Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:1983-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 199 vulnerabilities and has 26 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2022-48686: Fix UAF when detecting digest errors (bsc#1223948).
- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2022-48697: Fix a use-after-free (bsc#1223922).
- CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2021-47246: Fix page reclaim for dead peer hairpin (bsc#1224831).
- CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace (bsc#1225222).
- CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks() (bsc#1224644)
- CVE-2021-47548: Fixed a possible array out-of-bounds (bsc#1225506)
- CVE-2024-36029: Pervent access to suspended controller (bsc#1225708)
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2021-47352: Add validation for used length (bsc#1225124).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2021-47431: Fix gart.bo pin_count leak (bsc#1225390).
- CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref() (bsc#1224645)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2021-47423: Fix file release memory leak (bsc#1225366).
- CVE-2022-48710: Fix a possible null pointer dereference (bsc#1225230).
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2024-35809: Drain runtime-idle callbacks before driver removal (bsc#1224738).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot accesses (bsc#1224960).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2021-47401: Fix stack information leak (bsc#1225242).
- CVE-2023-52867: Fix possible buffer overflow (bsc#1225009).
- CVE-2023-52821: Fix a possible null pointer dereference (bsc#1225022).
- CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
- CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
- CVE-2021-47361: Fix error handling in mcb_alloc_bus() (bsc#1225151).
- CVE-2023-52864: Fix opening of char device (bsc#1225132).
- CVE-2022-48708: Fix potential NULL dereference (bsc#1224942).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2021-47238: Fix memory leak in ip_mc_add1_src (bsc#1224847)
- CVE-2023-52730: Fix possible resource leaks in some error paths (bsc#1224956).
- CVE-2021-47355: Fix possible use-after-free in nicstar_cleanup() (bsc#1225141).
- CVE-2021-47245: Fix out of bounds when parsing TCP options (bsc#1224838)
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
- CVE-2021-47249: Fix memory leak in rds_recvmsg (bsc#1224880)
- CVE-2021-47397: Break out if skb_header_pointer returns NULL in sctp_rcv_ootb (bsc#1225082)
- CVE-2021-47250: Fix memory leak in netlbl_cipsov4_add_std (bsc#1224827)
- CVE-2024-35849: Fix information leak in btrfs_ioctl_logical_to_ino() (bsc#1224733).
- CVE-2024-27436: Stop parsing channels bits when all channels are found (bsc#1224803).
- CVE-2021-47281: Fix race of snd_seq_timer_open() (bsc#1224983).
- CVE-2024-35789: Clear fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35830: Register v4l2 async device only after successful setup (bsc#1224680).
- CVE-2021-47334: Fix two use after free in ibmasm_init_one (bsc#1225112).
- CVE-2021-47357: Fix possible use-after-free in ia_module_exit() (bsc#1225144).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2024-35887: Fix use-after-free bugs caused by ax25_ds_del_timer (bzg#1224663)
- CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit() (bsc#1224907).
- CVE-2024-26957: Fix reference counting on zcrypt card objects (bsc#1223666).
- CVE-2023-52691: Fix a double-free in si_dpm_init (bsc#1224607).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-26984: Fix instmem race condition around ptr stores (bsc#1223633)
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
- CVE-2021-47206: Check return value after calling platform_get_resource() (bsc#1222894).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26996: Fix UAF ncm object at re-bind after usb ep transport error (bsc#1223752).
- CVE-2024-26874: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (bsc#1223048)
- CVE-2022-48702: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() (bsc#1223923).
- CVE-2022-48672: Fix off-by-one error in unflatten_dt_nodes() (bsc#1223931).
- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).
- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-27008: Fix out of bounds access (bsc#1223802).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect.
- autofs: fix a leak in autofs_expire_indirect() (git-fixes)
- Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
- btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit (git-fixes)
- btrfs: check if root is readonly while setting security xattr (git-fixes)
- btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (git-fixes)
- btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
- btrfs: do not stop integrity writeback too early (git-fixes)
- btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
- btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
- btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
- btrfs: fix deadlock when writing out space cache (git-fixes)
- Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO (git-fixes)
- btrfs: fix lockdep splat and potential deadlock after failure running delayed items (git-fixes)
- btrfs: fix lost error handling when looking up extended ref on log replay (git-fixes)
- btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
- btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
- btrfs: fix race when deleting quota root from the dirty cow roots list (git-fixes)
- btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
- btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
- btrfs: fix unaligned access in readdir (git-fixes)
- btrfs: limit device extents to the device size (git-fixes)
- btrfs: prevent to set invalid default subvolid (git-fixes)
- btrfs: record delayed inode root in transaction (git-fixes)
- btrfs: scrub: reject unsupported scrub flags (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: limit number of clones and allocated memory size (git-fixes)
- btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add #include
- btrfs: tree-checker: add missing return after error in root_item (git-fixes)
- btrfs: tree-checker: add missing returns after data_ref alignment checks (git-fixes)
- btrfs: tree-checker: do not error out if extent ref hash does not match (git-fixes)
- btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
- btrfs: tree-checker: Fix misleading group system information (git-fixes)
- btrfs: undo writable superblocke when sprouting fails (git-fixes)
- btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
- ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
- ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
- ecryptfs: fix kernel panic with null dev_name (git-fixes)
- ecryptfs: Fix typo in message (git-fixes)
- ep_create_wakeup_source(): dentry name can change under you (git-fixes)
- exportfs_decode_fh(): negative pinned may become positive without the parent locked (git-fixes)
- fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes (git-fixes)
- fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
- ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-fixes).
