kernel-default-debugsource-5.3.18-150200.24.183.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Availability Extension 15 SP2
(aarch64 ppc64le s390x x86_64)
<ul>


<li>cluster-md-kmp-default-5.3.18-150200.24.183.1</li>


<li>gfs2-kmp-default-5.3.18-150200.24.183.1</li>


<li>ocfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>cluster-md-kmp-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>dlm-kmp-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>gfs2-kmp-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-default-debugsource-5.3.18-150200.24.183.1</li>


<li>ocfs2-kmp-default-5.3.18-150200.24.183.1</li>


<li>dlm-kmp-default-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Availability Extension 15 SP2
(nosrc)
<ul>


<li>kernel-default-5.3.18-150200.24.183.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (aarch64 nosrc x86_64)
<ul>


<li>kernel-preempt-5.3.18-150200.24.183.1</li>


<li>kernel-default-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (aarch64 x86_64)
<ul>


<li>kernel-default-devel-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-devel-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-syms-5.3.18-150200.24.183.1</li>


<li>kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2</li>


<li>kernel-obs-build-5.3.18-150200.24.183.1</li>


<li>kernel-obs-build-debugsource-5.3.18-150200.24.183.1</li>


<li>kernel-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-debugsource-5.3.18-150200.24.183.1</li>


<li>kernel-default-devel-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-default-debugsource-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (noarch)
<ul>


<li>kernel-devel-5.3.18-150200.24.183.1</li>


<li>kernel-macros-5.3.18-150200.24.183.1</li>


<li>kernel-source-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (noarch nosrc)
<ul>


<li>kernel-docs-5.3.18-150200.24.183.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
ppc64le s390x x86_64 nosrc)
<ul>


<li>kernel-default-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
ppc64le s390x x86_64)
<ul>


<li>kernel-default-devel-5.3.18-150200.24.183.1</li>


<li>reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-syms-5.3.18-150200.24.183.1</li>


<li>kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2</li>


<li>kernel-obs-build-5.3.18-150200.24.183.1</li>


<li>kernel-obs-build-debugsource-5.3.18-150200.24.183.1</li>


<li>kernel-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-default-devel-debuginfo-5.3.18-150200.24.183.1</li>


<li>reiserfs-kmp-default-5.3.18-150200.24.183.1</li>


<li>kernel-default-debugsource-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
<ul>


<li>kernel-devel-5.3.18-150200.24.183.1</li>


<li>kernel-macros-5.3.18-150200.24.183.1</li>


<li>kernel-source-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch
nosrc)
<ul>


<li>kernel-docs-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
nosrc x86_64)
<ul>


<li>kernel-preempt-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
<ul>


<li>kernel-preempt-devel-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-debugsource-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(nosrc ppc64le x86_64)
<ul>


<li>kernel-default-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(ppc64le x86_64)
<ul>


<li>kernel-default-devel-5.3.18-150200.24.183.1</li>


<li>reiserfs-kmp-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-syms-5.3.18-150200.24.183.1</li>


<li>kernel-default-base-5.3.18-150200.24.183.1.150200.9.93.2</li>


<li>kernel-obs-build-5.3.18-150200.24.183.1</li>


<li>kernel-obs-build-debugsource-5.3.18-150200.24.183.1</li>


<li>kernel-default-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-default-devel-debuginfo-5.3.18-150200.24.183.1</li>


<li>reiserfs-kmp-default-5.3.18-150200.24.183.1</li>


<li>kernel-default-debugsource-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(noarch)
<ul>


<li>kernel-devel-5.3.18-150200.24.183.1</li>


<li>kernel-macros-5.3.18-150200.24.183.1</li>


<li>kernel-source-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(noarch nosrc)
<ul>


<li>kernel-docs-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(nosrc x86_64)
<ul>


<li>kernel-preempt-5.3.18-150200.24.183.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(x86_64)
<ul>


<li>kernel-preempt-devel-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-debugsource-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-debuginfo-5.3.18-150200.24.183.1</li>