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1225059).
- l2tp: pass correct message length to ip6_append_data (git-fixes).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
- netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
- netfilter: nft_compat: explicitly reject ERROR and standard target (git-fixes).
- netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Disable passing console lock owner completely during panic() (bsc#1197894).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1223969).
- rds: avoid unenecessary cong_update in loop transport (git-fixes).
- rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
- rxrpc: Do not put crypto buffers on the stack (git-fixes).
- rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
- rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls (git-fixes).
- rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-fixes).
- rxrpc: Work around usercopy check (git-fixes).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224347).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1225062).
- tcp: tcp_make_synack() can be called from process context (git-fixes).
- tls: Fix context leak on tls_device_down (bsc#1221545).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Real Time 12 SP5
zypper in -t patch SUSE-SLE-RT-12-SP5-2024-1983=1
Package List:
-
SUSE Linux Enterprise Real Time 12 SP5 (x86_64)
- gfs2-kmp-rt-debuginfo-4.12.14-10.188.1
- kernel-rt-devel-4.12.14-10.188.1
- kernel-rt-debugsource-4.12.14-10.188.1
- kernel-rt_debug-debugsource-4.12.14-10.188.1
- cluster-md-kmp-rt-debuginfo-4.12.14-10.188.1
- dlm-kmp-rt-debuginfo-4.12.14-10.188.1
- cluster-md-kmp-rt-4.12.14-10.188.1
- kernel-rt_debug-devel-debuginfo-4.12.14-10.188.1
- kernel-syms-rt-4.12.14-10.188.1
- ocfs2-kmp-rt-debuginfo-4.12.14-10.188.1
- gfs2-kmp-rt-4.12.14-10.188.1
- kernel-rt-debuginfo-4.12.14-10.188.1
- kernel-rt-devel-debuginfo-4.12.14-10.188.1
- kernel-rt-base-4.12.14-10.188.1
- kernel-rt-base-debuginfo-4.12.14-10.188.1
- ocfs2-kmp-rt-4.12.14-10.188.1
- dlm-kmp-rt-4.12.14-10.188.1
- kernel-rt_debug-debuginfo-4.12.14-10.188.1
- kernel-rt_debug-devel-4.12.14-10.188.1
-
SUSE Linux Enterprise Real Time 12 SP5 (noarch)
- kernel-devel-rt-4.12.14-10.188.1
- kernel-source-rt-4.12.14-10.188.1
-
SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64)
- kernel-rt-4.12.14-10.188.1
- kernel-rt_debug-4.12.14-10.188.1
References:
- https://www.suse.com/security/cve/CVE-2021-46933.html
- https://www.suse.com/security/cve/CVE-2021-46955.html
- https://www.suse.com/security/cve/CVE-2021-47074.html
- https://www.suse.com/security/cve/CVE-2021-47113.html
- https://www.suse.com/security/cve/CVE-2021-47131.html
- https://www.suse.com/security/cve/CVE-2021-47162.html
- https://www.suse.com/security/cve/CVE-2021-47171.html
- https://www.suse.com/security/cve/CVE-2021-47188.html
- https://www.suse.com/security/cve/CVE-2021-47206.html
- https://www.suse.com/security/cve/CVE-2021-47220.html
- https://www.suse.com/security/cve/CVE-2021-47229.html
- https://www.suse.com/security/cve/CVE-2021-47231.html
- https://www.suse.com/security/cve/CVE-2021-47235.html
- https://www.suse.com/security/cve/CVE-2021-47236.html
- https://www.suse.com/security/cve/CVE-2021-47237.html
- https://www.suse.com/security/cve/CVE-2021-47238.html
- https://www.suse.com/security/cve/CVE-2021-47239.html
- https://www.suse.com/security/cve/CVE-2021-47245.html
- https://www.suse.com/security/cve/CVE-2021-47246.html
- https://www.suse.com/security/cve/CVE-2021-47248.html
- https://www.suse.com/security/cve/CVE-2021-47249.html