<li>kernel-preempt-devel-debuginfo-5.3.18-150200.24.183.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2019-25162.html">https://www.suse.com/security/cve/CVE-2019-25162.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2020-36777.html">https://www.suse.com/security/cve/CVE-2020-36777.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2020-36784.html">https://www.suse.com/security/cve/CVE-2020-36784.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46904.html">https://www.suse.com/security/cve/CVE-2021-46904.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46905.html">https://www.suse.com/security/cve/CVE-2021-46905.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46906.html">https://www.suse.com/security/cve/CVE-2021-46906.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46915.html">https://www.suse.com/security/cve/CVE-2021-46915.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46924.html">https://www.suse.com/security/cve/CVE-2021-46924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46929.html">https://www.suse.com/security/cve/CVE-2021-46929.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46932.html">https://www.suse.com/security/cve/CVE-2021-46932.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46934.html">https://www.suse.com/security/cve/CVE-2021-46934.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46953.html">https://www.suse.com/security/cve/CVE-2021-46953.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46964.html">https://www.suse.com/security/cve/CVE-2021-46964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46966.html">https://www.suse.com/security/cve/CVE-2021-46966.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46974.html">https://www.suse.com/security/cve/CVE-2021-46974.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46989.html">https://www.suse.com/security/cve/CVE-2021-46989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47005.html">https://www.suse.com/security/cve/CVE-2021-47005.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47012.html">https://www.suse.com/security/cve/CVE-2021-47012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47013.html">https://www.suse.com/security/cve/CVE-2021-47013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47054.html">https://www.suse.com/security/cve/CVE-2021-47054.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47060.html">https://www.suse.com/security/cve/CVE-2021-47060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47061.html">https://www.suse.com/security/cve/CVE-2021-47061.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47069.html">https://www.suse.com/security/cve/CVE-2021-47069.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47076.html">https://www.suse.com/security/cve/CVE-2021-47076.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47078.html">https://www.suse.com/security/cve/CVE-2021-47078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47083.html">https://www.suse.com/security/cve/CVE-2021-47083.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-20154.html">https://www.suse.com/security/cve/CVE-2022-20154.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48627.html">https://www.suse.com/security/cve/CVE-2022-48627.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28746.html">https://www.suse.com/security/cve/CVE-2023-28746.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-35827.html">https://www.suse.com/security/cve/CVE-2023-35827.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-46343.html">https://www.suse.com/security/cve/CVE-2023-46343.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-51042.html">https://www.suse.com/security/cve/CVE-2023-51042.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52340.html">https://www.suse.com/security/cve/CVE-2023-52340.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52429.html">https://www.suse.com/security/cve/CVE-2023-52429.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52439.html">https://www.suse.com/security/cve/CVE-2023-52439.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52443.html">https://www.suse.com/security/cve/CVE-2023-52443.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52445.html">https://www.suse.com/security/cve/CVE-2023-52445.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52448.html">https://www.suse.com/security/cve/CVE-2023-52448.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52449.html">https://www.suse.com/security/cve/CVE-2023-52449.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52451.html">https://www.suse.com/security/cve/CVE-2023-52451.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52463.html">https://www.suse.com/security/cve/CVE-2023-52463.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52475.html">https://www.suse.com/security/cve/CVE-2023-52475.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52478.html">https://www.suse.com/security/cve/CVE-2023-52478.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52482.html">https://www.suse.com/security/cve/CVE-2023-52482.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52502.html">https://www.suse.com/security/cve/CVE-2023-52502.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52530.html">https://www.suse.com/security/cve/CVE-2023-52530.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52531.html">https://www.suse.com/security/cve/CVE-2023-52531.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52532.html">https://www.suse.com/security/cve/CVE-2023-52532.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52569.html">https://www.suse.com/security/cve/CVE-2023-52569.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52574.html">https://www.suse.com/security/cve/CVE-2023-52574.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52597.html">https://www.suse.com/security/cve/CVE-2023-52597.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52605.html">https://www.suse.com/security/cve/CVE-2023-52605.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0340.html">https://www.suse.com/security/cve/CVE-2024-0340.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0607.html">https://www.suse.com/security/cve/CVE-2024-0607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-1151.html">https://www.suse.com/security/cve/CVE-2024-1151.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23849.html">https://www.suse.com/security/cve/CVE-2024-23849.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23851.html">https://www.suse.com/security/cve/CVE-2024-23851.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26585.html">https://www.suse.com/security/cve/CVE-2024-26585.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26586.html">https://www.suse.com/security/cve/CVE-2024-26586.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26589.html">https://www.suse.com/security/cve/CVE-2024-26589.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26593.html">https://www.suse.com/security/cve/CVE-2024-26593.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26595.html">https://www.suse.com/security/cve/CVE-2024-26595.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26602.html">https://www.suse.com/security/cve/CVE-2024-26602.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26607.html">https://www.suse.com/security/cve/CVE-2024-26607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26622.html">https://www.suse.com/security/cve/CVE-2024-26622.