- https://www.suse.com/security/cve/CVE-2021-47250.html
- https://www.suse.com/security/cve/CVE-2021-47252.html
- https://www.suse.com/security/cve/CVE-2021-47254.html
- https://www.suse.com/security/cve/CVE-2021-47258.html
- https://www.suse.com/security/cve/CVE-2021-47260.html
- https://www.suse.com/security/cve/CVE-2021-47261.html
- https://www.suse.com/security/cve/CVE-2021-47265.html
- https://www.suse.com/security/cve/CVE-2021-47269.html
- https://www.suse.com/security/cve/CVE-2021-47274.html
- https://www.suse.com/security/cve/CVE-2021-47276.html
- https://www.suse.com/security/cve/CVE-2021-47277.html
- https://www.suse.com/security/cve/CVE-2021-47280.html
- https://www.suse.com/security/cve/CVE-2021-47281.html
- https://www.suse.com/security/cve/CVE-2021-47284.html
- https://www.suse.com/security/cve/CVE-2021-47285.html
- https://www.suse.com/security/cve/CVE-2021-47288.html
- https://www.suse.com/security/cve/CVE-2021-47301.html
- https://www.suse.com/security/cve/CVE-2021-47302.html
- https://www.suse.com/security/cve/CVE-2021-47305.html
- https://www.suse.com/security/cve/CVE-2021-47307.html
- https://www.suse.com/security/cve/CVE-2021-47308.html
- https://www.suse.com/security/cve/CVE-2021-47310.html
- https://www.suse.com/security/cve/CVE-2021-47311.html
- https://www.suse.com/security/cve/CVE-2021-47314.html
- https://www.suse.com/security/cve/CVE-2021-47315.html
- https://www.suse.com/security/cve/CVE-2021-47319.html
- https://www.suse.com/security/cve/CVE-2021-47320.html
- https://www.suse.com/security/cve/CVE-2021-47321.html
- https://www.suse.com/security/cve/CVE-2021-47323.html
- https://www.suse.com/security/cve/CVE-2021-47324.html
- https://www.suse.com/security/cve/CVE-2021-47330.html
- https://www.suse.com/security/cve/CVE-2021-47334.html
- https://www.suse.com/security/cve/CVE-2021-47337.html
- https://www.suse.com/security/cve/CVE-2021-47343.html
- https://www.suse.com/security/cve/CVE-2021-47344.html
- https://www.suse.com/security/cve/CVE-2021-47345.html
- https://www.suse.com/security/cve/CVE-2021-47347.html
- https://www.suse.com/security/cve/CVE-2021-47352.html
- https://www.suse.com/security/cve/CVE-2021-47353.html
- https://www.suse.com/security/cve/CVE-2021-47355.html
- https://www.suse.com/security/cve/CVE-2021-47356.html
- https://www.suse.com/security/cve/CVE-2021-47357.html
- https://www.suse.com/security/cve/CVE-2021-47361.html
- https://www.suse.com/security/cve/CVE-2021-47362.html
- https://www.suse.com/security/cve/CVE-2021-47369.html
- https://www.suse.com/security/cve/CVE-2021-47375.html
- https://www.suse.com/security/cve/CVE-2021-47378.html
- https://www.suse.com/security/cve/CVE-2021-47382.html
- https://www.suse.com/security/cve/CVE-2021-47383.html
- https://www.suse.com/security/cve/CVE-2021-47391.html
- https://www.suse.com/security/cve/CVE-2021-47397.html
- https://www.suse.com/security/cve/CVE-2021-47400.html
- https://www.suse.com/security/cve/CVE-2021-47401.html
- https://www.suse.com/security/cve/CVE-2021-47404.html
- https://www.suse.com/security/cve/CVE-2021-47409.html
- https://www.suse.com/security/cve/CVE-2021-47416.html
- https://www.suse.com/security/cve/CVE-2021-47423.html
- https://www.suse.com/security/cve/CVE-2021-47424.html
- https://www.suse.com/security/cve/CVE-2021-47431.html
- https://www.suse.com/security/cve/CVE-2021-47435.html
- https://www.suse.com/security/cve/CVE-2021-47436.html
- https://www.suse.com/security/cve/CVE-2021-47456.html
- https://www.suse.com/security/cve/CVE-2021-47458.html
- https://www.suse.com/security/cve/CVE-2021-47460.html
- https://www.suse.com/security/cve/CVE-2021-47469.html
- https://www.suse.com/security/cve/CVE-2021-47472.html
- https://www.suse.com/security/cve/CVE-2021-47473.html
- https://www.suse.com/security/cve/CVE-2021-47478.html
- https://www.suse.com/security/cve/CVE-2021-47480.html
- https://www.suse.com/security/cve/CVE-2021-47483.html
- https://www.suse.com/security/cve/CVE-2021-47485.html
- https://www.suse.com/security/cve/CVE-2021-47495.html
- https://www.suse.com/security/cve/CVE-2021-47496.html
- https://www.suse.com/security/cve/CVE-2021-47497.html
- https://www.suse.com/security/cve/CVE-2021-47500.html
- https://www.suse.com/security/cve/CVE-2021-47506.html
- https://www.suse.com/security/cve/CVE-2021-47509.html
- https://www.suse.com/security/cve/CVE-2021-47511.html
- https://www.suse.com/security/cve/CVE-2021-47523.html
- https://www.suse.com/security/cve/CVE-2021-47541.html
- https://www.suse.com/security/cve/CVE-2021-47548.html
- https://www.suse.com/security/cve/CVE-2021-47565.html
- https://www.suse.com/security/cve/CVE-2022-48636.html
- https://www.suse.com/security/cve/CVE-2022-48650.html
- https://www.suse.com/security/cve/CVE-2022-48672.html
- https://www.suse.com/security/cve/CVE-2022-48686.html
- https://www.suse.com/security/cve/CVE-2022-48697.html
- https://www.suse.com/security/cve/CVE-2022-48702.html
- https://www.suse.com/security/cve/CVE-2022-48704.html
- https://www.suse.com/security/cve/CVE-2022-48708.html
- https://www.suse.com/security/cve/CVE-2022-48710.html
- https://www.suse.com/security/cve/CVE-2023-0160.html
- https://www.suse.com/security/cve/CVE-2023-1829.html
- https://www.suse.com/security/cve/CVE-2023-42755.html
- https://www.suse.com/security/cve/CVE-2023-47233.html
- https://www.suse.com/security/cve/CVE-2023-52527.html
- https://www.suse.com/security/cve/CVE-2023-52586.html
- https://www.suse.com/security/cve/CVE-2023-52591.html
- https://www.suse.com/security/cve/CVE-2023-52646.html
- https://www.suse.com/security/cve/CVE-2023-52653.html
- https://www.suse.com/security/cve/CVE-2023-52655.html
- https://www.suse.com/security/cve/CVE-2023-52664.html
- https://www.suse.com/security/cve/CVE-2023-52685.html
- https://www.suse.com/security/cve/CVE-2023-52686.html
- https://www.suse.com/security/cve/CVE-2023-52691.html
- https://www.suse.com/security/cve/CVE-2023-52696.html
- https://www.suse.com/security/cve/CVE-2023-52698.html
- https://www.suse.com/security/cve/CVE-2023-52703.html
- https://www.suse.com/security/cve/CVE-2023-52730.html
- https://www.suse.com/security/cve/CVE-2023-52732.html
- https://www.suse.com/security/cve/CVE-2023-52741.html
- https://www.suse.com/security/cve/CVE-2023-52742.html
- https://www.suse.com/security/cve/CVE-2023-52747.html
- https://www.suse.com/security/cve/CVE-2023-52759.html
- https://www.suse.com/security/cve/CVE-2023-52774.html
- https://www.suse.com/security/cve/CVE-2023-52781.html
- https://www.suse.com/security/cve/CVE-2023-52796.html
- https://www.suse.com/security/cve/CVE-2023-52803.html
- https://www.suse.com/security/cve/CVE-2023-52821.html
- https://www.suse.com/security/cve/CVE-2023-52864.html
- https://www.suse.com/security/cve/CVE-2023-52865.html
- https://www.suse.com/security/cve/CVE-2023-52867.html
- https://www.suse.com/security/cve/CVE-2023-52875.html
- https://www.suse.com/security/cve/CVE-2023-52880.html
- https://www.suse.com/security/cve/CVE-2024-0639.html
- https://www.suse.com/security/cve/CVE-2024-26625.html
- https://www.suse.com/security/cve/CVE-2024-26739.html
- https://www.suse.com/security/cve/CVE-2024-26752.html
- https://www.suse.com/security/cve/CVE-2024-26775.html
- https://www.suse.com/security/cve/CVE-2024-26791.html
- https://www.suse.com/security/cve/CVE-2024-26828.html
- https://www.suse.com/security/cve/CVE-2024-26846.html
- https://www.suse.com/security/cve/CVE-2024-26874.html
- https://www.suse.com/security/cve/CVE-2024-26876.html
- https://www.suse.com/security/cve/CVE-2024-26900.html
- https://www.suse.com/security/cve/CVE-2024-26915.html
- https://www.suse.com/security/cve/CVE-2024-26920.html
- https://www.suse.com/security/cve/CVE-2024-26921.html
- https://www.suse.com/security/cve/CVE-2024-26929.html
- https://www.suse.com/security/cve/CVE-2024-26930.html
- https://www.suse.com/security/cve/CVE-2024-26931.html
- https://www.suse.com/security/cve/CVE-2024-26934.html
- https://www.suse.com/security/cve/CVE-2024-26957.html
- https://www.suse.com/security/cve/CVE-2024-26958.html
- https://www.suse.com/security/cve/CVE-2024-26984.html
- https://www.suse.com/security/cve/CVE-2024-26996.html
- https://www.suse.com/security/cve/CVE-2024-27008.html
- https://www.suse.com/security/cve/CVE-2024-27054.html
- https://www.suse.com/security/cve/CVE-2024-27059.html
- https://www.suse.com/security/cve/CVE-2024-27062.html
- https://www.suse.com/security/cve/CVE-2024-27388.html
- https://www.suse.com/security/cve/CVE-2024-27396.html
- https://www.suse.com/security/cve/CVE-2024-27398.html
- https://www.suse.com/security/cve/CVE-2024-27401.html
- https://www.suse.com/security/cve/CVE-2024-27419.html
- https://www.suse.com/security/cve/CVE-2024-27436.html
- https://www.suse.com/security/cve/CVE-2024-35789.html
- https://www.suse.com/security/cve/CVE-2024-35791.html
- https://www.suse.com/security/cve/CVE-2024-35809.html
- https://www.suse.com/security/cve/CVE-2024-35811.html
- https://www.suse.com/security/cve/CVE-2024-35830.html
- https://www.suse.com/security/cve/CVE-2024-35849.html
- https://www.suse.com/security/cve/CVE-2024-35877.html
- https://www.suse.com/security/cve/CVE-2024-35878.html
- https://www.suse.com/security/cve/CVE-2024-35887.html
- https://www.suse.com/security/cve/CVE-2024-35895.html
- https://www.suse.com/security/cve/CVE-2024-35914.html
- https://www.suse.com/security/cve/CVE-2024-35932.html
- https://www.suse.com/security/cve/CVE-2024-35935.html
- https://www.suse.com/security/cve/CVE-2024-35936.html
- https://www.suse.com/security/cve/CVE-2024-35944.html
- https://www.suse.com/security/cve/CVE-2024-35955.html
- https://www.suse.com/security/cve/CVE-2024-35969.html
- https://www.suse.com/security/cve/CVE-2024-35982.html
- https://www.suse.com/security/cve/CVE-2024-35984.html
- https://www.suse.com/security/cve/CVE-2024-36015.html
- https://www.suse.com/security/cve/CVE-2024-36029.html
- https://www.suse.com/security/cve/CVE-2024-36954.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1101816
- https://bugzilla.suse.com/show_bug.cgi?id=1141539
- https://bugzilla.suse.com/show_bug.cgi?id=1181674
- https://bugzilla.suse.com/show_bug.cgi?id=1185902
- https://bugzilla.suse.com/show_bug.cgi?id=1187716
- https://bugzilla.suse.com/show_bug.cgi?id=1188616
- https://bugzilla.suse.com/show_bug.cgi?id=1190317
- https://bugzilla.suse.com/show_bug.cgi?id=1190795
- https://bugzilla.suse.com/show_bug.cgi?id=1191452
- https://bugzilla.suse.com/show_bug.cgi?id=1194591
- https://bugzilla.suse.com/show_bug.cgi?id=1197760
- https://bugzilla.suse.com/show_bug.cgi?id=1197894
- https://bugzilla.suse.com/show_bug.cgi?id=1203935
- https://bugzilla.suse.com/show_bug.cgi?id=1206213
- https://bugzilla.suse.com/show_bug.cgi?id=1206646
- https://bugzilla.suse.com/show_bug.cgi?id=1207186
- https://bugzilla.suse.com/show_bug.cgi?id=1209657
- https://bugzilla.suse.com/show_bug.cgi?id=1210335
- https://bugzilla.suse.com/show_bug.cgi?id=1215702
- https://bugzilla.suse.com/show_bug.cgi?id=1216702
- https://bugzilla.suse.com/show_bug.cgi?id=1217169
- https://bugzilla.suse.com/show_bug.cgi?id=1217519
- https://bugzilla.suse.com/show_bug.cgi?id=1218917
- https://bugzilla.suse.com/show_bug.cgi?id=1220487
- https://bugzilla.suse.com/show_bug.cgi?id=1220513
- https://bugzilla.suse.com/show_bug.cgi?id=1220854
- https://bugzilla.suse.com/show_bug.cgi?id=1220928
- https://bugzilla.suse.com/show_bug.cgi?id=1221044
- https://bugzilla.suse.com/show_bug.cgi?id=1221081
- https://bugzilla.suse.com/show_bug.cgi?id=1221086
- https://bugzilla.suse.com/show_bug.cgi?id=1221543
- https://bugzilla.suse.com/show_bug.cgi?id=1221545
- https://bugzilla.suse.com/show_bug.cgi?id=1221816
- https://bugzilla.suse.com/show_bug.cgi?id=1221977
- https://bugzilla.suse.com/show_bug.cgi?id=1221994
- https://bugzilla.suse.com/show_bug.cgi?id=1222559
- https://bugzilla.suse.com/show_bug.cgi?id=1222619
- https://bugzilla.suse.com/show_bug.cgi?id=1222627
- https://bugzilla.suse.com/show_bug.cgi?id=1222667
- https://bugzilla.suse.com/show_bug.cgi?id=1222671
- https://bugzilla.suse.com/show_bug.cgi?id=1222793
- https://bugzilla.suse.com/show_bug.cgi?id=1222893
- https://bugzilla.suse.com/show_bug.cgi?id=1222894
- https://bugzilla.suse.com/show_bug.cgi?id=1223023
- https://bugzilla.suse.com/show_bug.cgi?id=1223046
- https://bugzilla.suse.com/show_bug.cgi?id=1223048
- https://bugzilla.suse.com/show_bug.cgi?id=1223084
- https://bugzilla.suse.com/show_bug.cgi?id=1223119
- https://bugzilla.suse.com/show_bug.cgi?id=1223138
- https://bugzilla.suse.com/show_bug.cgi?id=1223207
- https://bugzilla.suse.com/show_bug.cgi?id=1223360
- https://bugzilla.suse.com/show_bug.cgi?id=1223384
- https://bugzilla.suse.com/show_bug.cgi?id=1223432
- https://bugzilla.suse.com/show_bug.cgi?id=1223509
- https://bugzilla.suse.com/show_bug.cgi?id=1223512
- https://bugzilla.suse.com/show_bug.cgi?id=1223539
- https://bugzilla.suse.com/show_bug.cgi?id=1223540
- https://bugzilla.suse.com/show_bug.cgi?id=1223626
- https://bugzilla.suse.com/show_bug.cgi?id=1223627
- https://bugzilla.suse.com/show_bug.cgi?id=1223633
- https://bugzilla.suse.com/show_bug.cgi?id=1223653
- https://bugzilla.suse.com/show_bug.cgi?id=1223666
- https://bugzilla.suse.com/show_bug.cgi?id=1223671
- https://bugzilla.suse.com/show_bug.cgi?id=1223712
- https://bugzilla.suse.com/show_bug.cgi?id=1223715
- https://bugzilla.suse.com/show_bug.cgi?id=1223738
- https://bugzilla.suse.com/show_bug.cgi?id=1223744
- https://bugzilla.suse.com/show_bug.cgi?id=1223752
- https://bugzilla.suse.com/show_bug.cgi?id=1223802
- https://bugzilla.suse.com/show_bug.cgi?id=1223819
- https://bugzilla.suse.com/show_bug.cgi?id=1223834
- https://bugzilla.suse.com/show_bug.cgi?id=1223922
- https://bugzilla.suse.com/show_bug.cgi?id=1223923
- https://bugzilla.suse.com/show_bug.cgi?id=1223931
- https://bugzilla.suse.com/show_bug.cgi?id=1223932
- https://bugzilla.suse.com/show_bug.cgi?id=1223948
- https://bugzilla.suse.com/show_bug.cgi?id=1223969
- https://bugzilla.suse.com/show_bug.cgi?id=1224096
- https://bugzilla.suse.com/show_bug.cgi?id=1224174
- https://bugzilla.suse.com/show_bug.cgi?id=1224181
- https://bugzilla.suse.com/show_bug.cgi?id=1224347
- https://bugzilla.suse.com/show_bug.cgi?id=1224482
- https://bugzilla.suse.com/show_bug.cgi?id=1224511
- https://bugzilla.suse.com/show_bug.cgi?id=1224525
- https://bugzilla.suse.com/show_bug.cgi?id=1224566
- https://bugzilla.suse.com/show_bug.cgi?id=1224580
- https://bugzilla.suse.com/show_bug.cgi?id=1224592
- https://bugzilla.suse.com/show_bug.cgi?id=1224601
- https://bugzilla.suse.com/show_bug.cgi?id=1224607
- https://bugzilla.suse.com/show_bug.cgi?id=1224621
- https://bugzilla.suse.com/show_bug.cgi?id=1224644
- https://bugzilla.suse.com/show_bug.cgi?id=1224645
- https://bugzilla.suse.com/show_bug.cgi?id=1224648
- https://bugzilla.suse.com/show_bug.cgi?id=1224650
- https://bugzilla.suse.com/show_bug.cgi?id=1224663
- https://bugzilla.suse.com/show_bug.cgi?id=1224671
- https://bugzilla.suse.com/show_bug.cgi?id=1224676
- https://bugzilla.suse.com/show_bug.cgi?id=1224680
- https://bugzilla.suse.com/show_bug.cgi?id=1224682
- https://bugzilla.suse.com/show_bug.cgi?id=1224725
- https://bugzilla.suse.com/show_bug.cgi?id=1224728
- https://bugzilla.suse.com/show_bug.cgi?id=1224733
- https://bugzilla.suse.com/show_bug.cgi?id=1224738
- https://bugzilla.suse.com/show_bug.cgi?id=1224747
- https://bugzilla.suse.com/show_bug.cgi?id=1224749
- https://bugzilla.suse.com/show_bug.cgi?id=1224759
- https://bugzilla.suse.com/show_bug.cgi?id=1224803
- https://bugzilla.suse.com/show_bug.cgi?id=1224827
- https://bugzilla.suse.com/show_bug.cgi?id=1224830
- https://bugzilla.suse.com/show_bug.cgi?id=1224831
- https://bugzilla.suse.com/show_bug.cgi?id=1224834
- https://bugzilla.suse.com/show_bug.cgi?id=1224838
- https://bugzilla.suse.com/show_bug.cgi?id=1224841
- https://bugzilla.suse.com/show_bug.cgi?id=1224844
- https://bugzilla.suse.com/show_bug.cgi?id=1224846
- https://bugzilla.suse.com/show_bug.cgi?id=1224847
- https://bugzilla.suse.com/show_bug.cgi?id=1224849
- https://bugzilla.suse.com/show_bug.cgi?id=1224854
- https://bugzilla.suse.com/show_bug.cgi?id=1224859
- https://bugzilla.suse.com/show_bug.cgi?id=1224867
- https://bugzilla.suse.com/show_bug.cgi?id=1224880
- https://bugzilla.suse.com/show_bug.cgi?id=1224882
- https://bugzilla.suse.com/show_bug.cgi?id=1224888
- https://bugzilla.suse.com/show_bug.cgi?id=1224889
- https://bugzilla.suse.com/show_bug.cgi?id=1224892
- https://bugzilla.suse.com/show_bug.cgi?id=1224893
- https://bugzilla.suse.com/show_bug.cgi?id=1224899
- https://bugzilla.suse.com/show_bug.cgi?id=1224904
- https://bugzilla.suse.com/show_bug.cgi?id=1224907
- https://bugzilla.suse.com/show_bug.cgi?id=1224916
- https://bugzilla.suse.com/show_bug.cgi?id=1224917
- https://bugzilla.suse.com/show_bug.cgi?id=1224922
- https://bugzilla.suse.com/show_bug.cgi?id=1224926
- https://bugzilla.suse.com/show_bug.cgi?id=1224930
- https://bugzilla.suse.com/show_bug.cgi?id=1224931
- https://bugzilla.suse.com/show_bug.cgi?id=1224942
- https://bugzilla.suse.com/show_bug.cgi?id=1224954
- https://bugzilla.suse.com/show_bug.cgi?id=1224956
- https://bugzilla.suse.com/show_bug.cgi?id=1224957
- https://bugzilla.suse.com/show_bug.cgi?id=1224959
- https://bugzilla.suse.com/show_bug.cgi?id=1224960
- https://bugzilla.suse.com/show_bug.cgi?id=1224961
- https://bugzilla.suse.com/show_bug.cgi?id=1224963
- https://bugzilla.suse.com/show_bug.cgi?id=1224966
- https://bugzilla.suse.com/show_bug.cgi?id=1224968
- https://bugzilla.suse.com/show_bug.cgi?id=1224981
- https://bugzilla.suse.com/show_bug.cgi?id=1224982
- https://bugzilla.suse.com/show_bug.cgi?id=1224983
- https://bugzilla.suse.com/show_bug.cgi?id=1224987
- https://bugzilla.suse.com/show_bug.cgi?id=1224990
- https://bugzilla.suse.com/show_bug.cgi?id=1224996
- https://bugzilla.suse.com/show_bug.cgi?id=1225008
- https://bugzilla.suse.com/show_bug.cgi?id=1225009
- https://bugzilla.suse.com/show_bug.cgi?id=1225010
- https://bugzilla.suse.com/show_bug.cgi?id=1225022
- https://bugzilla.suse.com/show_bug.cgi?id=1225026
- https://bugzilla.suse.com/show_bug.cgi?id=1225030
- https://bugzilla.suse.com/show_bug.cgi?id=1225054
- https://bugzilla.suse.com/show_bug.cgi?id=1225058
- https://bugzilla.suse.com/show_bug.cgi?id=1225059
- https://bugzilla.suse.com/show_bug.cgi?id=1225060
- https://bugzilla.suse.com/show_bug.cgi?id=1225062
- https://bugzilla.suse.com/show_bug.cgi?id=1225082
- https://bugzilla.suse.com/show_bug.cgi?id=1225084
- https://bugzilla.suse.com/show_bug.cgi?id=1225086
- https://bugzilla.suse.com/show_bug.cgi?id=1225092
- https://bugzilla.suse.com/show_bug.cgi?id=1225096
- https://bugzilla.suse.com/show_bug.cgi?id=1225112
- https://bugzilla.suse.com/show_bug.cgi?id=1225124
- https://bugzilla.suse.com/show_bug.cgi?id=1225128
- https://bugzilla.suse.com/show_bug.cgi?id=1225132
- https://bugzilla.suse.com/show_bug.cgi?id=1225141
- https://bugzilla.suse.com/show_bug.cgi?id=1225143
- https://bugzilla.suse.com/show_bug.cgi?id=1225144
- https://bugzilla.suse.com/show_bug.cgi?id=1225151
- https://bugzilla.suse.com/show_bug.cgi?id=1225153
- https://bugzilla.suse.com/show_bug.cgi?id=1225155
- https://bugzilla.suse.com/show_bug.cgi?id=1225157
- https://bugzilla.suse.com/show_bug.cgi?id=1225164
- https://bugzilla.suse.com/show_bug.cgi?id=1225177
- https://bugzilla.suse.com/show_bug.cgi?id=1225189
- https://bugzilla.suse.com/show_bug.cgi?id=1225192
- https://bugzilla.suse.com/show_bug.cgi?id=1225193
- https://bugzilla.suse.com/show_bug.cgi?id=1225198
- https://bugzilla.suse.com/show_bug.cgi?id=1225201
- https://bugzilla.suse.com/show_bug.cgi?id=1225207
- https://bugzilla.suse.com/show_bug.cgi?id=1225208
- https://bugzilla.suse.com/show_bug.cgi?id=1225222
- https://bugzilla.suse.com/show_bug.cgi?id=1225230
- https://bugzilla.suse.com/show_bug.cgi?id=1225242
- https://bugzilla.suse.com/show_bug.cgi?id=1225244
- https://bugzilla.suse.com/show_bug.cgi?id=1225247
- https://bugzilla.suse.com/show_bug.cgi?id=1225251
- https://bugzilla.suse.com/show_bug.cgi?id=1225252
- https://bugzilla.suse.com/show_bug.cgi?id=1225256
- https://bugzilla.suse.com/show_bug.cgi?id=1225303
- https://bugzilla.suse.com/show_bug.cgi?id=1225318
- https://bugzilla.suse.com/show_bug.cgi?id=1225322
- https://bugzilla.suse.com/show_bug.cgi?id=1225329
- https://bugzilla.suse.com/show_bug.cgi?id=1225330
- https://bugzilla.suse.com/show_bug.cgi?id=1225336
- https://bugzilla.suse.com/show_bug.cgi?id=1225347
- https://bugzilla.suse.com/show_bug.cgi?id=1225351
- https://bugzilla.suse.com/show_bug.cgi?id=1225354
- https://bugzilla.suse.com/show_bug.cgi?id=1225355
- https://bugzilla.suse.com/show_bug.cgi?id=1225360
- https://bugzilla.suse.com/show_bug.cgi?id=1225366
- https://bugzilla.suse.com/show_bug.cgi?id=1225367
- https://bugzilla.suse.com/show_bug.cgi?id=1225384
- https://bugzilla.suse.com/show_bug.cgi?id=1225390
- https://bugzilla.suse.com/show_bug.cgi?id=1225404
- https://bugzilla.suse.com/show_bug.cgi?id=1225409
- https://bugzilla.suse.com/show_bug.cgi?id=1225411
- https://bugzilla.suse.com/show_bug.cgi?id=1225438
- https://bugzilla.suse.com/show_bug.cgi?id=1225453
- https://bugzilla.suse.com/show_bug.cgi?id=1225479
- https://bugzilla.suse.com/show_bug.cgi?id=1225482
- https://bugzilla.suse.com/show_bug.cgi?id=1225506
- https://bugzilla.suse.com/show_bug.cgi?id=1225549
- https://bugzilla.suse.com/show_bug.cgi?id=1225560
- https://bugzilla.suse.com/show_bug.cgi?id=1225572
- https://bugzilla.suse.com/show_bug.cgi?id=1225640
- https://bugzilla.suse.com/show_bug.cgi?id=1225708
- https://bugzilla.suse.com/show_bug.cgi?id=1225764