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1155518">https://bugzilla.suse.com/show_bug.cgi?id=1155518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1184436">https://bugzilla.suse.com/show_bug.cgi?id=1184436</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1185988">https://bugzilla.suse.com/show_bug.cgi?id=1185988</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1186286">https://bugzilla.suse.com/show_bug.cgi?id=1186286</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1200599">https://bugzilla.suse.com/show_bug.cgi?id=1200599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">https://bugzilla.suse.com/show_bug.cgi?id=1212514</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">https://bugzilla.suse.com/show_bug.cgi?id=1213456</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218689">https://bugzilla.suse.com/show_bug.cgi?id=1218689</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218915">https://bugzilla.suse.com/show_bug.cgi?id=1218915</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219127">https://bugzilla.suse.com/show_bug.cgi?id=1219127</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219128">https://bugzilla.suse.com/show_bug.cgi?id=1219128</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219146">https://bugzilla.suse.com/show_bug.cgi?id=1219146</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219295">https://bugzilla.suse.com/show_bug.cgi?id=1219295</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219653">https://bugzilla.suse.com/show_bug.cgi?id=1219653</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219827">https://bugzilla.suse.com/show_bug.cgi?id=1219827</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219835">https://bugzilla.suse.com/show_bug.cgi?id=1219835</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220009">https://bugzilla.suse.com/show_bug.cgi?id=1220009</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220140">https://bugzilla.suse.com/show_bug.cgi?id=1220140</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220187">https://bugzilla.suse.com/show_bug.cgi?id=1220187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220238">https://bugzilla.suse.com/show_bug.cgi?id=1220238</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220240">https://bugzilla.suse.com/show_bug.cgi?id=1220240</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220241">https://bugzilla.suse.com/show_bug.cgi?id=1220241</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220243">https://bugzilla.suse.com/show_bug.cgi?id=1220243</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220250">https://bugzilla.suse.com/show_bug.cgi?id=1220250</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220253">https://bugzilla.suse.com/show_bug.cgi?id=1220253</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220255">https://bugzilla.suse.com/show_bug.cgi?id=1220255</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220328">https://bugzilla.suse.com/show_bug.cgi?id=1220328</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220330">https://bugzilla.suse.com/show_bug.cgi?id=1220330</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220344">https://bugzilla.suse.com/show_bug.cgi?id=1220344</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220398">https://bugzilla.suse.com/show_bug.cgi?id=1220398</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220409">https://bugzilla.suse.com/show_bug.cgi?id=1220409</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220416">https://bugzilla.suse.com/show_bug.cgi?id=1220416</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220418">https://bugzilla.suse.com/show_bug.cgi?id=1220418</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220421">https://bugzilla.suse.com/show_bug.cgi?id=1220421</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220436">https://bugzilla.suse.com/show_bug.cgi?id=1220436</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220444">https://bugzilla.suse.com/show_bug.cgi?id=1220444</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220459">https://bugzilla.suse.com/show_bug.cgi?id=1220459</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220469">https://bugzilla.suse.com/show_bug.cgi?id=1220469</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220482">https://bugzilla.suse.com/show_bug.cgi?id=1220482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220526">https://bugzilla.suse.com/show_bug.cgi?id=1220526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220538">https://bugzilla.suse.com/show_bug.cgi?id=1220538</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220570">https://bugzilla.suse.com/show_bug.cgi?id=1220570</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220572">https://bugzilla.suse.com/show_bug.cgi?id=1220572</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220599">https://bugzilla.suse.com/show_bug.cgi?id=1220599</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220627">https://bugzilla.suse.com/show_bug.cgi?id=1220627</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220641">https://bugzilla.suse.com/show_bug.cgi?id=1220641</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220649">https://bugzilla.suse.com/show_bug.cgi?id=1220649</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220660">https://bugzilla.suse.com/show_bug.cgi?id=1220660</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220700">https://bugzilla.suse.com/show_bug.cgi?id=1220700</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220735">https://bugzilla.suse.com/show_bug.cgi?id=1220735</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220736">https://bugzilla.suse.com/show_bug.cgi?id=1220736</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220737">https://bugzilla.suse.com/show_bug.cgi?id=1220737</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220742">https://bugzilla.suse.com/show_bug.cgi?id=1220742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">https://bugzilla.suse.com/show_bug.cgi?id=1220745</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220767">https://bugzilla.suse.com/show_bug.cgi?id=1220767</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220796">https://bugzilla.suse.com/show_bug.cgi?id=1220796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220825">https://bugzilla.suse.com/show_bug.cgi?id=1220825</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220826">https://bugzilla.suse.com/show_bug.cgi?id=1220826</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220831">https://bugzilla.suse.com/show_bug.cgi?id=1220831</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220845">https://bugzilla.suse.com/show_bug.cgi?id=1220845</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220860">https://bugzilla.suse.com/show_bug.cgi?id=1220860</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220863">https://bugzilla.suse.com/show_bug.cgi?id=1220863</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220870">https://bugzilla.suse.com/show_bug.cgi?id=1220870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220917">https://bugzilla.suse.com/show_bug.cgi?id=1220917</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220918">https://bugzilla.suse.com/show_bug.cgi?id=1220918</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220930">https://bugzilla.suse.com/show_bug.cgi?id=1220930</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220931">https://bugzilla.suse.com/show_bug.cgi?id=1220931</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220932">https://bugzilla.suse.com/show_bug.cgi?id=1220932</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221039">https://bugzilla.suse.com/show_bug.cgi?id=1221039</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221040">https://bugzilla.suse.com/show_bug.cgi?id=1221040</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221287">https://bugzilla.suse.com/show_bug.cgi?id=1221287</a>
</li>


</ul>

</div>

--===============1400458892502345046==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung